Finger print scanners first appeared in laptops. Now they are common in Smartphones. You can swipe or press your finger against the scanner for authentication. Scanner reads the pattern of ridges and lines using optical sensors, capacitive sensors or ultrasonic sensors, to create a digital copy through a dedicated onboard IC. This copy is then compared with a template stored in a secure area of main processor. In most cases minutiae which are short ridges or points where ridges end or split in two are compared for a match, making process faster and more efficient. Optical sensors take a 2D image of finger print using a camera and LED light and can be easily fooled. Capacitive scanners record the variation in their stored charge as a finger print is scanned which is then converted into a unique digital copy which is extremely tough to imitate. Ultrasonic sensors are even better as they use ultrasonic transceiver to create a detailed 3D print. Apple’s touch ID makes use of capacitive sensors.
Voice patterns are in use as password since a long time, mainly at big banks and large corporations. Now the technology is coming to smartphones and other daily use gadgets. A voice pattern is first registered with the device in digital form detailing unique vocal characteristics of user. Person has to speak the registered password which is processed and compared with the stored template. This early form of voice authentication can be cracked by obtaining user’s speech style, which is why researchers are developing new techniques. In one of these techniques, developed by researchers at Carnegie Melon, user’s voice is converted into data strings and transmitted over the network, which is then used as password for authentication. For extra security, certain data of user’s smartphone is also added to the data string.
Unique facial characteristics of a person can be recorded by 2D or 3D sensors as digital template, which can then be compared each time for authentication. Selfie password tech works this way. User takes a selfie using his smartphone which is compared with template for unique facial characteristics. Process is hassle free, fast, secure and contactless which is why various payment apps including Amazon’s are using it as user authentication tool. Other services are beginning to deploy it as well. Facial recognition tech makes use of various recognition algorithms which are extremely tough to crack.
Iris is the colored circle around pupil of an eye. A person’s iris is unique and therefore can be used to authenticate him in a contactless, hassle free manner. An iris scanner is used to capture still image or video of user’s iris which is then converted into template data using custom algorithms. Each time, a user has to put his eye in front of scanner for authentication. This technology has been miniaturized and will be appearing in smartphones soon. A person’s iris doesn’t changes after 6 months from birth which makes it highly reliable for the purpose of authentication.
Google’s project abacus is about making a record of user’s characteristics such as the way he types, speaks, appears, his online behavior, what apps he uses, to authenticate him. It’s a form of multifactor authentication. Online services have been making use of two factor authentication for a long time. A user enters his password first and then receives a code on his phone, on entering which the authentication process is completed. This authentication method has been made mandatory for financial transactions in many countries. Many online services offer this option for enhanced security of user accounts.
References:
1) https://arxiv.org/ftp/arxiv/papers/1312/1312.7511.pdf
2) https://blog.kaspersky.com/google-projects-soli-jacquard-vault-abacus/9135/
3) http://www.intel.com/content/dam/www/public/us/en/documents/research/2014- vol18-iss-4-intel-technology-journal.pdf
4) https://www.technologyreview.com/s/523371/ces-2014-a-technological-assault- on-the-password/
Image credits goes to respective sources.
No comments:
Post a Comment