Biometrics and secondary authentication.
Victoria Cepeda
March 11, 2015
Some slides adapted from Michelle Mazurek, Lorrie Cranor,Blase Ur, Chandrasekhar Bhagavatula and Stephen Siena
Biometrics and secondary authentication. Victoria Cepeda March 11, - - PowerPoint PPT Presentation
Biometrics and secondary authentication. Victoria Cepeda March 11, 2015 Some slides adapted from Michelle Mazurek, Lorrie Cranor,Blase Ur, Chandrasekhar Bhagavatula and Stephen Siena Authentication in simple terms Positive verification of
Victoria Cepeda
March 11, 2015
Some slides adapted from Michelle Mazurek, Lorrie Cranor,Blase Ur, Chandrasekhar Bhagavatula and Stephen Siena
based on a physiological or behavioral characteristic.” – The Biometric Consortium
used to identify or authenticate.
Image from http://www.sciencedaily.com Image from http://www.economist.com
“Physiological”
“Behavioral”
No Yes
Biometric Data Collection
Transmission Quality Sufficient?
Yes
Template Match
Signal Processing, Feature Extraction, Representation
Database
Decision Confidence?
new biometric sample is requested. No
database
False Rejection/Acceptance Errors:
accepted.
verification.
authorized user.
percentage calculated from a combination of a system’s FTE, FTA, and FNM.
equal.
represents a balanced performance.
see that if the user comfort is increased, the false positive rate will increase.
– More secure – Easier unlocking of phone
– Do you want Google or Apple to have your biometrics at all times?
Fingerprint unlock)
help)
Berkeley: researchers develop technology to access passwords with mind.
Research Projects Agency (DARPA) : "password pill" or "electronic tattoo" that would serve as your personal ID.
Image from http://www.wikipedia.org
the combination of two or more different components.
secondary authentication is used in conjunction with primary authentication
used when the primary authentication is lost/ forgotten/invalidated
know?
authentication?
“the very four digits that Amazon considers unimportant enough to display in the clear on the web are precisely the same ones that Apple considers”
verification via one-time passwords and public-key- based technology to achieve stronger user and device identification.
to give up on elaborate password rules and look for something better”
monetary flow )
answers,
Microsoft, and Yahoo!—rely on personal questions as the secondary authentication secrets used to reset account passwords.
the study?
recruit subjects for a study like this?
recruiting team selected participants from a larger pool
Microsoft.”
study?
subjects for a study like this?
authentication.
impersonating account holders, and
account holders.
Advantages
personalized content to the user. This includes information such as name, email, hometown, interests, activities and friends. However, this can create issues for privacy, and result in a narrowing of the variety of views and options available on the internet.
having users manually enter their PII into web forms. This can potentially speed up the registration or sign-up process.
return the user’s email address to the 3rd party website preventing the user from supplying a fabricated email address during the registration process.
legacy users to link pre-existing site account with their social login account without forcing re- registration.
unintentionally render third party websites useless within certain libraries, schools, or workplaces which block social networking services for productivity reasons.
such as China and its "Golden Shield Project," where the third party website may not be actively censored, but is effectively blocked if a user's social login is blocked.
scanning for high-value transactions, such as in-person withdrawals.
fingerprint scanned by a bank representative.
Bank representative Bank
mechanism?