Lineup Photo-Based Authentication Using Social Networks Sarita Yardi, Nick Feamster, Amy Bruckman Georgia Institute of Technology {yardi,feamster,asb}@cc.gatech.edu Lineup WOSN Aug 18, 2008
Lineup WOSN Aug 18, 2008
Lineup WOSN Aug 18, 2008
Problem: Access control Lineup WOSN Aug 18, 2008
Our Approach: Lineup User sets access control Client requests authentication System selects one or more photos System generates a “solution” System presents test to user User identifies subjects in photo User is authenticated Lineup WOSN Aug 18, 2008
Key Idea #1: Captchas Lineup WOSN Aug 18, 2008
Key Idea #3: Peer to Peer Authentication Lineup WOSN Aug 18, 2008
Key Idea #3: Crowdsourcing Lineup WOSN Aug 18, 2008
User embeds widget User sets privacy level Client requests access to site Lineup generates photo „test‟ Client solves „test‟ Access granted Lineup WOSN Aug 18, 2008
Lineup high User embeds widget User sets privacy level low Client requests access to site Lineup generates photo „test‟ Client solves „test‟ Access granted Lineup WOSN Aug 18, 2008
Lineup User embeds widget User sets privacy level Client requests access to site Lineup generates photo „test‟ Client solves „test‟ Access granted Lineup WOSN Aug 18, 2008
Lineup User embeds widget User sets privacy level Client requests access to site Lineup generates photo „test‟ Client solves „test‟ Access granted Lineup WOSN Aug 18, 2008
Lineup User embeds widget User sets privacy level Client requests access to site Lineup generates photo „test‟ Client solves „test‟ Access granted Lineup WOSN Aug 18, 2008
Key Idea #4: Trust Lineup WOSN Aug 18, 2008
Challenges: Security Lineup WOSN Aug 18, 2008
Future Directions Lineup WOSN Aug 18, 2008
Recommend
More recommend