• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    The Drawbacks Of Cryptography Show That Biometrics Is Becoming Popular.

    2013/9/16 19:57:00 35

    CryptographyTechnologyBiometrics

    < p > < strong > biological recognition favored < /strong > < /p >


    < p > password has a fundamental problem: only when the password is very long, complex, and often changed, can enterprises bring the greatest protection.

    In other words, the effect is best only when employees are most unlikely to remember passwords.

    < /p >


    Less than P, technology companies are scrambling to provide safer and more convenient measures.

    Many notebooks are already equipped with fingerprint sensors.

    Smart phones and other devices have also opened the door to biometrics such as voice and face recognition.

    < /p >


    < p > > a href= "http://www.91se91.com/news/index_q.asp" > Apple < /a > acquired AuthenTec fingerprint sensor technology developer AuthenTec last year, and announced last Tuesday that the new iPhone 5S will have built-in fingerprint sensor.

    Microsoft also said that the Windows 8.1 operating system launched next month will also optimize fingerprint recognition technology.

    The company believes that biometrics will be more widely applied in the system.

    < /p >


    At the same time, Google, PayPal, Lenovo and other companies have jointly established an organization called "fast identity authentication alliance", hoping to set industry standards for biometrics and other forms of "strong certification" mode.

    < /p >


    < p > > a href= "http://zs.sjfzxm.com/" > Google < /a > is trying a new hardware token developed by American Yubico company.

    Like traditional hardware tokens that generate random digital passwords, Yubico devices can also generate temporary passwords to authenticate employee identities.

    < /p >


    < p > however, employees do not need to see the password from the token, and then re enter it. They only need to insert the token through the USB interface into the computer, or use the NFC (near field communication) technology to touch with the mobile device.

    < /p >


    < p > Google is testing this token in its employees, and plans to use it as a safer way to promote users of Gmail and other Google accounts next year.

    < /p >


    < p > Google safety engineering director Maskerk Upadya (Mayank Upadhyay) said that the token is easy to use and has a strong encryption function.

    < /p >


    < p > "we believe that this token has strengthened our safety standards."

    He said.

    This token can be compatible with Google's Chrome < a href= "http://www.91se91.com/news/index_q.asp" > browser < /a >, and can be closely integrated into Google's daily workflow.

    < /p >


    < p > < strong > risk assessment mode < /strong > < /p >.


    < p > another risk assessment based solution is developed by EMC's RSA security department, which has introduced widely used SecurID hardware tokens.

    < /p >


    < p > this technology can carefully analyze the massive user data of various departments in the company, so as to establish a database that stores "normal behavior pattern", and then carries out risk assessment for each user.

    If an employee's behavior is abnormal, such as login from a new location, use different computers or access to his own system, the risk score will increase, and the system will be able to obtain additional certification information to the employee, such as confirming his identity by telephone.

    < /p >


    < p > many people expect that as more and more employees bring their smart phones and other devices to the workplace, the pattern of security will change greatly.

    Although penetration of personal devices is often seen as a major threat, some analysts believe that mobile devices can improve security by simplifying the use of biometric technology, because most phones are equipped with microphones and cameras, and can determine where employees are located.

    {page_break} < /p >


    < p > "we think bio authentication will be very popular in the future, and the trend of development is mobile computing."

    Ante Alan, vice president of Gartner research, an American market research firm, said Ant Allan.

    < /p >


    < p >, he explained, for large enterprises, the cost of equipping new hardware for each employee will incur a high cost, so the ability to make use of the personal equipment of employees will be very attractive.

    In addition, employees with mobile devices may find that fingerprint recognizers are much more useful than memorizing and entering passwords.

    < /p >


    Agnitio, P, Spain, is also exploring new security tools. They have applied speech recognition software to law enforcement operations.

    Using the system developed by the company, employees only need to say a phrase to log in.

    < /p >


    < p > at the same time, PixelPin of London, England wants to replace pictures with passwords.

    For example, you can choose a photo of your spouse, then click on the four positions of his face in order, then you can log on to the system smoothly.

    Geoff Anderson, the company's co-founder, said that photos are easier to remember than words and passwords.

    < /p >


    < p > < strong > thinking code becomes true < /strong > < /p >


    < p > researchers at University of California at Berkeley are studying ways of authenticating identity by means of brain waves.

    Their tests require users to wear a pair of headphones to detect their EEG signals in the scenario where they imagine completing a specific task. The project has reached 99% accuracy in distinguishing different people.

    Theoretically, the EEG released from a task can become a "mental code" for employees.

    < /p >


    < p > most experts expect that enterprises will use different authentication methods.

    For example, the Saratoga hospital in New York used fingerprint reader to replace passwords.

    But Gary Moon, a security analyst at the Academy, said that although they have solved many security problems, fingerprint recognizers sometimes fail.

    Some older employees are hard pressed to put their hands on the fingerprint reader and remain stationary when people wear gloves or fingers too dry.

    Some employees refuse to use fingerprint authentication directly.

    < /p >


    < p > therefore, the Saratoga hospital had to use the cipher as a backup security system.

    < /p >


    < p > there is no universal solution in the field of certification.

    Vance Bjorn (Vance Bjorn) said that the DigitalPersona company he founded provided fingerprint identification for Saratoga hospital.

    He believes that enterprises need to adopt different technologies at the same time in order to adapt to different situations.

    < /p >

    • Related reading

    The Future Of GPS Mobile Location

    Frontier invention
    |
    2013/9/16 19:21:00
    30

    Technology Innovation, Inputting Emotional Cognition Into Mobile Phone Internal Components

    Frontier invention
    |
    2013/9/15 0:28:00
    17

    Cutting-Edge Technology: Cars Coming From The Future

    Frontier invention
    |
    2013/9/15 0:10:00
    24

    New Technology Enables Mobile Phones To Run Without Electricity: Wireless Signals Are Used As Energy Sources.

    Frontier invention
    |
    2013/9/6 22:44:00
    59

    新型酒杯型太陽能衛(wèi)星

    Frontier invention
    |
    2013/9/6 22:42:00
    57
    Read the next article

    It Is Important To Improve The Price Of Brand Clothing.

    Shopping malls are like clouds. Brand clothes are more like clouds, with many styles and varieties. But it is easy for people with a heart to find that the price of a pair of basic leather shoes is almost 1000. It is not difficult to find that real international brands always give a higher price to a higher spirit, so that buyers are willing to pay their pockets.

    主站蜘蛛池模板: 一级全免费视频播放| 小箩莉奶水四溅小说| 好大好深好猛好爽视频免费| 国产乱妇无码大片在线观看| 久久天天躁狠狠躁夜夜不卡| 麻豆福利在线观看| 欧洲亚洲国产精华液| 国产精品99在线观看| 亚洲va久久久噜噜噜久久| 亚洲综合色区中文字幕| 最新精品亚洲成a人在线观看| 国产激情一区二区三区| 久旷成熟的岳的| 韩国在线观看一区二区三区| 日本性生活网站| 国产V亚洲V天堂无码网站| 两个人看的www高清免费观看| 精品无码人妻夜人多侵犯18| 好男人看片在线视频观看免费观看| 免费在线观看黄色毛片| 99在线国产视频| 精品福利一区二区三区免费视频 | 国内精品久久久久久| 午夜福利视频合集1000| √天堂资源中文官网bt| 用电动玩具玩自己小视频| 在线观看亚洲专区| 亚洲午夜成人片| 韩国伦理片久久电影网| 放荡白丝袜麻麻| 免费一看一级毛片全播放| 99久无码中文字幕一本久道| 欧美性猛交xxxx| 国产寡妇偷人在线观看视频| 亚洲AV成人噜噜无码网站| 青青草原亚洲视频| 日本高清视频wwww色| 台湾一级淫片高清视频| ass美女下部精品图片| 男男性彩漫漫画无遮挡| 国产色产综合色产在线观看视频 |