• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    The Drawbacks Of Cryptography Show That Biometrics Is Becoming Popular.

    2013/9/16 19:57:00 35

    CryptographyTechnologyBiometrics

    < p > < strong > biological recognition favored < /strong > < /p >


    < p > password has a fundamental problem: only when the password is very long, complex, and often changed, can enterprises bring the greatest protection.

    In other words, the effect is best only when employees are most unlikely to remember passwords.

    < /p >


    Less than P, technology companies are scrambling to provide safer and more convenient measures.

    Many notebooks are already equipped with fingerprint sensors.

    Smart phones and other devices have also opened the door to biometrics such as voice and face recognition.

    < /p >


    < p > > a href= "http://www.91se91.com/news/index_q.asp" > Apple < /a > acquired AuthenTec fingerprint sensor technology developer AuthenTec last year, and announced last Tuesday that the new iPhone 5S will have built-in fingerprint sensor.

    Microsoft also said that the Windows 8.1 operating system launched next month will also optimize fingerprint recognition technology.

    The company believes that biometrics will be more widely applied in the system.

    < /p >


    At the same time, Google, PayPal, Lenovo and other companies have jointly established an organization called "fast identity authentication alliance", hoping to set industry standards for biometrics and other forms of "strong certification" mode.

    < /p >


    < p > > a href= "http://zs.sjfzxm.com/" > Google < /a > is trying a new hardware token developed by American Yubico company.

    Like traditional hardware tokens that generate random digital passwords, Yubico devices can also generate temporary passwords to authenticate employee identities.

    < /p >


    < p > however, employees do not need to see the password from the token, and then re enter it. They only need to insert the token through the USB interface into the computer, or use the NFC (near field communication) technology to touch with the mobile device.

    < /p >


    < p > Google is testing this token in its employees, and plans to use it as a safer way to promote users of Gmail and other Google accounts next year.

    < /p >


    < p > Google safety engineering director Maskerk Upadya (Mayank Upadhyay) said that the token is easy to use and has a strong encryption function.

    < /p >


    < p > "we believe that this token has strengthened our safety standards."

    He said.

    This token can be compatible with Google's Chrome < a href= "http://www.91se91.com/news/index_q.asp" > browser < /a >, and can be closely integrated into Google's daily workflow.

    < /p >


    < p > < strong > risk assessment mode < /strong > < /p >.


    < p > another risk assessment based solution is developed by EMC's RSA security department, which has introduced widely used SecurID hardware tokens.

    < /p >


    < p > this technology can carefully analyze the massive user data of various departments in the company, so as to establish a database that stores "normal behavior pattern", and then carries out risk assessment for each user.

    If an employee's behavior is abnormal, such as login from a new location, use different computers or access to his own system, the risk score will increase, and the system will be able to obtain additional certification information to the employee, such as confirming his identity by telephone.

    < /p >


    < p > many people expect that as more and more employees bring their smart phones and other devices to the workplace, the pattern of security will change greatly.

    Although penetration of personal devices is often seen as a major threat, some analysts believe that mobile devices can improve security by simplifying the use of biometric technology, because most phones are equipped with microphones and cameras, and can determine where employees are located.

    {page_break} < /p >


    < p > "we think bio authentication will be very popular in the future, and the trend of development is mobile computing."

    Ante Alan, vice president of Gartner research, an American market research firm, said Ant Allan.

    < /p >


    < p >, he explained, for large enterprises, the cost of equipping new hardware for each employee will incur a high cost, so the ability to make use of the personal equipment of employees will be very attractive.

    In addition, employees with mobile devices may find that fingerprint recognizers are much more useful than memorizing and entering passwords.

    < /p >


    Agnitio, P, Spain, is also exploring new security tools. They have applied speech recognition software to law enforcement operations.

    Using the system developed by the company, employees only need to say a phrase to log in.

    < /p >


    < p > at the same time, PixelPin of London, England wants to replace pictures with passwords.

    For example, you can choose a photo of your spouse, then click on the four positions of his face in order, then you can log on to the system smoothly.

    Geoff Anderson, the company's co-founder, said that photos are easier to remember than words and passwords.

    < /p >


    < p > < strong > thinking code becomes true < /strong > < /p >


    < p > researchers at University of California at Berkeley are studying ways of authenticating identity by means of brain waves.

    Their tests require users to wear a pair of headphones to detect their EEG signals in the scenario where they imagine completing a specific task. The project has reached 99% accuracy in distinguishing different people.

    Theoretically, the EEG released from a task can become a "mental code" for employees.

    < /p >


    < p > most experts expect that enterprises will use different authentication methods.

    For example, the Saratoga hospital in New York used fingerprint reader to replace passwords.

    But Gary Moon, a security analyst at the Academy, said that although they have solved many security problems, fingerprint recognizers sometimes fail.

    Some older employees are hard pressed to put their hands on the fingerprint reader and remain stationary when people wear gloves or fingers too dry.

    Some employees refuse to use fingerprint authentication directly.

    < /p >


    < p > therefore, the Saratoga hospital had to use the cipher as a backup security system.

    < /p >


    < p > there is no universal solution in the field of certification.

    Vance Bjorn (Vance Bjorn) said that the DigitalPersona company he founded provided fingerprint identification for Saratoga hospital.

    He believes that enterprises need to adopt different technologies at the same time in order to adapt to different situations.

    < /p >

    • Related reading

    The Future Of GPS Mobile Location

    Frontier invention
    |
    2013/9/16 19:21:00
    30

    Technology Innovation, Inputting Emotional Cognition Into Mobile Phone Internal Components

    Frontier invention
    |
    2013/9/15 0:28:00
    17

    Cutting-Edge Technology: Cars Coming From The Future

    Frontier invention
    |
    2013/9/15 0:10:00
    24

    New Technology Enables Mobile Phones To Run Without Electricity: Wireless Signals Are Used As Energy Sources.

    Frontier invention
    |
    2013/9/6 22:44:00
    59

    新型酒杯型太陽能衛(wèi)星

    Frontier invention
    |
    2013/9/6 22:42:00
    57
    Read the next article

    It Is Important To Improve The Price Of Brand Clothing.

    Shopping malls are like clouds. Brand clothes are more like clouds, with many styles and varieties. But it is easy for people with a heart to find that the price of a pair of basic leather shoes is almost 1000. It is not difficult to find that real international brands always give a higher price to a higher spirit, so that buyers are willing to pay their pockets.

    主站蜘蛛池模板: 黑人一区二区三区中文字幕| 最新国产精品精品视频| 日本视频免费高清一本18| 国语自产精品视频在线区| 在线播放第一页| 国产乱妇乱子视频在播放| 亚洲日韩AV无码一区二区三区人| 亚洲日韩国产精品无码av| 91精品免费观看| 精品国产理论在线观看不卡| 最近中文字幕免费mv视频7| 国产精品亚洲一区在线播放| 伊人影院中文字幕| 中文字幕在线观看亚洲| 国产精品视频你懂的| 欧美黄色片免费观看| 小sao货水好多真紧h视频| 国产精品jizz在线观看免费| 人人妻人人澡人人爽不卡视频| 中文字幕亚洲综合久久菠萝蜜| 国产一区二区精品久久凹凸| 日韩精品无码一区二区三区| 国产精品多p对白交换绿帽| 伊人久久精品无码麻豆一区| 99久久人妻精品免费一区| 精品国产人成亚洲区| 日本18xxx| 国产人va在线| 久久精品国产亚洲Av麻豆蜜芽| 131美女爱做视频| 欧美黑人xxxx性高清版| 国产精品亚洲精品日韩已方| 么公的又大又深又硬视频| 亚洲欧美日韩人成| 欧美人与动牲高清| 国产精品免费久久久久电影网 | 久久久久久久综合| 黄色免费一级片| 最新欧美一级视频| 国产a级小龙女乱理片| 久久久国产乱子伦精品|