The Future of Smartphone Security

11:54 AM
The Future of Smartphone Security -

Although Swipes, access codes and passwords are doing their best to keep unwanted, they still leave you very vulnerable phone piracy. Tech companies are currently looking for new technologies to improve safety. A response that was more and more attention these days has to do with what is known as biometrics.

Biometrics encapsulates technologies that use the unique biological and physical characteristics for authentication purposes. Fingerprints, body odor, and even your stride can help differentiate one user to another.

Because of their individuality and integrity, biometrics has gained much attention, even to see the inclusion in the latest iPhone iteration.

In addition to fingerprints, several options exist, each with advantages and disadvantages discernible. In the remainder of this article, we'll highlight a handful of options that exist that could be used in the future of the smartphone security technology.

Facial recognition exists, but with serious flaws

Facial recognition is a viable option for authentication, enabled by the capacity of existing cameras to facilitate the service. The technology has been around for a while, since the Android 4.0 operating system. However, many measures should be taken to improve its integrity and plug security holes

Key questions :.

  • Fooled by high-resolution photograph
  • has a record of poor performance in previous platforms
  • Inconsistency lighting can lock users out of their devices
  • obvious flaws suggests either further development or abandonment of technology

electrocardiogram provides better authentication, but with less convenience

According Bionym the cabinet, the beating of the human heart is as unique as a fingerprint. The demand is not without truth. IEEE has published a document detailing the quality of the technique, which provides a strong case for the integrity, consistency and accuracy in implementation. The additional hardware requirements may constitute a trade barrier to the ubiquity

Key questions :.

  • unique fingerprint is difficult or impossible to reproduce
  • requires additional hardware, worn at all times for authentication purposes
  • method authentication requires considerable investment of time, creating a point for eager users of pain
  • cost of acquisition of the impression material can increase the cost and form factor devices

offers less invasive iris scanning, although only partially secure method

irises, which includes the colored tissue surrounding the retina, has a unique profile sufficiently to enable authentication. When taking a picture using the camera with existing cell phones using infared light minimally invasive, cellular phone manufacturers can implement the technology at little extra cost.

Adding infrared light can increase the form factor and cost of devices and will require a new generation of hardware development to see the implementation of

key questions :.

  • Nascent iris scanning technologies still have shortcomings, including the acceptance of high-resolution photographs as authentic
  • Photography used by intruders must be high resolution , which could mitigate this defect
  • Challenge to target the cell phone camera in the right place remains present without clear vision of the unit's display
  • cost and form factor yet unknown, hobbling development efforts

retinal scanning offers the greatest promise, but the biggest technological challenge

the configuration of blood vessels that supply the retina reflect different amounts of light that the surrounding tissue. infared low energy light is shone on the back of the eye to capture this profile and the image is used to authenticate the device.

This method is probably the safest as well, since the analysis can factor in the natural movement of the eye when exposed to this light, making false retinas and photograph a counterfeit effort futile. However, the equipment, the issues of privacy and invasiveness are major obstacles to overcome

Key questions :.

  • Diseases such as glaucoma, astigmatism and cataracts can change profile of the blood vessels in the retina
  • Photography process involves using enough light high intensity, which makes the invasive analysis
  • current technologies increase the form factor cellular devices collector

in addition to material and commercial concerns, new methods authentication raise privacy issues. With a public outcry over the latest revelations of the National Security Administration, the prospect of placing the unique biological identifiers in the hands of others is a psychological barrier for those wishing to implement the technology.

Companies in the development of new authentication methods, therefore, must prove both the integrity of their security solution and its storage.

  • Biometrics offers the next promise of innovation necessary for the safety of cellular devices.
  • facial recognition poses flaws that make her wise inclusion, even with the ease of implementation.
  • electrocardiogram provides a more secure footprint, but at the expense of convenience and price.
  • Iris and retinal analysis of present viable solutions, but with particular challenges of materials that need to be addressed before the inclusion may occur.

Only time will tell which option (s) will eventually be adopted and successfully used as security methods viable smartphones. Which do you prefer? Leave a comment below.

Previous
Next Post »
0 Komentar