Real-World Oriented Access Control Method with a Displayed Password

  • Yuji Ayatsuka
  • Michimune Kohno
  • Jun Rekimoto
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3101)


Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered users or devices, and security issues arise if visitors are permitted to use networked resources in an office and have accessibility to other resources. We propose a new access control method that uses frequently changing passwords which are displayed beside the resource. This method provides real-world-oriented access control over an internet without any need for special hardware such as sensors.


Mobile Phone Access Control Network Device Correct Password Authentication Program 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ayatsuka, Y., Matsushita, N., Rekimoto, J.: ChatScape: a visual informal communication tool in communities. In: CHI 2001 Extended Abstracts, April 2001, pp. 327–328. ACM, New York (2001)CrossRefGoogle Scholar
  2. 2.
    Ayatsuka, Y., Matsushita, N., Rekimoto, J.: Gaze-link: A new metaphor of real-world oriented user interface. IPSJ Journal 42(6), 1330–1337 (2001) (in Japanese)Google Scholar
  3. 3.
    Ayatsuka, Y., Rekimoto, J.: Real-world oriented application with a simple knock location device. In: Proceedings of WISS 2001 Interactive System and Software IX, December 2001. JSSST, Kindaikagakusha, pp. 191–196 (2001)Google Scholar
  4. 4.
  5. 5.
  6. 6.
    Kohno, M., Cho, K., Ayatsuka, Y., Rekimoto, J.: A security model with user interface techniques for ubiquitous computing. In: Proceedings of Internet Conference, November 2002, pp. 43–51. JSSST (2002) (in Japanese)Google Scholar
  7. 7.
    Long, S., Aust, D., Abowd, G., Atkeson, C.: Cyberguide: Prototyping context-aware mobile applications. In: CHI 1996 Conference Companion, pp. 293–294 (1996)Google Scholar
  8. 8.
    Rekimoto, J.: Pick-and-drop: A direct manipulation technique for multiple computer environments. In: UIST 1997, October 1997, pp. 31–39 (1997)Google Scholar
  9. 9.
    Rekimoto, J.: Matrix: A realitime object identification and registration method for augmented reality. In: Asia Pacific Computer Human Interaction 1998 (APCHI 1998), July 1998, pp. 63–68. IEEE Computer Society, Los Alamitos (1998)Google Scholar
  10. 10.
    Rekimoto, J., Ayatsuka, Y., Kohno, M., Oba, H.: Proximal interactions: A direct manipulation technique for wireless networking. In: Ninth IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2003) (September 2003) (to appear)Google Scholar
  11. 11.
    Rekimoto, J., Nagao, K.: The world through the computer: Computer augmented interaction with real world environments. In: UIST 1995, November 1995, pp. 29–36 (1995)Google Scholar
  12. 12.
    Tarumi, H., Morishita, K., Nakao, M., Kambayashi, Y.: SpaceTag: An overlaid virtual system and its application. In: Proc. International Conference on Multimedia Computing and Systems (ICMCS 1999), vol. 1, pp. 207–212 (1999)Google Scholar
  13. 13.
    Ullmer, B., Ishii, H., Glas, D.: mediaBlocks: Physical Containers, Transports, and Controls for Online Media. In: Proceedings of SIGGRAPH 1998, pp. 379–386 (1998)Google Scholar
  14. 14.
    Want, R., Hopper, A., Falcão, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems 10(1), 91–102 (1992)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Yuji Ayatsuka
    • 1
  • Michimune Kohno
    • 1
  • Jun Rekimoto
    • 1
  1. 1.Interaction LaboratorySony Computer Science Laboratories, Inc.TokyoJapan

Personalised recommendations