Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Designing Login Interfaces for Mobiles

520 views

Published on

My presentation slides during the workshop on "Designing login interfaces for mobiles" at
IndiaHCI 2012.

http://indiahci2012.org/workshops.html

Published in: Education, Technology
  • Be the first to comment

Designing Login Interfaces for Mobiles

  1. 1. Rohit  Ashok  Khot  Designing  Login Interfaces for Mobiles  
  2. 2. Abraham  Lincoln  &  Duarte  “Nearly  all  men  can  stand  adversity,  but  if  you  want  to  test  a  man’s  character,  give  him  power  .”   Point
  3. 3. Roadmap                   1 2 3                             WHY                             WHAT                             HOW                             I  have  story  for  every  step  of  the  way,  so  stay  with  me              
  4. 4. 1                                         Why?  User  Authen@ca@on     Personalized  services  &  ConfidenJal  access              
  5. 5. Anything  that  reduces     Human  Effort  and  saves   Time.  
  6. 6. The  informa@on  bubble   What  is  easy  to   remember  ?  
  7. 7. With     Great  Power  comes   Great  Responsibility.  
  8. 8. The  Web:  An  oxymoron         The  Dream       The  Reality   Web  for  good  things         Web  as  privacy  breach            
  9. 9. The  clear  and  present  danger   Social  engineering   aOacks   Brute  Force   Reply  aOacks   Phishing  aOacks   Malwares   Shoulder-­‐surfing   Key  loggers   Educated  guess  (Dic@onary   based)  aOacks  
  10. 10. Easy  solu@on,  but  is  it  worth?.   What  is  easy  to   remember  ?  
  11. 11. 1.  User  Authen@ca@on  “The  problem  with  securing  assets  and  their  func@onality  is  that,  by  defini@on,  you  don’t  want  to  protect  them  from  everybody.”  –  Bruce  Schneier.  
  12. 12. User  Authen@ca@on  
  13. 13. PASSWORDS   Benefits   •  Simple  to  use,  easy  to   understand.   •  Familiar  to  most  users.   •  Require  no  costly  hardware  or   training.   •  Easy  to  distribute  and  update.   •  No  privacy  worries.    
  14. 14. Passwords:  Achilles’s    heel  of  security  system    …  The  whole  no@on  of  passwords  is  based  on  an  oxymoron:  Having  a  random  string  that  is  easy  to  remember.  
  15. 15.  Usability  of  PASSWORDS   Core  Usability   Problems   •  Complexity.   •  Quan@ty.   •  Inconvenience.  
  16. 16. Complexity:  Numbers,  special  characters,  Randomiza@on    
  17. 17. Quan@ty:  Almost  everyone  wants  a  password.  
  18. 18. Inconvenience:  Asterisks  
  19. 19. ?                                         Wait…     what  about  security  issues?       There  are  in  fact,  a  plenty.                          
  20. 20. Problem  1:  Brute  force  and  Dic@onary  based  aOacks  
  21. 21. Problem  2:  Malware  and  phishing  aOacks  
  22. 22. Problem  3:  Shoulder  surfing  
  23. 23. A  day  at  the  ATM  
  24. 24. We  are  being  watched.  
  25. 25. Covertly…  
  26. 26. ?                                         Therefore…     What  can  We  do  about  it?       Some  interesJng  soluJons                          
  27. 27. Idea  1:  Change  your  pet’s  name  to  your  password.    
  28. 28. Problem:  Pets  have  tendency  to  die.  
  29. 29. Idea  2:  Buy  and  wear  a  password  vest.    
  30. 30. Problem:  Emergency  can  strike  at  any  @me.  
  31. 31. Idea  3:  Write  on  your  skin  or  use  password  taOoos.  
  32. 32. Problem:  You  have  to  tolerate  odor  or  don’t  bath.  
  33. 33. Idea  4:  Hire  a  password  manager.  
  34. 34. Problem:  Missed  connec@on.  
  35. 35. Idea  5:  Will  it  really  work?  
  36. 36. Idea  6:  May  God  bless  you  with  passwords.  
  37. 37. ?                                          Can  we  balance  the  need  to   Remember  the  password  with   the  necessity  of  password  being  as   Random  as  possible?     Let  us  look  into  CogniJve  psychology!                          
  38. 38. 2                                         What  ?  are  We  solving…   What  about  MOBILES                          
  39. 39. Why  Mobile?  
  40. 40. Why  Mobile?  
  41. 41. Why  Mobile?  
  42. 42. Why  Mobile?  
  43. 43. 2.  Designing  for  Mobiles  “Should  not  be  Ad-­‐hoc.”  
  44. 44. The  Advancements  in  User  Interfaces   •  Codified   CLI     •  Strict   •  Metaphor   GUI     •  Exploratory     •  Direct     NUI   •  Intui@ve  
  45. 45. No  Advancements  in  Login  Interfaces   •  Text  password   CLI     •  Text  password   GUI     •  Text  password     NUI  
  46. 46. Problem:  Fat  Finger  problem.  
  47. 47. Problem:  Less  context  and  no  hover  state.  
  48. 48. Results:  Erroneous  typing  and  inaccurate  clicks.  
  49. 49. Difficulty  in  squeezing  a  full  QWERTY  keyboard.   44   44  
  50. 50. 3                                         How  ?  Can  we  Contribute…     EvaluaJon  the  usability  of  five  authenJcaJon   schemes  for  mobiles                          
  51. 51. Method  1:  Normal  keyboard  based  entry  
  52. 52. Method  2:  Fast  words  based  entry  
  53. 53. Fast  words  
  54. 54. Method  1:  Morse  code  based  entry  
  55. 55. Gmail  Tap:  Not  exactly  an  April  Fool  
  56. 56. Method  4:  Image  based  entry  
  57. 57. Picture  Superiority  Effect   What  is  easy  to   remember  ?  
  58. 58. Have  you  seen  any  of  the  presented   images  before?  
  59. 59. Recogni@on  based  graphical  passwords  
  60. 60. Method  5:  Gesture  based  entry  
  61. 61. Picture  Superiority  Effect  
  62. 62. ?                                         But  wait…     There’s  More!     Future  Work!                          
  63. 63. Secure  systems    that  people  use  Building   through  User  centered  design.    
  64. 64. Special  Thanks   Dr.  Ponnurangam   Kumaraguru   Par@cipants  SID,  IndiaHCI  commiOee   Dr.  Kannan  Srinathan   PreCog  Labmates   Mom  and  Dad   Marty  Bucella   Deep@,  Viraj,  Rutuja  
  65. 65. Rohit.a.khot@gmail.com       researcher’s work isAAny Questions???never done!!!

×