A Look Into: Biometric Technology |
- A Look Into: Biometric Technology
- [Giveaway] $1000 Worth Of PSD to HTML Conversions
- Setup PHP, Apache, and MySQL in Mac without MAMP – Part II
- Secrets Of A Killer Blog Post [Infographic]
A Look Into: Biometric Technology Posted: 26 Feb 2014 07:01 AM PST With increasingly more sensitive and personal information being stored on devices nowadays, biometric technology has become more and more important for security, and to ensure that this information doesn’t fall into the wrong hands. The popularity of Apple’s iPhone 5s, with its Touch ID fingerprint scanning technology, should tell you that biometrics is definitely on the rise.
And it’s not just the iPhone 5s either: there were a lot of new tech devices featuring biometric technology at the recent Consumer Electronics Show (CES). And there’s definitely more to come. From smartphones to video game consoles to biometric wristbands, biometric technology is definitely going to make its way to more and more devices over the next few years. Here’s a quick look into the present, and future, of biometric technology. Recommended Reading: Golden Rule To Internet Security: Change Your Passwords What Is Biometric Technology?Biometrics is a form of user identification and access control that uses physiological attributes such as a person’s fingerprints, face and retina in order to identify users. Biometrics can also identify users based on certain behavioral tendencies such as speech patterns and typing rhythm.
Unlike normal forms of access control such as identity cards or PIN numbers, these physiological characteristics are difficult to fake, leading to increased security. These physiological characteristics are also pretty much impossible to misplace, unlike an access card. Physiological attributes such as fingerprints and retina patterns aren’t just picked at random, though; each of these attributes has to fulfill a number of requirements to ensure that they’re suitable to be used in biometric identification. There are 3 particularly important requirements:
As far as security is concerned, there are few reasons to prefer traditional password or access card systems over biometrics, except for one problem. With current password systems, it’s easy to provide a new password if the old one is compromised. However, if a user’s fingerprint or other biometric identifier is somehow compromised, there’s currently no way to "cancel" or "reset" biometrics; after all, there’s no way for a service to issue a user with a new face if their facial recognition data is somehow compromised. Biometric Technology TodayThe most appealing thing about biometrics has to be the way that they might one day replace passwords. Here’s a quick look into some of the ways biometrics are being implemented in consumer devices right now, plus the positives and negatives of each technology when it comes to replacing passwords. Fingerprint ScanningFingerprint scanning is currently the most common form of biometric technology and, according to Frost & Sullivan, should remain the leading biometric technology for at least the next few years. Fingerprint scanning works by scanning the ridges and valleys on a finger’s surface. Notable uses of fingerprint scanning in consumer electronics are the fingerprint sensors on the iPhone 5S, HTC One Max and FingerQ’s Q-Case series of smartphone cases. In most of these cases, fingerprint scanning is used to unlock the phone. Fingerprint scanning definitely fits the criteria for convenience and singularity, but it’s not as inimitable as other forms of biometrics. A perfect example is, of course, how Germany’s Chaos Computer Club managed to beat Apple’s Touch ID. As the Club pointed out, it’s entirely possible to create a fake fingerprint, as long as a clean fingerprint can be lifted off of a surface. Since we leave hundreds, if not thousands of fingerprints a day, obtaining a fingerprint for this purpose probably isn’t as hard as most of us would like to think. Iris And Retina ScanningRetina and iris scanning work on roughly the same principle; iris and retina patterns are unique and this makes them suitable for biometric identification. But where a retinal scan goes deep into the eye to identify users based on their retina pattern, iris scanning identifies users based on their iris pattern, which is visible without deep scanning. Eyelock’s Myris is an upcoming device that will let you log in to sites and apps simply through iris scanning. Apple also seems to have an interest in iris scanning; if a couple of recent hires are anything to go by, so we may just see iris scanning in an upcoming Apple device.
Both the iris and retina are very much inimitable and singular, with very low false positives and negatives. For instance, Eyelock claims that the chances of a false match with Myris are 1 in 2 trillion. Retina scanning is not particularly convenient, as it requires users to have their eyes extremely close to a dedicated scanning device. This, plus the high cost of retina scanners, makes retinal scanning less desirable for consumer electronics devices. Iris scanning is a lot more convenient, since it only requires a much more common infra-red camera and can be performed at a distance. One potential issue, though, with both of these methods that the identification accuracy can be effected by medical conditions, eye surgery and alcohol consumption (in the case of iris scanning). Facial RecognitionFacial recognition software identifies individuals based on nodal points such as the distance between a person’s eyes, the width of the nose and the shape of cheekbones. Facial recognition is already being used on Facebook, where it’s used to automatically identify people in photos. It’s also recently made an appearance in both Microsoft’s Xbox One and Sony’s PlayStation 4, both of which use facial recognition to automatically sign users in. Android versions 4.0 and above also come with a Face Unlock feature, which allows users to unlock devices using their face. One of the biggest issues with facial recognition is that it’s not 100% inimitable. Certain systems are reasonably easy to spoof by simply using a photo of the target. Not all systems suffer from this same weakness though: Google, for example, have patented a liveness test for facial recognition. Singularity and convenience aren’t huge problems for facial recognition, but the important thing with facial recognition is the recognition software itself. More specifically, it’s important that the software is able to recognise faces under various lighting conditions and when wearing accessories such as glasses or hats. Voice RecognitionVoice-based biometric identification isn’t widespread at the moment, but the market is expected to grow within the next few years. Voice recognition, not to be confused with speech recognition, works by identifying characteristics of a person’s voice. Last year, Authentify launched a mobile security app called Authentify xFA, which links digital credentials with a biometric voice print. In addition, GEO Semiconductor, SpeechFX and VoiceVault launched Granta, a home automation system with voice recognition capabilities. Voice recognition is certainly a very convenient and low cost form of biometric identification, since the technology to collect speech data is readily available in the devices we use daily, such as smartphones. In addition, the voice is indeed inimitable and singular enough to be used for user identification purposes. There are a few weaknesses to voice recognition, though. Firstly, background noise can affect the accuracy of the analysis. In addition, illnesses such as a cold or sore throat may affect a person’s voice enough to make recognition less accurate. Heartbeat BiometricsUsing vital signs, specifically the heartbeat, to identify individuals is not an entirely new idea. An individual’s heartbeat, or electrocardiogram (EGC) wave, is unique and remains constant even when heart rate increases as a result of excitement or exercise. Bionym’s Nymi armband is one of the few consumer devices to implement this form of biometric identification to identify users. When the Nymi identifies you, it lets you take control of all the devices linked to your Nymi, which can include your smartphone, computer and even your car. The heartbeat might be one of the most secure physiological attributes that can be used for biometric identification. A person’s ECG wave is unique, not to mention inimitable and hard to reproduce. ECG scanning is quite convenient, too, as it doesn’t require any invasive scanning procedures or bulky specialised hardware. The Nymi, after all, is a compact armband, and if future heartbeat scanning devices follow the Nymi’s lead, then heartbeat scanning will probably be one of the more convenient forms of biometric identification. Biometrics in The FutureThere’s always a lot of research and development going on in biometrics, be it looking into new physiological attributes to be used for biometric identification or research focused on improving currently-available forms of biometric identification. There’s a lot to look forward to when it comes to new forms of biometric identification. Gait AnalysisGait analysis, the analysis of how a person walks, is quite an interesting prospective method of biometric identification. There are two general methods used in gait biometrics. The first method uses camera footage which is then analyzed and processed by computers using a variety of different algorithms. The second method, discovered by researchers from Carnegie Mellon University, uses a smartphone’s accelerometers to identify a person according to their gait with up to 99.4% accuracy. This method is particularly interesting, as it could conceivably be used to automatically shut a smartphone down if it detects a gait that’s different from that of the owner.
Body OdorQuite recently, researchers from the Universidad Politecnica de Madrid announced that they were making progress on the use of body odor as a biometric identifier. According to the researchers, certain characteristics of a person’s body odor are consistent throughout their lives, which would allow body odor-based biometrics to identify individuals with up to an 85% accuracy rating. It remains to be seen how this might be integrated into consumer electronics, but the high accuracy rating is promising. DNAThe next frontier in biometrics, however, has to be DNA, which is possibly the most accurate way to identify an individual. Admittedly, testing for DNA is nothing new and has been used in law enforcement for a while, but DNA testing in everyday biometrics is still a ways away. The problem is that DNA testing doesn’t return instant results, and anyone who’s seen episodes of CSI will know that it requires specialised equipment. Even a "rapid" DNA testing machine such as the IntegenX RapidHIT cost $245,000 in 2012, and is definitely too inconvenient for use outside of law enforcement.
While DNA-based biometrics will probably never be cheap or convenient enough for use in portable consumer electronics, researchers are constantly looking for ways to make DNA testing quicker and cheaper. It’s not impossible that, one day, the technology currently being used in law enforcement will make its way into the home, allowing home owners to secure their homes with DNA-testing biometric security. ConclusionThere’s no denying the fact that biometric technology is here to stay. The variety of methods and implementations that are currently available and coming soon is proof enough of this, but the fact that research is still ongoing, looking for new and improved methods of biometric identification, definitely reinforces that fact. Biometrics aren’t perfect, and there will definitely be teething problems, notably the aforementioned issue with biometrics being uncancellable, but a future where we won’t have to remember a myriad of different passwords for all the devices and accounts in our ever-connected lives is definitely on the horizon. |
[Giveaway] $1000 Worth Of PSD to HTML Conversions Posted: 26 Feb 2014 05:01 AM PST Looking to get your PSD designs converted to HTML? If you have missed out on past PSD to HTML conversions in past giveaways, here is another chance for you to still walk away a winner. This time we have teamed up with the guys at PSD2HTMLPros.com to offer you $1000 worth of PSD to HTML conversions. PSD2HTMLPros.com is a front-end development company (PSD to HTML) which specializes in converting graphic designs (PSD, AI, FW) into 100% hand-coded, W3C valid HTML/CSS markup and themes / templates / skins for content management as well as e-commerce systems like WordPress, Joomla, Drupal, Magento, Shopify and many others. PrizesWe are looking for 4 winners. Here is a breakdown of what each winner will be walking away with:
How To EnterLike always, use the Rafflecopter widget below to be in the running to win today’s prizes.
|
Setup PHP, Apache, and MySQL in Mac without MAMP – Part II Posted: 26 Feb 2014 02:01 AM PST In the previous tutorial of this series, we have configured Apache and PHP and thus we are able to run Let’s get started. Recommended Reading: Install PHP, Apache, And MySQL In Mac Without MAMP PHP InstallerFortunately, MySQL comes in a form of Launch the DMG package. And you should find three files as shown in the following screenshot.
Install all three. Then, after they are all completed, open System Preference, and navigate to the MySQL pane. Turn MySQL Server on, and tick Automatically Start MySQL Server on Startup. Connecting PHP to MySQLAt this point, MySQL is running. But, OS X searches a different directory to find MySQL socket, To solve this, we will create a symbolic link (symlink) in the directory where OS X expects to find the MySQL socket.
Set MySQL PasswordThen we need to create password for mysqladmin -u root password new_password Change the “new_password” with the password of your choice. Managing MySQLNow, we need to find a way to manage MySQL. The popular way for doing this would be using a web-based application such as phpMyAdmin. But, I’m not quite fancy with phpMyAdmin User Interface, and the installation process (to me) is rather complicated. I found a good alternative, a lovable native OS X application named Sequel Pro. Grab the installer here, put it in the Application folder, and launch it. In this tutorial, we are going to connect to MySQL via the socket file. So, let’s head over to the Socket tab, and enter the following information:
Click the Connect button. Once you are connected to the MySQL, you can create, modify, and delete databases as well as creating new MySQL users. In the following example, as shown below, I’ve created a database named wordpress for my WordPress site. ConclusionIn this tutorial, we have done configuring MySQL. Now, you have a fully functioning local server for developing PHP-based website in Mac. In the next part and last part, we are going to show you how to custmize the localhost. So, stay tuned. |
Secrets Of A Killer Blog Post [Infographic] Posted: 25 Feb 2014 09:01 PM PST One of the hardest bit about maintaining a blog is to stand out of the crowded blogging landscape, plus there are viral videos, gifs, news, marketing campaigns etc, all vying for the same attention. What’s an honest blogger to do? Whoishostingthis.com has released an infographic on how you can get your readers’ attention. It covers topics about the importance of your post title, 8 types of you can creatively word your titles for the best form of response, how to lure readers in with the opening sentence and keep them on your post for the rest of the article, among others. Do have a look at the examples, how information is treated and manipulated and how you too can apply some of these tips in your next blog post release and create a killer blog post. Recommended Reading: 6 Simple Tips To Write Your Next Killer Post |
You are subscribed to email updates from hongkiat.com To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment