When and how to authenticate

Citation

Chow, R.; Shi, E. When and how to authenticate. Chapter in The Death of The Internet by Markus Jakobsson to be published in June 2012 by Wiley.

Abstract

Usable authentication on mobile devices faces different challenges compared to traditional computers. For example, due to the constrained user interface, traditional passwords are awkward at best. Auxiliary hardware is generally cumbersome, but even more so for users on the go. We believe in the need for a new approach to authenticating users. Extending the traditional authentication paradigm beyond what you have – what you know – what you are, we propose that what you do is a practical way to control access. We refer to this as implicit authentication, which identifies users by their habits, as opposed to their belongings, memorized data, and biometrics.


Read more from SRI

  • surgeons around a surgical robot

    The SRI research behind today’s surgical robotics

    Intuitive’s da Vinci 5 system represents a major leap in robotic-assisted medicine. It all started at SRI, which continues to advance teleoperation technologies.

  • a collage of digital graphs

    A banner year for quantum

    SRI-managed QED-C’s annual report on quantum trends captures an industry accelerating rapidly from technical promise toward major global impact.

  • ICE Cube containing SRI’s aerogel experiment, photographed prior to launch. Source: Aerospace Applications North America

    An SRI carbon capture experiment launches into space

    By synthesizing carbon-absorbing aerogels in microgravity, SRI research will give us a rare glimpse into how these materials could be radically improved.