Bootstrapping Mobile PINs Using Passwords
نویسندگان
چکیده
We describe a method of deriving PINs from passwords. The method is useful to obtain friction-free user onboarding to mobile platforms. It has significant business benefits to organizations that wish to introduce mobile apps to existing users – but which are reluctant to make the users authenticate with passwords. From the user’s perspective, a PIN is easier to enter than a password, and a derived PIN does not need to be remembered – assuming the user can recall her password. The use of tiered authentication – relying on both PINs and passwords – hardens systems against compromise. This is because transactions relying on PINs can have lower transaction limits and flagging thresholds than transactions authenticated using passwords. Even though our PINs are derived from passwords, they do not contain sufficient information about the passwords to make the passwords easy to infer from compromised PINs. We quantify exactly how much information about the passwords and the derived PINs contain, and how much information is lost – based on reallife password distributions. We also assess the usability of the proposed method using one 25-subject qualitative study and one 100-subject quantitative study. Keywords-bootstrapping, dropbox, entropy, malware, password, PIN.
منابع مشابه
UBMITTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF Doctor of Philosophy S CHOOL
Mobile devices have consistently advanced in terms of processing power, amount of memory and functionality. With these advances, the ability to store potentially private or sensitive information on them has increased. Traditional methods for securing mobile devices, passwords and PINs, are inadequate given their weaknesses and the bursty use patterns that characterize mobile devices. Passwords ...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملImplicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication authenticating users based on behavior patterns. We describe our model for perfor...
متن کاملThe Mobile Browser as a Web-Based Platform for Identity
Mobile devices have long been considered useful in bootstrapping authentication via other channels, including the web. As mobile devices begin to include complete web browsers, there is an opportunity to standardize a simple, web-based mobile authentication technique, both for devices themselves and for desktop access using the mobile device as a secondary channel. The path to better authentica...
متن کاملGesture-based User Authentication for Mobile Devicesusing Accelerometer and Gyroscope
In this paper a user authentication mechanism for handheld mobile devices using hand gestures is presented. To authenticate a prior chosen hand gesture needs to be repeated. The mobile device uses a 3D-accelerometer and a 3D-gyroscope to measure the resulting device movement. With a user study it was shown, that the presented approach is feasible and has advantages with regard to usability over...
متن کامل