Biometric Security with palm

By -

During the Intel Developer Conference 2012 held recently in San Francisco, the company showed in a session some of the security gains that are preparing for the future.

Sridhar Iyengar, director of security research, conducted practical demonstrations, including a device that would replace traditional passwords with a camera: The device works hand closer to your computer or tablet, without even touching it, reading the patterns forming veins in the palms.

This system falls within the category of so-called biometric systems , which uses unique characteristics of individuals to identify positively.

Among these increasingly common methods to identify the best-known are the fingerprint reading irises or voice patterns .

To ‘see’ and check the forms and patterns that are the veins of the hands of the computers need a special camera , it will not be very different from the small webcams currently incorporate all kinds of devices, including mobile phones.

With one hand, simply

These cameras work together with specialized software so that you just need to go hand in front , waving a ‘hello’, for the system to recognize the user.

The system is more accurate than current fingerprint readers

At least that Iyengar taught in one of the demonstrations, saying it is even more accurate than current fingerprint readers.Once the user has been identified, the device can handle it all passwords for the different applications and services to be used on the computer or browsing the Internet banks, and other social networks.

With a simple gesture, such as leaving the tablet on the table, the system would detect that the user has stopped using the device , thanks to the gyroscope and touch screen are almost all built-would terminate the ‘session’ .If re-raise, ask again identification. All this to work depends in part on hardware and software and part of agreements with suppliers and service information.

They will manage the use of these systems to create a sort of ‘seal of security guarantee’ today as VeriSign or transactions offered through Visa or Mastercard, whose icons footnotes provide some assurance to consumers.

The possible privileges under

In the Intel site can access extensive documentation about how the company managessecurity as part of its strategy .

A first approach is what is called the principle of least privilege possible, which is to say that once a user has been identified only needs access to certain data that has privileges but nothing else.

This principle prevents complex situations in which much information is handled, the user often needs no-certain high security data or expose more privacy.

Iyengar gave the example of digital meters for electricity consumption that is already in many homes: if the user loses their password, a malicious attacker could see not only the consumer but also the times when people are at home or the family is on vacation : a potential security problem bigger than if raised otherwise.

In everyday situations where it is difficult to find the balance between security and convenience, as the prototype systems that Intel has introduced a breakthrough may be relevant: what could be more convenient than raising your hand and access without having to remember passwords for all while handling a machine.

He has over 5 years of experience as Online Media and Marketing Consultant, which allow him to enable companies to enhance and meet their Digital marketing goals. He has experience as both in-house and Agency Digital Marketing Experts. Ha has spent the most recent 4 years of his career focusing building Strong terms of Digital Marketing for his clients. In addition to his strengths on Building Brands and Serving Online Marketing strategy for his clients.

Comments are closed.