Presentation is loading. Please wait.

Presentation is loading. Please wait.

Going beyond passwords

Similar presentations


Presentation on theme: "Going beyond passwords"— Presentation transcript:

1 Going beyond passwords
Authentication II Going beyond passwords

2 Agenda Announcements Biometrics Physical devices
General authentication

3 Biometrics Biometrics is the comparison of live anatomical, physiological, or behavior characteristics to the stored template of a person. Physiological: Fingerprint, hand or finger geometry Patterns of retina, veins, irises, faces Behavioral: Signature Voice keypresses See for lists of vendors

4 Potential Advantages Eliminates certain password problems – difficult to share, misplace, and forge Convenient and potentially easy to use no remembering nothing physical to forget or misplace Improve access speed Reduces cost within organizations: eliminates passwords which are expensive to maintain and secure Increase security: eliminates the sharing of passwords, deters and detects fraudulent account access, and improves physical security. Competitive advantage: applications demand advanced technology Convenience to employees: passwords tend to be overwhelming, biometrics eliminates the need to memorize or reset passwords, while speeding up login Non-repudiation: transactions are difficult to negate

5 Authentication Identification vs. Verification
Question: what’s the difference?

6 Biometrics process Enrollment Use Acquisition Creation of template
Storage of template Use Acquisition(s) Comparison Decision

7 Performance metrics FTE – Failure To Enroll FTA – Failure To Accept
FAR – False Acceptance Rates FRR – False Reject Rates Common goal: FAR = FRR. Why?

8 Fingerprints Traditionally used in law enforcement and border control for identification Many uses Walt Disney World Payment systems – example: BioPay in North Carolina Variety of cheap devices available

9 Recognition Current technology Identify patterns Or Identify minutae
Optical Ultrasonic Capacitance Identify patterns Loops, whirls Or Identify minutae Ridge endings, etc. Optical – takes a digital image disadv., scratched, dirty surface causes bad image; easily fooled with pictures Ultrasonic – hig hfrequency sound waves, doesn’t need clean sensing surface Capacitance – measure ridge patterns, eliminates need for clean sensing surface

10 Fingerprints Advantages Disadvantages Long history of use
Unique and permanent Variety of cheap technologies Reasonable performance Disadvantages Association with law enforcement Quality of prints vary with race, age, environmental factors Dirt & grime Placement of finger can be important Can be easy to circumvent

11 Face recognition Select facial features from images and compare
Variety of environments Search for criminals in crowds (airports, large events) Border control & passports Casinos

12 Face recognition Advantages Disadvantages Universal More acceptable?
Indoor and outdoor use reasonable Easy to perform without awareness Disadvantages Requires straight on, neutral expression Photos can circumvent Accuracy is still a problem

13 Iris Recognition Unique patterns in the iris – iris code
Currently lowest false accept rates Can be used in variety of environments BUT Requires good image from cooperative user

14 Voice Recognition Speech input Easy deployment Frequency Duration
Cadence Easy deployment Microphones easy to install Gathering voice can be done unobtrusively

15 Voice recognition Background and ambient noise is a huge problem
Templates are large compared to other biometrics Longer enrollment time (training) Recording may be an issue

16 Keystroke biometrics Keypress timings or pressure Advantages:
Easily used in conjunction with computer-based passwords Can be gathered automatically Disadvantages: Not very unique or permanent Can listen to keyboard typing to determine Can be used to infer password

17 Other techniques Hand geometry Retinal scans Signature Hand veins Odor
Gait Ear DNA

18 General requirements Universality Distinctiveness Permanence
Collectability Performance Acceptability Circumvention Question: What other usability requirements?

19 Comparison Face Fingerprint Iris Voice Keyboard Universality
Distinctiveness Collectability Performance Acceptability Circumvention

20 Security Considerations
Biometrics are not secrets and are therefore susceptible to modified or spoofed measurements There is no recourse for revoking a compromised identifier Strategic Solutions Liveness testing Multi-biometrics Liveness testing: ensures input measurements are not originating from inanimate objects Multi-biometrics: fusing multiple and independent biometric identifiers

21 Privacy Considerations
A reliable biometric system provides an irrefutable proof of identity Threatens individuals right to anonymity Cultural or religious concerns Violates civil liberties Strategic Solutions Biometric cryptosystems Transparency Threatens individuals right to anonymity People believe that control and use of the human body is a violation of moral tenets, religious beliefs, and civil liberties. Strategic Solutions Biometric cryptosystems – generation of cryptographic keys based on biometric samples Transparency – failing to store any actual images

22 Other issues Exception handling Time consuming enrollment
Sociological concerns Cause personal harm or endangerment? Cultural or religious opposition Comparing systems in the real world User training Comfort with technology and methods Experience of specific device

23 Questions Where would you like to see biometrics used?
In what situations would it be inappropriate? How and when to offer user training?

24 Physical devices “What you have…” piece of the puzzle Typical example:
ATM cards Public transportation cards

25 Technologies Smart cards USB Cell phones OTP tokens

26 Comparisons Advantages? Disadvantages? User issues:
Acquiring the device (expense, time) Installing and connecting it properly Loss or failure of device

27 Usability study Motivation: compare alternative forms of cryptographic smart cards Question: which device is faster and easier to use in a mobile setting? Method: Within subjects user study with 3 devices task adapted from Johnny Can’t Encrypt Testing mobility by changing computers Debriefing questionnaire for user impressions

28 Results USB tokens faster to use USB token users made fewer errors
Smart card has poor feedback for inserting card USB token means no separate installation – device already plugged in Added value helps users care about them more

29 Questions Is it possible to have authorization without identification?
How would you increase acceptance of biometric systems? Are there any current password systems that you would like to replace with a biometric or hardware scheme? Why? How would you design a study to test the usability and utility of a laptop fingerprint reader?

30

31 Let’s compare Paypal: (user id) + strong password, challenge questions + for password recovery + OTP, defaults to password if token lost + fingerprint, defaults to password if reader unavailable

32 Evaluation Accessibility Memorability Security Cost
Depth of processing, retrieval, meaningfulness Security Predictability, abundance, disclosure, crackability, confidentiality Cost Environmental considerations Range of users, frequency of use, type of access, etc.


Download ppt "Going beyond passwords"

Similar presentations


Ads by Google