1 / 25

Authentication on Mobile Devices for Business Application

Authentication on Mobile Devices for Business Application. Fabian Zoller & Martina Müller. Reason Why. Image source : [http :// goo.gl / VYMFN5]. Bring Your Own Device. Image source : [ M.Müller ]. Bring Your Own Device. Image source : [ M.Müller ]. Authentication Methods.

caron
Télécharger la présentation

Authentication on Mobile Devices for Business Application

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

  2. ReasonWhy • Image source: [http://goo.gl/VYMFN5]

  3. Bring YourOwn Device • Image source: [M.Müller]

  4. Bring YourOwn Device • Image source: [M.Müller]

  5. AuthenticationMethods Biometric • Image source: [http://goo.gl/zyjhAl]

  6. AuthenticationMethods Biometric Location www.blog.mobileroudie.com • Image source: [http://goo.gl/yPRdEO]

  7. AuthenticationMethods Biometric Location Knowledge • Image source: [http://goo.gl/Pzd5Pn] www.thebayentrepreneu.com

  8. AuthenticationMethods Biometric Location Knowledge Possession • Image source: [http://goo.gl/6QE7fw] www.flickr.com/photos/code_material

  9. Requirements

  10. Rating Matrix - Results

  11. Prototypes

  12. Showrooms 2. 1. 4. 3. Image sources: [F. Zoller] [http://goo.gl/VqFSQ] [http://goqr.me] [http://goo.gl/bVT8l] [http://goo.gl/Vv2E] [http://goo.gl/wj8Hw]

  13. System Components Untrusted Site Trusted Site (Company) Request Resource Web- / App Server & Agent Response Resource / Deny Client Device Yes / No / Data (Response Decision [Data]) Authentic? (Request Decision [Data]) Directory Server MakeDecision / Prepare Data Image sources: [http://goo.gl/gXoeT] [http://goo.gl/Vv2E]

  14. MobileDesk • Authentication Flow • Select Certificate • ValidateCertificate • EnterGraphical Password • ValidateGraphical Password • Store Token in Directory • Start Web Applicationwith Token Image sources: [F. Zoller]

  15. MobileKey • Authentication Flow • Touch Device with Identity Chip • Validate Identity Chip • EnterCredentials • ValidateCredentials • Store Token in Directory • Start Web Applicationwith Token Image sources: [F. Zoller]

  16. TwoChannel • Authentication Flow • Enter Username • Generate QR-Code • Scan QR-Code • Enter Password • ValidateCredentials • Start Web Application On Mobile Device Image sources: [F. Zoller]

  17. LocationBased • Authentication Flow • Active WLAN • Validate Access Point • Enter PIN • Generate OTP • Enter OTP and PIN • Validate OTP and PIN • Start Web Application On Mobile Device Image sources: [F. Zoller]

  18. Usability Testing - Interrogations • Is there a significant difference between the arithmetic average authentication time? • iPhone + QR-Code (30 sec) • Android+ Mobile Key (37 sec) • Android/iPhone+ Location Based (39 sec)

  19. Usability Testing - Interrogations • Is there a significant difference between the authentication time within the showrooms? • Mobile Key (37 sec) • Location Based (39 sec) • QR-Code (40 sec)

  20. Usability Testing - Interrogations Is there a significant difference between the different operating systems focussing on the success quotient?

  21. AdvisableResults

  22. Questions?

  23. Thankyouforyourattention!

More Related