Authenticating with Google Glass Brandon Grey. Google Glass Input  Inputting information into google glass has been limited to either gestures or speech.

Slides:



Advertisements
Similar presentations
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Advertisements

Updating the Ohio Educational Directory. Log in to OEDS by clicking on the Sign In button in the upper left corner of any ODE Web page (
Java Applets:. How Applets differ from application?: They do not use main method but init(), start() and paint() methods of the applet class They can.
Digital Signatures and Hash Functions. Digital Signatures.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
Chameleon: A Novel System for Defending Eavesdropping of Secret Information Saiyma Sarmin Department of Computer.
Two Factor Authentication (TFA) is a 100% Open Source, free to use security system for your Joomla site’s backend. Two Factor Authentication works in.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
1 Section 4.1 Basics of Counting. 2 Basic Counting Principles: Sum Rule Suppose you have two tasks to perform: –The first task can be done in n 1 ways;
is a that allows users to make voice calls software application over the internet. Calls to other users of the service and, in some countries, to free-of-charge.
Building Memory… Day 4 – November 20, Some clean up from last time Applet class can now be run as either an Applet or an Application Made picture.
HumanAUT Secure Human Identification Protocols Adam Bender Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CS 102 Computers In Context (Multimedia)‏ 03 / 25 / 2009 Instructor: Michael Eckmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Authentication System
Support for Palm Pilot Collaboration Including Handwriting Recognition.
Biometrics: Voice Recognition
Asynchronous Web Services Approach Enrique de Andrés Saiz.
Program.-(4)* Write a program for input two integer number with message and display their sum. Algorithm steps Algorithm steps 1.Display message for input.
Authentication Approaches over Internet Jia Li
UniMate Usage Guide SecuTech’s UniMate introductory usage guide, this presentation is intended for new users.
A SECURE RECOGNITION BASED ON GRAPHICAL PASSWORD
GRAPHICAL PASSWORD AUTHENTICATION PRESENTED BY SUDEEP KUMAR PATRA REGD NO Under the guidance of Mrs. Chinmayee Behera.
Article Title: “Token-based Graphical Password Authentication” Authors: John Charles Gyorffy Andrew F. Tappenden James Miller Presenter: Patrick Centanni.
Encryption Objective 1: Explain data encryption procedures.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
Public-Key Cryptography CS110 Fall Conventional Encryption.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
Lieberman Software Random Password Manager & Two-Factor Authentication.
How to Use. How to Scan to your Step 1 :Place the original face-up in the document feeder or face-down on the glass.
LABORATORY DATA MANAGEMENT SYSTEM HARSHIT MAHESHWARI (10290) N V SUBBA RAO (10466) GUIDED BY PROF. T.V. PRABHAKAR.
Multifactor Identification for Internet Banking Citizens State Bank Monticello, Iowa
Variables When programming it is often necessary to store a value for use later on in the program. A variable is a label given to a location in memory.
Please log on The. AN INTRODUCTION TO ‘Python is a high-level, general purpose programming language’ Python is one of the many programming languages.
3D PASSWORD FOR SECURE AUTHENTICATION
Finding Banner Number, Pin, User name, and password Created by Jennifer Toliver Updated: 8/28/2014.
Graphical User Interface You will be used to using programs that have a graphical user interface (GUI). So far you have been writing programs that have.
Georgia Institute of Technology More on Creating Classes part 2 Barb Ericson Georgia Institute of Technology Oct 2005.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
PHP-based Authentication
Dialog Boxes.
Homework #1: C++ Basics, Flow of Control, and Function Basics By J. H. Wang Mar. 13, 2012.
IT Fundamentals1 Input and Output Describe input Input Devices Keyboard entry, pointing devices, scanning devices Image capture, digitizing, audio-input.
(click on item of interest) How to enter web site. How to order a pin number. How to register a project and How to report a project. For Chapter Leaders.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
CUSTOMER ORDERING QUICK REFERENCE GUIDE December 21, 2015.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Special Methods in Java. Mathematical methods The Math library is extensive, has many methods that you can call to aid you in your programming. Math.pow(double.
Login on Laptop, Server or Internet Platform: The user will get a display on his screen of a randomized series of figures. He will subsequently speak.
Introduction Authentication Schemes Functionalities Required 3D Password selection and Input Virtual Environment Design Guidelines Applications Security.
FFT Aspire – The two websites Always use Google Chrome – Internet Explorer can be a problem with Aspire FFT Aspire contains lots of very sensitive pupil.
1a) Explain the use of voice recognition in embedded systems. Embedded systems are devices that contain a microprocessor controlling them Embedded systems.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Time-base One-time Password Eddy Kleinjan, Data Access Europe.
By Hello Team Awesome World™.  To avoid strangers using others’ keys, cards, and passwords to enter the buildings, our team will develop a face recognition-based.
Chp 4: Input and Output Devices
Authentication Schemes for Session Passwords using Color and Images
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Secure graphical password system for high traffic public areas
Use proper case (ie Caps for the beginnings of words)
UNIT R001: Understanding Computer Systems
A Guide to adding Sites and Blocks within ESTATE Manager
REU Summer Research in Computer Security
Agro Hub is a Mobile and web-based Agricultural Value Chain project Monitoring, Evaluation, Data Capturing and Reporting Management Information System.
From Passwords to Public keys Chapter 4 ~ Chapter 6
Input, Variables, and Mathematical Expressions
Presentation transcript:

Authenticating with Google Glass Brandon Grey

Google Glass Input  Inputting information into google glass has been limited to either gestures or speech.  This limits how users can securely put in passwords or PINs  Google glasses unique display of information provides new ways of entering confidential information.

PIN Numbers  One way they came up with to input information was to use a random string of integers.  User would add each digit of his secret PIN to the random string mod 10.  The User would then just speak the pseudo-password.  Example: Secret PIN: 1234 Random Ints: 5920 Correct Entry: 6154

Graphical Passwords  Have users pick from set of images  Identify the correct image  Works with AR glasses because no threat of Shoulder Surfing

Source  Bailey, Daniel, Markus Dürmuth, and Christof Paar. "“Typing” Passwords with Voice Recognition: How to Authenticate to Google Glass." Web. 13 Nov < pdf>.