The Financial Express (Delhi Edition)

CRACKING THE CODE

From ear impression­s to measuring a user’s gait for authentica­tion, a password-free future is just around the corner

-

THE FUTURE is replete with options that could replace the much-maligned traditiona­l passwords. In a few years, user authentica­tion could be confirmed by a person’s eye blinking or typing pattern. A person’s location or style of holding a phone could also be key to a secure future. Here are some future alternativ­es to the convention­al password:

Zero-interactio­n authentica­tion

With zero-interactio­n authentica­tion (ZIA) — a method in the works — a user doesn’t need to interact with a terminal to log on to it. Instead, another device or security key he/she is carrying—smartphone, car keys, pen drive, etc—interacts with the terminal, confirms the user’s identity and allows them to log on. This interactio­n between the terminal and the security key takes place wirelessly through Bluetooth, near-field communicat­ion or radio frequency identifica­tion.

Persona-based authentica­tion

As per a recent report in an IT business e-newsletter by Hewlett-Packard Enterprise, an IT enterprise company, this form of authentica­tion is based on a user’s individual­ity. Persona-based authentica­tion relies on a combinatio­n of ‘geographic­al’ and ‘behavioura­l’ elements—location and details of auser’s terminal, the way they hold their smartphone and type, the tone of their voice, their walk, eye blinking pattern, etc—that are unique to an individual.

‘Account Key’ feature

Some companies have introduced tools that could as well mark the beginning of the end of convention­al passwords. Take, for instance, Yahoo. In October 2015, the Marissa Mayer-led American multinatio­nal technology firm launched its ‘Account Key’ feature, which uses push notificati­ons for user authentica­tion.So when a user tries to login to their mail on a device, they get a notificati­on on their smartphone. To enable the sign in, they have to tap ‘Yes’ on the notificati­onsent to the phone. This ensures that it’s the user signing in and not someone else. “Account Key is a big step forward for a password-free future. It streamline­s the sign-in process with an interface that is not just easy to use, but also more secure than a traditiona­l password. With Account Key, nobody else can sign in even if they get your account informatio­n,” says Dylan Casey, vice-president, product management, Yahoo.

Trust score system

Technology giant Google, too, has plans to do away with traditiona­l passwords for good. A soon-to-belaunched system called Trust API helps users sign in and unlock devices through a ‘trust score’. This score is calculated using a variety of behavioura­l factors, including a user’s location, facial recognitio­n, typing pattern, etc.

Strong encryption standards

Some apps use multi-factor authentica­tion, which entails verificati­on by at least two factors before a user can log in. Here, strong encryption standards like Advanced Encryption Standard-256 (AES-256), a secure encryption algorithm, can add an extra layer of security. “If an organisati­on has a huge amount of sensitive informatio­n, using multi-level authentica­tion can make it much more secure,” says Melanie Duca, consumer marketing director, Asia-Pacific, Intel Security, a computer security software company.

Advanced biometrics

Even though security experts have voiced concerns about costs incurred while using biometrics for user authentica­tion, it is still quite popular. Some smartphone-makers already employ biometric solutions to bulk up security—fingerprin­t scanners are one example. Some app developers, however, believe fingerprin­t scanning is passé. Ergo, an Android applicatio­n, uses the ear as a biometric indicator, using the capacitive touchscree­n to record a user’s unique ear impression. Users can unlock their phone by simply tapping their ear at the centre of the screen. Some other concepts include measuring a user’s gait. This is done through a wearable device fitted with an accelerome­ter and gyroscope. The informatio­n is then used to log in to a computer by matching it against pre-recorded specimens.

 ??  ??

Newspapers in English

Newspapers from India