SlideShare a Scribd company logo
Universal Login 
Daniel Wilkey 
dgw2109 
Cellular Networks and Mobile Computing 
Spring 2014
Outline 
 Why we hate logins 
 Open ID 
 Universal Login 
 Demo 
 Future Work 
 Questions
Why We Hate Logins 
 Remembering passwords 
 Can I really trust this site? 
 How do they know it’s me? 
 I don’t want to enter my personal information 
 PayPal for credit cards 
 What if someone hacks my account? 
 What if I forget to logout?
Open ID [2007] 
 Make an account with Google/Yahoo/PayPal and use it everywhere 
 Same protocols can be used to verify an account with any identity provider 
 No identifying info needed to create an account (just an email) 
 Little-implemented extension for exchanging attributes (OpenID Attribute 
Exchange) 
 Google does local password / account info save instead 
 Heterogeneous implementations of user profile 
 Does not address the trust issue 
 No banks used Open ID
Universal Login 
 Single, secure* site for user authentication 
 Client app runs on each device and manages security for that device 
 Safe, approval-driven method for exchanging private user data 
 Easy, push-notification-based protocol for managing logged in devices 
 Apps can log out of private screens without refresh and without battery drain 
 Web authentication protocol is proprietary and unpublished, consumer apps 
only know how to communicate with the local client 
 Security standard can be published for all users to review 
 Would not be used for social networking
Universal Login - Architecture 
 Server written with AppEngine 
 Maintains session info, user data 
 Android App client 
 Allows user to sign up, login, logout, and update profile 
 Receives requests from other apps to login / retrieve data 
 Allows user to logout all other devices 
• Listens to push notifications to know when to log out 
• Rebroadcasts server log out notifications so that local apps are aware
Universal Login - Architecture 
 Resource optimized 
 Recipient apps do not need a connection to the remote server (no chance of being sloppy) 
 App login and data fetch are handled with a single request to limit traffic 
 Secure 
 No user data other than session info is saved locally 
 All private data is delivered on demand
Demo 
- Create Account 
 Welcome email sent to 
subscriber
Demo 
- Sign In
Demo 
- User Profile
Demo 
- Sign In / Data Exchange
Demo 
- Multi-Device Logout
Future Work 
 Fix minor* security flaws 
 Introduce means of user identity establishment 
 2-factor authentication 
 MacOS/iOS, Windows OS/Phone, and Linux clients 
 Potentially a web-based client as well 
 Personal data exchange audit log
Questions?

More Related Content

PPT
Street conf overview
PPTX
Creating a Sign On with Open id connect
PPT
Open Id, O Auth And Webservices
PDF
Okta docs
PPTX
SSO introduction
PPTX
Single sign on - benefits, challenges and case study : iFour consultancy
PPTX
Single Sign On Considerations
PDF
Introduction to Solus
Street conf overview
Creating a Sign On with Open id connect
Open Id, O Auth And Webservices
Okta docs
SSO introduction
Single sign on - benefits, challenges and case study : iFour consultancy
Single Sign On Considerations
Introduction to Solus

What's hot (20)

PDF
Single Sign On - The Basics
PPT
Single Sign On - Case Study
PPTX
SSO - Presentation
PPT
ISS SA le presenta IdentityGuard de Entrust
PDF
Sp 29 two_factor_auth_guide
PPTX
IdentiD Biometric Reader
PDF
Session 7 e_raja_kailar
PDF
Single Sign On
PPTX
Authentication vs authorization
PPTX
Single sign on - SSO
PPT
Mashing Up with User-centric Identity
PDF
Securing corporate assets_with_2_fa
PPTX
SINGLE SIGN-ON
PPTX
Secure Code Warrior - Security decisions via untrusted inputs
PPTX
Introduction to OAuth2
PPTX
How Educational Institutions Can Provide Digital Mark Sheets To Students Us...
PPTX
Windows Identity Foundation
PPTX
SPS Belgium 2015 - High-trust Apps for On-Premises Development
PPTX
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...
PPTX
How to deploy SharePoint 2010 to external users?
Single Sign On - The Basics
Single Sign On - Case Study
SSO - Presentation
ISS SA le presenta IdentityGuard de Entrust
Sp 29 two_factor_auth_guide
IdentiD Biometric Reader
Session 7 e_raja_kailar
Single Sign On
Authentication vs authorization
Single sign on - SSO
Mashing Up with User-centric Identity
Securing corporate assets_with_2_fa
SINGLE SIGN-ON
Secure Code Warrior - Security decisions via untrusted inputs
Introduction to OAuth2
How Educational Institutions Can Provide Digital Mark Sheets To Students Us...
Windows Identity Foundation
SPS Belgium 2015 - High-trust Apps for On-Premises Development
MembershipReboot & Thinktecture: The Paradigms in Authentication &Authorizati...
How to deploy SharePoint 2010 to external users?
Ad

Similar to Universal login (20)

PDF
JDD2015: Security in the era of modern applications and services - Bolesław D...
PDF
Internet security
DOCX
ISOL536Security Architecture and DesignWeek 6Web Threa.docx
PPT
Implementing OpenID for Your Social Networking Site
PPTX
RSA Europe: Future of Cloud Identity
PDF
BeamAuth - Two-Factor Web Authentication with a Bookmark
PDF
Mobile Privacy And Security
PPTX
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
PDF
Implementing Microservices Security Patterns & Protocols with Spring
PDF
CNIT 128 Ch 1: The mobile risk ecosystem
PDF
CNIT 128 8: Mobile development security
PDF
Iiw2007b Madsen 01
PDF
OpenID Connect "101" Introduction -- October 23, 2018
PDF
Securing web applications
PDF
Hacking and Securing iOS Applications
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
PPTX
Denver Startup Week '15: Mobile SSO
PDF
OAuth with OAuth.io : solving the OAuth Fragmentation for Identity Management...
PPT
Sousa SAM Presentation
PPT
Oauth2.0
JDD2015: Security in the era of modern applications and services - Bolesław D...
Internet security
ISOL536Security Architecture and DesignWeek 6Web Threa.docx
Implementing OpenID for Your Social Networking Site
RSA Europe: Future of Cloud Identity
BeamAuth - Two-Factor Web Authentication with a Bookmark
Mobile Privacy And Security
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
Implementing Microservices Security Patterns & Protocols with Spring
CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 8: Mobile development security
Iiw2007b Madsen 01
OpenID Connect "101" Introduction -- October 23, 2018
Securing web applications
Hacking and Securing iOS Applications
Hacking and Securing iOS Applications by Satish Bomisstty
Denver Startup Week '15: Mobile SSO
OAuth with OAuth.io : solving the OAuth Fragmentation for Identity Management...
Sousa SAM Presentation
Oauth2.0
Ad

More from Zx MYS (16)

PDF
Bookio report
PPTX
Shopping buddy report
PDF
xkcd viewer report
PPTX
Camevent
PDF
iBoard presentation
PDF
Stay Anonymous app report
PDF
Event Coordinator
PDF
Delicious – A Recipe Share App
PDF
Oculus presentation
PPTX
Cloud-based smart classroom
PDF
a Google Glass app presentation
PDF
Carrier pigeon presentation
PPTX
Columbia connect project rep
PPTX
Hi tune sharing
PPSX
中国愤青群体心理研究 Chinese FenQin(angry youth) mentality (Chinese)
PDF
Sketch of the ZXFS
Bookio report
Shopping buddy report
xkcd viewer report
Camevent
iBoard presentation
Stay Anonymous app report
Event Coordinator
Delicious – A Recipe Share App
Oculus presentation
Cloud-based smart classroom
a Google Glass app presentation
Carrier pigeon presentation
Columbia connect project rep
Hi tune sharing
中国愤青群体心理研究 Chinese FenQin(angry youth) mentality (Chinese)
Sketch of the ZXFS

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles - August'25-Week II
SOPHOS-XG Firewall Administrator PPT.pptx
A comparative analysis of optical character recognition models for extracting...
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Group 1 Presentation -Planning and Decision Making .pptx
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
1. Introduction to Computer Programming.pptx
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
20250228 LYD VKU AI Blended-Learning.pptx
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Universal login

  • 1. Universal Login Daniel Wilkey dgw2109 Cellular Networks and Mobile Computing Spring 2014
  • 2. Outline  Why we hate logins  Open ID  Universal Login  Demo  Future Work  Questions
  • 3. Why We Hate Logins  Remembering passwords  Can I really trust this site?  How do they know it’s me?  I don’t want to enter my personal information  PayPal for credit cards  What if someone hacks my account?  What if I forget to logout?
  • 4. Open ID [2007]  Make an account with Google/Yahoo/PayPal and use it everywhere  Same protocols can be used to verify an account with any identity provider  No identifying info needed to create an account (just an email)  Little-implemented extension for exchanging attributes (OpenID Attribute Exchange)  Google does local password / account info save instead  Heterogeneous implementations of user profile  Does not address the trust issue  No banks used Open ID
  • 5. Universal Login  Single, secure* site for user authentication  Client app runs on each device and manages security for that device  Safe, approval-driven method for exchanging private user data  Easy, push-notification-based protocol for managing logged in devices  Apps can log out of private screens without refresh and without battery drain  Web authentication protocol is proprietary and unpublished, consumer apps only know how to communicate with the local client  Security standard can be published for all users to review  Would not be used for social networking
  • 6. Universal Login - Architecture  Server written with AppEngine  Maintains session info, user data  Android App client  Allows user to sign up, login, logout, and update profile  Receives requests from other apps to login / retrieve data  Allows user to logout all other devices • Listens to push notifications to know when to log out • Rebroadcasts server log out notifications so that local apps are aware
  • 7. Universal Login - Architecture  Resource optimized  Recipient apps do not need a connection to the remote server (no chance of being sloppy)  App login and data fetch are handled with a single request to limit traffic  Secure  No user data other than session info is saved locally  All private data is delivered on demand
  • 8. Demo - Create Account  Welcome email sent to subscriber
  • 10. Demo - User Profile
  • 11. Demo - Sign In / Data Exchange
  • 13. Future Work  Fix minor* security flaws  Introduce means of user identity establishment  2-factor authentication  MacOS/iOS, Windows OS/Phone, and Linux clients  Potentially a web-based client as well  Personal data exchange audit log