Rohit	  Ashok	  Khot	  Designing   	  Login Interfaces for Mobiles	  
Abraham	  Lincoln	  &	  Duarte	  “Nearly	  all	  men	  can	  stand	  adversity,	  but	  if	  you	  want	  to	  test	  a	  ...
Roadmap	  	                                                              	  	  	  	  	  	  	     1 2 3                    ...
1            	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	     Why?	  User	  Authen@ca@on	                   ...
Anything	  that	  reduces	  	          Human	  Effort	  and	  saves	                         Time.	  
The	  informa@on	  bubble	             What	  is	  easy	  to	     remember	  ?	  
With	  	      Great	  Power	  comes	          Great	  Responsibility.	  
The	  Web:	  An	  oxymoron	              	                                     	       	     The	  Dream	  	              ...
The	  clear	  and	  present	  danger	   Social	  engineering	         aOacks	       Brute	  Force	           Reply	  aOack...
Easy	  solu@on,	  but	  is	  it	  worth?.	                What	  is	  easy	  to	     remember	  ?	  
1.	  User	  Authen@ca@on	  “The	  problem	  with	  securing	  assets	  and	  their	  func@onality	  is	  that,	  by	  defin...
User	  Authen@ca@on	  
PASSWORDS	                  Benefits	                  •  Simple	  to	  use,	  easy	  to	                       understand....
Passwords:	  Achilles’s	  	  heel	  of	  security	  system	  	  …	  The	  whole	  no@on	  of	  passwords	  is	  based	  on...
 Usability	  of	  PASSWORDS	           Core	  Usability	                        Problems	                        •  Comple...
Complexity:	  Numbers,	  special	  characters,	  Randomiza@on	  	  
Quan@ty:	  Almost	  everyone	  wants	  a	  password.	  
Inconvenience:	  Asterisks	  
?             	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	     Wait…	  	                                    ...
Problem	  1:	  Brute	  force	  and	  Dic@onary	  based	  aOacks	  
Problem	  2:	  Malware	  and	  phishing	  aOacks	  
Problem	  3:	  Shoulder	  surfing	  
A	  day	  at	  the	  ATM	  
We	  are	  being	  watched.	  
?             	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	     Therefore…	  	                               ...
Idea	  1:	  Change	  your	  pet’s	  name	  to	  your	  password.	  	  
Problem:	  Pets	  have	  tendency	  to	  die.	  
Idea	  2:	  Buy	  and	  wear	  a	  password	  vest.	  	  
Problem:	  Emergency	  can	  strike	  at	  any	  @me.	  
Idea	  3:	  Write	  on	  your	  skin	  or	  use	  password	  taOoos.	  
Problem:	  You	  have	  to	  tolerate	  odor	  or	  don’t	  bath.	  
Idea	  4:	  Hire	  a	  password	  manager.	  
Problem:	  Missed	  connec@on.	  
Idea	  5:	  Will	  it	  really	  work?	  
Idea	  6:	  May	  God	  bless	  you	  with	  passwords.	  
?             	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	     	  Can	  we	  balance	  the	  need	  to	     ...
2            	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	     What	  ?	  are	  We	  solving…	               ...
Why	  Mobile?	  
Why	  Mobile?	  
Why	  Mobile?	  
Why	  Mobile?	  
2.	  Designing	  for	  Mobiles	  “Should	  not	  be	  Ad-­‐hoc.” 	  
The	  Advancements	  in	  User	  Interfaces	                               •  Codified	                     CLI	           ...
No	  Advancements	  in	  Login	  Interfaces	                               •  Text	  password	                     CLI	   ...
Problem:	  Fat	  Finger	  problem.	  
Problem:	  Less	  context	  and	  no	  hover	  state.	  
Results:	  Erroneous	  typing	  and	  inaccurate	  clicks.	  
Difficulty	  in	  squeezing	  a	  full	  QWERTY	  keyboard.	                                44	                    44	  
3            	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	     How	  ?	  Can	  we	  Contribute…	             ...
Method	  1:	  Normal	  keyboard	  based	  entry	  
Method	  2:	  Fast	  words	  based	  entry	  
Fast	  words	  
Method	  1:	  Morse	  code	  based	  entry	  
Gmail	  Tap:	  Not	  exactly	  an	  April	  Fool	  
Method	  4:	  Image	  based	  entry	  
Picture	  Superiority	  Effect	              What	  is	  easy	  to	     remember	  ?	  
Have	  you	  seen	  any	  of	  the	  presented	                 images	  before?	  
Recogni@on	  based	  graphical	  passwords	  
Method	  5:	  Gesture	  based	  entry	  
Picture	  Superiority	  Effect	  
?             	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	  	     But	  wait…	  	                              ...
Secure	  systems	  	  that	  people	  use	  Building	       through	  User	  centered	  design.	                          ...
Special	  Thanks	      Dr.	  Ponnurangam	        Kumaraguru	     Par@cipants	  SID,	  IndiaHCI	  commiOee	     Dr.	  Kanna...	  	  	   researcher’s work isAAny Questions???never done!!!
Upcoming SlideShare
Loading in...5

Designing Login Interfaces for Mobiles


Published on

My presentation slides during the workshop on "Designing login interfaces for mobiles" at
IndiaHCI 2012.

Published in: Education, Technology
1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Designing Login Interfaces for Mobiles

  1. 1. Rohit  Ashok  Khot  Designing  Login Interfaces for Mobiles  
  2. 2. Abraham  Lincoln  &  Duarte  “Nearly  all  men  can  stand  adversity,  but  if  you  want  to  test  a  man’s  character,  give  him  power  .”   Point
  3. 3. Roadmap                   1 2 3                             WHY                             WHAT                             HOW                             I  have  story  for  every  step  of  the  way,  so  stay  with  me              
  4. 4. 1                                         Why?  User  Authen@ca@on     Personalized  services  &  ConfidenJal  access              
  5. 5. Anything  that  reduces     Human  Effort  and  saves   Time.  
  6. 6. The  informa@on  bubble   What  is  easy  to   remember  ?  
  7. 7. With     Great  Power  comes   Great  Responsibility.  
  8. 8. The  Web:  An  oxymoron         The  Dream       The  Reality   Web  for  good  things         Web  as  privacy  breach            
  9. 9. The  clear  and  present  danger   Social  engineering   aOacks   Brute  Force   Reply  aOacks   Phishing  aOacks   Malwares   Shoulder-­‐surfing   Key  loggers   Educated  guess  (Dic@onary   based)  aOacks  
  10. 10. Easy  solu@on,  but  is  it  worth?.   What  is  easy  to   remember  ?  
  11. 11. 1.  User  Authen@ca@on  “The  problem  with  securing  assets  and  their  func@onality  is  that,  by  defini@on,  you  don’t  want  to  protect  them  from  everybody.”  –  Bruce  Schneier.  
  12. 12. User  Authen@ca@on  
  13. 13. PASSWORDS   Benefits   •  Simple  to  use,  easy  to   understand.   •  Familiar  to  most  users.   •  Require  no  costly  hardware  or   training.   •  Easy  to  distribute  and  update.   •  No  privacy  worries.    
  14. 14. Passwords:  Achilles’s    heel  of  security  system    …  The  whole  no@on  of  passwords  is  based  on  an  oxymoron:  Having  a  random  string  that  is  easy  to  remember.  
  15. 15.  Usability  of  PASSWORDS   Core  Usability   Problems   •  Complexity.   •  Quan@ty.   •  Inconvenience.  
  16. 16. Complexity:  Numbers,  special  characters,  Randomiza@on    
  17. 17. Quan@ty:  Almost  everyone  wants  a  password.  
  18. 18. Inconvenience:  Asterisks  
  19. 19. ?                                         Wait…     what  about  security  issues?       There  are  in  fact,  a  plenty.                          
  20. 20. Problem  1:  Brute  force  and  Dic@onary  based  aOacks  
  21. 21. Problem  2:  Malware  and  phishing  aOacks  
  22. 22. Problem  3:  Shoulder  surfing  
  23. 23. A  day  at  the  ATM  
  24. 24. We  are  being  watched.  
  25. 25. Covertly…  
  26. 26. ?                                         Therefore…     What  can  We  do  about  it?       Some  interesJng  soluJons                          
  27. 27. Idea  1:  Change  your  pet’s  name  to  your  password.    
  28. 28. Problem:  Pets  have  tendency  to  die.  
  29. 29. Idea  2:  Buy  and  wear  a  password  vest.    
  30. 30. Problem:  Emergency  can  strike  at  any  @me.  
  31. 31. Idea  3:  Write  on  your  skin  or  use  password  taOoos.  
  32. 32. Problem:  You  have  to  tolerate  odor  or  don’t  bath.  
  33. 33. Idea  4:  Hire  a  password  manager.  
  34. 34. Problem:  Missed  connec@on.  
  35. 35. Idea  5:  Will  it  really  work?  
  36. 36. Idea  6:  May  God  bless  you  with  passwords.  
  37. 37. ?                                          Can  we  balance  the  need  to   Remember  the  password  with   the  necessity  of  password  being  as   Random  as  possible?     Let  us  look  into  CogniJve  psychology!                          
  38. 38. 2                                         What  ?  are  We  solving…   What  about  MOBILES                          
  39. 39. Why  Mobile?  
  40. 40. Why  Mobile?  
  41. 41. Why  Mobile?  
  42. 42. Why  Mobile?  
  43. 43. 2.  Designing  for  Mobiles  “Should  not  be  Ad-­‐hoc.”  
  44. 44. The  Advancements  in  User  Interfaces   •  Codified   CLI     •  Strict   •  Metaphor   GUI     •  Exploratory     •  Direct     NUI   •  Intui@ve  
  45. 45. No  Advancements  in  Login  Interfaces   •  Text  password   CLI     •  Text  password   GUI     •  Text  password     NUI  
  46. 46. Problem:  Fat  Finger  problem.  
  47. 47. Problem:  Less  context  and  no  hover  state.  
  48. 48. Results:  Erroneous  typing  and  inaccurate  clicks.  
  49. 49. Difficulty  in  squeezing  a  full  QWERTY  keyboard.   44   44  
  50. 50. 3                                         How  ?  Can  we  Contribute…     EvaluaJon  the  usability  of  five  authenJcaJon   schemes  for  mobiles                          
  51. 51. Method  1:  Normal  keyboard  based  entry  
  52. 52. Method  2:  Fast  words  based  entry  
  53. 53. Fast  words  
  54. 54. Method  1:  Morse  code  based  entry  
  55. 55. Gmail  Tap:  Not  exactly  an  April  Fool  
  56. 56. Method  4:  Image  based  entry  
  57. 57. Picture  Superiority  Effect   What  is  easy  to   remember  ?  
  58. 58. Have  you  seen  any  of  the  presented   images  before?  
  59. 59. Recogni@on  based  graphical  passwords  
  60. 60. Method  5:  Gesture  based  entry  
  61. 61. Picture  Superiority  Effect  
  62. 62. ?                                         But  wait…     There’s  More!     Future  Work!                          
  63. 63. Secure  systems    that  people  use  Building   through  User  centered  design.    
  64. 64. Special  Thanks   Dr.  Ponnurangam   Kumaraguru   Par@cipants  SID,  IndiaHCI  commiOee   Dr.  Kannan  Srinathan   PreCog  Labmates   Mom  and  Dad   Marty  Bucella   Deep@,  Viraj,  Rutuja  
  65. 65.       researcher’s work isAAny Questions???never done!!!
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.