Advertisement

Travel Routes or Geography Facts? An Evaluation of Voice Authentication User Interfaces

  • Alina Hang
  • Alexander De Luca
  • Katharina Frison
  • Emanuel von Zezschwitz
  • Massimo Tedesco
  • Marcel Kockmann
  • Heinrich Hussmann
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8119)

Abstract

Fallback authentication based on voice recognition provides several benefits to users. Since it is a biometric method, there are no passwords that have to be remembered. Additionally, the technique can be used remotely without the user having to be physically present. We performed stakeholder interviews and we iteratively designed and evaluated different voice authentication user interfaces with a focus on ease-of-use. The main goal was to keep embarrassment low and to provide an interaction as natural as possible. Our results show that small changes in the interface can significantly influence the users’ opinions about the system.

Keywords

Word Pair Geography Fact Authentication System Stakeholder Interview Travel Route 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Adams, A., Sasse, M.A.: Users Are Not the Enemy. Communications of the ACM 42(12), 40–46 (1999)CrossRefGoogle Scholar
  2. 2.
    Delogu, C., Di Carlo, A., Rotundi, P., Sartori, D.: Usability Evaluation of IVR Systems with DTMF and ASR. In: Proc. of ICSLP 1998 (1998)Google Scholar
  3. 3.
    Dugelay, J.L., Junqua, J.C., Kotropoulos, C., Kuhn, R., Perronnin, F., Pitas, I.: Recent Advances in Biometric Person Authentication. In: IEEE Transactions ICASSP 2002, vol. 4, pp. 4060–4063 (2002)Google Scholar
  4. 4.
    Forrester Consulting. Enhancing Authentication to Secure the Open Enterprise. Whitepaper commissioned by VerySign (Symantec) (2010)Google Scholar
  5. 5.
    Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics 14(1) (2004)Google Scholar
  6. 6.
    Lerer, A., Ward, M., Amarasinghe, S.: Evaluation of IVR Data Collection UIs for Untrained Rural Users. In: Proc. of DEV 2010, pp. 2:1–2:8 (2010)Google Scholar
  7. 7.
    Mannan, M., Barrera, D., Brown, C., Lie, D., van Oorschot, P.: Mercury: Recovering Forgotten Passwords Using Personal Devices. In: Financial Cryptography and Data Security, pp. 315–330 (2012)Google Scholar
  8. 8.
    Pons, A.P., Polak, P.: Understanding User Perspectives on Biometric Technology. Communications of the ACM 51(9), 115–118 (2008)CrossRefGoogle Scholar
  9. 9.
    Rabkin, A.: Personal Knowledge Questions for Fallback Authentication: Security Questions in the Era of Facebook. In: Proc. of SOUPS 2008, pp. 13–23 (2008)Google Scholar
  10. 10.
    Wood, H.M.: The Use of Passwords for Controlling Access to Remote Computer Systems and Services. In: Proc. of AFIP 1977, pp. 27–33 (1977)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Alina Hang
    • 1
  • Alexander De Luca
    • 1
  • Katharina Frison
    • 1
  • Emanuel von Zezschwitz
    • 1
  • Massimo Tedesco
    • 2
  • Marcel Kockmann
    • 2
  • Heinrich Hussmann
    • 1
  1. 1.Media Informatics GroupUniversity of Munich (LMU)Germany
  2. 2.VoiceTrustGermany

Personalised recommendations