SlideShare a Scribd company logo
Technische Universität München

Visual Authentication
A Secure Single Step Authentication for User Authorization

Luis Roalter 1, Matthias Kranz 2, Andreas Möller 1, Stefan Diewald 1,
Tobias Stockinger 2, Marion Koelle 2, Patrick Lindemann 2
1 Technische

Universität München
2 Universität Passau
December 5th 2013

Mobile and Ubiquitous Multimedia (MUM 2013), Luleå, Sweden
Technische Universität München

mobile & usable
security
for interaction with
public terminals
05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

2
Technische Universität München

Current Situation

username 1
password 1

username 2
password 2

username 3
password 3

username 4
password 4

Different credentials

username 5
password 5

05.12.2013

username 6
password 6

username 8
password 8

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

image source: http://commons.wikimedia.org/wiki/File:Singapore_Road_Signs_-_Restrictive_Sign_-_Stop_-_Security_Check.svg

3
Technische Universität München

Federated Authentication: Single Sign-On (SSO)
Related Work
• 

Sign in once to use all services

• 

Single, familiar login mask for
different services, e.g.
–  “Sign in with Facebook”
–  “Sign in with Google”

• 

One username, one password

• 

Improved user experience

Optional: two-factor authentication
with side channel, e.g. mobile phone

05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

4
Technische Universität München

Increased Security: Multi-Factor Authentication
Related Work

05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

image source: Microsoft Office Online Clipart Gallery

5
Technische Universität München

Problems in the Context of Mobile and Usable Security
• 

• 

Security-centered issues
–  Access credentials can be stolen, e .g.
•  man-in-the-middle attack
•  shoulder surfing
•  phishing
as the terminal usually does not authenticate towards the user
–  Trust relationship towards the device might be limited, even if the device
can prove its identity, e.g. if it is a shared device
à lack of trust, reluctant to use services, …
Device-centered issues
–  Limited capabilities of the input device (e.g. no keyboard)
–  Limited ergonomics (e.g. wall-mounted device)
–  hygiene concerns
à time-consuming, uncomfortable, …

05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

6
Technische Universität München

Proposal: Usable Security with Single Step Authentication
sessionID: xyz

05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

image source: Microsoft Office Online Clipart Gallery

7
Technische Universität München

Proposal: Additional Benefits of the Mobile Authenticator
•  User-enabled Session Management
-  Remote session logout
-  Session transfer between systems
•  Maintenance of profile and personal
information
à Transparency to the user (full information)
•  Without mobile authenticator app:
can be used with a web-based interface

05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

8
Technische Universität München

Example Use Case: Room Reservation and Access
• 

Tablet PC as digital door sign for meeting rooms

• 

Provides resource-centred information and access
(e.g. seeing when rooms are occupied or available)

• 

Use case:
Book a room through the public display
–  Need for authentication & authorization
(accounting - who reserved the room?)
–  Single Sign-On with QR code & mobile
(no credentials to type on public display
–  Allows physical room access & usage
(remotely controlled digital door lock)

05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

9
Technische Universität München

Example Use Case: How does it work?
User is scanning a QR code with smartphone
(containing a session token, SID), data sent to IdP
with user credentials (user name & password)
Case 1: Authenticator app installed
•  Credentials (which were previously
stored in app once) and session token
are sent to the service
•  The user is authenticated in one step
Case 2: No authenticator app installed
•  Redirection to a web page where
credentials are entered (securely on
mobile device)
•  The URI is recognized by the tablet and
authenticates the user
05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

10
Technische Universität München

Example Use Case: Initial User Study with “Room Access”
• 

Initial user survey with the prototype system (room access)
–  20 participants (18 males, 2 females) aged between 20 and 64 years
–  (non-balanced, non-representative, not providing statistically usable results)

• 

RQ1: Do users have security concerns when entering
personal credentials on a public display?
–  Participants agreed that they have security concerns entering personal
information on a publicly exposed display
–  Avg. 3.8 on 5-step Likert-Scale (fully disagree = 1, fully agree = 5), SD=1.3

• 

RQ2: Do users have security concerns when using the smartphone-based
visual authentication system in conjunction with a public display?
–  Participants agreed that they have security concerns in the smartphonebased authentication approach
–  Avg. 2.3 on 5-step Likert-Scale (fully disagree = 1, fully agree = 5), SD=1.4

05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

11
Technische Universität München

Summary and Discussion
Proposed approach for “mobile usable security” providing user-friendly multifactor authentication in a public-private device scenario, addressing
•  input modalities and device
(replacing potentially non-convenient input methods, hygiene aspects, …)
•  security issues
(SSO with side-channel authentication, prohibiting shoulder surfing, phishing
attacks, potential to de-authenticate sessions remotely, trusted …)
•  usability aspects
(less error-prone, faster, more convenient, …)
Open Issues
•  Multiple identity providers require pre-established trust relationships
•  Network connection for side-channel/multi-factor authentication needed
•  Shift of responsibility to the user (non-expert in security issues)
•  Device-to-device communication problems (visible lighting, (audible) noise, …)
05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

12
Technische Universität München

Outlook and Future Work
• 

• 

• 

Technical enhancement
–  Pluggable Authentication Module (QR code-based PAM module) for PC login
–  Transfer of running sessions and their contexts between terminals
Usability evaluation and user study
–  Acceptance and usability tests
•  in a real-world deployment
•  w.r.t. long-term effects on usable security
–  Investigation of novel applications and domains and scenario-specific
potentials (public displays, distributed environments, internet of things)
Security evaluation
–  Resistance to man-in-the-middle/replay attacks
–  Simulate different hacking scenarios
–  Creation of an overall security concept
–  Extended information (e.g. WLAN AP scan, GPS, etc. to detect “fakes”)

05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

13
Technische Universität München

Thank you very much for your kind attention!
Questions?

?
?
Contact:
Luis Roalter (roalter@tum.de)
Matthias Kranz (matthias.kranz@uni-passau.de)
05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

14
Technische Universität München

Citation Information
• 

Please cite this work as follows:
L. Roalter, M. Kranz, A. Möller, S. Diewald, T. Stockinger, M. Koelle, P. Lindemann: Visual
Authentication - A Secure Single Step Authentication for User Authorization. In: Proceedings of the
12th International Conference on Mobile and Ubiquitous Multimedia (MUM 2013), Luleå, Sweden,
2013

• 

Please use the following BibTex file:
@inproceedings{MUM2013Roalter,

author = {Roalter, Luis and Kranz, Matthias and M"{o}ller, Andreas and Diewald,
Stefan and Stockinger, Tobias and Koelle, Marion and Lindemann, Patrick},

title = {Visual Authentication – A Secure Single Step Authentication for User
Authorization},

booktitle = {Proceedings of the 12th International Conference on Mobile and Ubiquitous
Multimedia},

series = {MUM '13},

year = {2013},

location = {Luleaa, Sweden},

publisher = {ACM},

address = {New York, NY, USA},

} "

05.12.2013

MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization

15

More Related Content

PDF
Privacy and Security in Multi-modal User Interface Modeling for Social Media
PDF
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
PDF
The Healthcare and Motivation Seat - A Survey with the GewoS Chair
PDF
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
PDF
The Smartphone as Mobile Authorization Proxy
PDF
PSCR 2019 - ICAM Standards
PDF
SmartCard Forum 2009 - New trends in smart-cards technology
PDF
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
Privacy and Security in Multi-modal User Interface Modeling for Social Media
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
The Healthcare and Motivation Seat - A Survey with the GewoS Chair
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
The Smartphone as Mobile Authorization Proxy
PSCR 2019 - ICAM Standards
SmartCard Forum 2009 - New trends in smart-cards technology
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES

Similar to Visual Authentication - A Secure Single Step Authentication for User Authorization (18)

PPTX
Behavioral biometrics mechanism for delaying password obsolescence
PDF
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
PPT
User & Mobile Centric Identity
PDF
2010 Biometrics Conf: Biometrics, From High-Stakes Exams To Loyalty Cards
PDF
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
PPTX
Sxsw ppt voice-1
PPTX
Presentation of website analytics in webi
PDF
Continuous and Transparent User Identity Verification for Secure Internet Ser...
PPT
User authentication trends
PDF
Linas Eriksonas, Market for mobile biometrics
PDF
Security & Seamless CX in User Authentication: How to Achieve Both?
PDF
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
PDF
ndia2010biometricsconferencehighstakesexamstoloyaltycards-12672795325078-phpa...
PPTX
3dpassword ppt-120815070434-phpapp02
PDF
Access Control
PDF
Smart-Authentication: A secure web service for providing bus pass renewal system
PPT
Mobile phone as Trusted identity assistant
PDF
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Behavioral biometrics mechanism for delaying password obsolescence
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
User & Mobile Centric Identity
2010 Biometrics Conf: Biometrics, From High-Stakes Exams To Loyalty Cards
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
Sxsw ppt voice-1
Presentation of website analytics in webi
Continuous and Transparent User Identity Verification for Secure Internet Ser...
User authentication trends
Linas Eriksonas, Market for mobile biometrics
Security & Seamless CX in User Authentication: How to Achieve Both?
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
ndia2010biometricsconferencehighstakesexamstoloyaltycards-12672795325078-phpa...
3dpassword ppt-120815070434-phpapp02
Access Control
Smart-Authentication: A secure web service for providing bus pass renewal system
Mobile phone as Trusted identity assistant
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Ad

More from Distributed Multimodal Information Processing Group (15)

PDF
Experimental Evaluation of User Interfaces for Visual Indoor Navigation
PDF
Mit mobilem Lernen zur erweiterten Methodenkompetenz
PDF
Investigating Self-Reporting Behavior in Long-Term Studies
PDF
Decision-Point Panorama-Based Indoor Navigation
PDF
Towards a Holistic Approach for Mobile Application Development in Intelligent...
PDF
GymSkill - A Personal Trainer for Physical Exercises
PDF
DriveAssist – A V2X-Based Driver Assistance System for Android
PDF
Distributed Networks within ROS: Challenges and Possibilities
PDF
Tool Support for Prototyping Interfaces
PDF
Update Behavior in App Markets and Security Implications: A Case Study in Goo...
PDF
MobiliNet: A Social Network for Optimized Mobility
PDF
Gamification-supported Exploration of Natural User Interfaces
PDF
MobiDics: Cooperative Mobile e-Learning for Teachers
PDF
A Mobile Indoor Navigation System Interface Adapted to Vision-Based Localization
PDF
MobiMed: Comparing Object Identification Techniques on Smartphones
Experimental Evaluation of User Interfaces for Visual Indoor Navigation
Mit mobilem Lernen zur erweiterten Methodenkompetenz
Investigating Self-Reporting Behavior in Long-Term Studies
Decision-Point Panorama-Based Indoor Navigation
Towards a Holistic Approach for Mobile Application Development in Intelligent...
GymSkill - A Personal Trainer for Physical Exercises
DriveAssist – A V2X-Based Driver Assistance System for Android
Distributed Networks within ROS: Challenges and Possibilities
Tool Support for Prototyping Interfaces
Update Behavior in App Markets and Security Implications: A Case Study in Goo...
MobiliNet: A Social Network for Optimized Mobility
Gamification-supported Exploration of Natural User Interfaces
MobiDics: Cooperative Mobile e-Learning for Teachers
A Mobile Indoor Navigation System Interface Adapted to Vision-Based Localization
MobiMed: Comparing Object Identification Techniques on Smartphones
Ad

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PPTX
Spectroscopy.pptx food analysis technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Machine Learning_overview_presentation.pptx
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Spectroscopy.pptx food analysis technology
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Programs and apps: productivity, graphics, security and other tools
A comparative analysis of optical character recognition models for extracting...
Spectral efficient network and resource selection model in 5G networks
Assigned Numbers - 2025 - Bluetooth® Document
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MIND Revenue Release Quarter 2 2025 Press Release
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Machine Learning_overview_presentation.pptx

Visual Authentication - A Secure Single Step Authentication for User Authorization

  • 1. Technische Universität München Visual Authentication A Secure Single Step Authentication for User Authorization Luis Roalter 1, Matthias Kranz 2, Andreas Möller 1, Stefan Diewald 1, Tobias Stockinger 2, Marion Koelle 2, Patrick Lindemann 2 1 Technische Universität München 2 Universität Passau December 5th 2013 Mobile and Ubiquitous Multimedia (MUM 2013), Luleå, Sweden
  • 2. Technische Universität München mobile & usable security for interaction with public terminals 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 2
  • 3. Technische Universität München Current Situation username 1 password 1 username 2 password 2 username 3 password 3 username 4 password 4 Different credentials username 5 password 5 05.12.2013 username 6 password 6 username 8 password 8 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization image source: http://commons.wikimedia.org/wiki/File:Singapore_Road_Signs_-_Restrictive_Sign_-_Stop_-_Security_Check.svg 3
  • 4. Technische Universität München Federated Authentication: Single Sign-On (SSO) Related Work •  Sign in once to use all services •  Single, familiar login mask for different services, e.g. –  “Sign in with Facebook” –  “Sign in with Google” •  One username, one password •  Improved user experience Optional: two-factor authentication with side channel, e.g. mobile phone 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 4
  • 5. Technische Universität München Increased Security: Multi-Factor Authentication Related Work 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization image source: Microsoft Office Online Clipart Gallery 5
  • 6. Technische Universität München Problems in the Context of Mobile and Usable Security •  •  Security-centered issues –  Access credentials can be stolen, e .g. •  man-in-the-middle attack •  shoulder surfing •  phishing as the terminal usually does not authenticate towards the user –  Trust relationship towards the device might be limited, even if the device can prove its identity, e.g. if it is a shared device à lack of trust, reluctant to use services, … Device-centered issues –  Limited capabilities of the input device (e.g. no keyboard) –  Limited ergonomics (e.g. wall-mounted device) –  hygiene concerns à time-consuming, uncomfortable, … 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 6
  • 7. Technische Universität München Proposal: Usable Security with Single Step Authentication sessionID: xyz 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization image source: Microsoft Office Online Clipart Gallery 7
  • 8. Technische Universität München Proposal: Additional Benefits of the Mobile Authenticator •  User-enabled Session Management -  Remote session logout -  Session transfer between systems •  Maintenance of profile and personal information à Transparency to the user (full information) •  Without mobile authenticator app: can be used with a web-based interface 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 8
  • 9. Technische Universität München Example Use Case: Room Reservation and Access •  Tablet PC as digital door sign for meeting rooms •  Provides resource-centred information and access (e.g. seeing when rooms are occupied or available) •  Use case: Book a room through the public display –  Need for authentication & authorization (accounting - who reserved the room?) –  Single Sign-On with QR code & mobile (no credentials to type on public display –  Allows physical room access & usage (remotely controlled digital door lock) 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 9
  • 10. Technische Universität München Example Use Case: How does it work? User is scanning a QR code with smartphone (containing a session token, SID), data sent to IdP with user credentials (user name & password) Case 1: Authenticator app installed •  Credentials (which were previously stored in app once) and session token are sent to the service •  The user is authenticated in one step Case 2: No authenticator app installed •  Redirection to a web page where credentials are entered (securely on mobile device) •  The URI is recognized by the tablet and authenticates the user 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 10
  • 11. Technische Universität München Example Use Case: Initial User Study with “Room Access” •  Initial user survey with the prototype system (room access) –  20 participants (18 males, 2 females) aged between 20 and 64 years –  (non-balanced, non-representative, not providing statistically usable results) •  RQ1: Do users have security concerns when entering personal credentials on a public display? –  Participants agreed that they have security concerns entering personal information on a publicly exposed display –  Avg. 3.8 on 5-step Likert-Scale (fully disagree = 1, fully agree = 5), SD=1.3 •  RQ2: Do users have security concerns when using the smartphone-based visual authentication system in conjunction with a public display? –  Participants agreed that they have security concerns in the smartphonebased authentication approach –  Avg. 2.3 on 5-step Likert-Scale (fully disagree = 1, fully agree = 5), SD=1.4 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 11
  • 12. Technische Universität München Summary and Discussion Proposed approach for “mobile usable security” providing user-friendly multifactor authentication in a public-private device scenario, addressing •  input modalities and device (replacing potentially non-convenient input methods, hygiene aspects, …) •  security issues (SSO with side-channel authentication, prohibiting shoulder surfing, phishing attacks, potential to de-authenticate sessions remotely, trusted …) •  usability aspects (less error-prone, faster, more convenient, …) Open Issues •  Multiple identity providers require pre-established trust relationships •  Network connection for side-channel/multi-factor authentication needed •  Shift of responsibility to the user (non-expert in security issues) •  Device-to-device communication problems (visible lighting, (audible) noise, …) 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 12
  • 13. Technische Universität München Outlook and Future Work •  •  •  Technical enhancement –  Pluggable Authentication Module (QR code-based PAM module) for PC login –  Transfer of running sessions and their contexts between terminals Usability evaluation and user study –  Acceptance and usability tests •  in a real-world deployment •  w.r.t. long-term effects on usable security –  Investigation of novel applications and domains and scenario-specific potentials (public displays, distributed environments, internet of things) Security evaluation –  Resistance to man-in-the-middle/replay attacks –  Simulate different hacking scenarios –  Creation of an overall security concept –  Extended information (e.g. WLAN AP scan, GPS, etc. to detect “fakes”) 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 13
  • 14. Technische Universität München Thank you very much for your kind attention! Questions? ? ? Contact: Luis Roalter (roalter@tum.de) Matthias Kranz (matthias.kranz@uni-passau.de) 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 14
  • 15. Technische Universität München Citation Information •  Please cite this work as follows: L. Roalter, M. Kranz, A. Möller, S. Diewald, T. Stockinger, M. Koelle, P. Lindemann: Visual Authentication - A Secure Single Step Authentication for User Authorization. In: Proceedings of the 12th International Conference on Mobile and Ubiquitous Multimedia (MUM 2013), Luleå, Sweden, 2013 •  Please use the following BibTex file: @inproceedings{MUM2013Roalter,
 author = {Roalter, Luis and Kranz, Matthias and M"{o}ller, Andreas and Diewald, Stefan and Stockinger, Tobias and Koelle, Marion and Lindemann, Patrick},
 title = {Visual Authentication – A Secure Single Step Authentication for User Authorization},
 booktitle = {Proceedings of the 12th International Conference on Mobile and Ubiquitous Multimedia},
 series = {MUM '13},
 year = {2013},
 location = {Luleaa, Sweden},
 publisher = {ACM},
 address = {New York, NY, USA},
 } " 05.12.2013 MUM 2013 Presentation: Visual Authentication – A Secure Single Step Authentication for User Authorization 15