Khaleej Times

Your heart beats your password

- IANS

new york — Forget facial recognitio­n technology or fingerprin­t computer identifica­tion as researcher­s have developed a computer security system using the dimensions of the heart as identifier.

“No two people with identical hearts have ever been found,” said the study’s lead author Wenyao Xu, assistant professor at the University at Buffalo in New York.

And people’s hearts do not change shape, unless they suffer from serious heart disease, he said.

The system, which may eventually be used for smartphone­s and

at airport screening barricades, is a safe and potentiall­y more effective alternativ­e to passwords and other biometric identifier­s, the researcher­s said.

“We would like to use it for every computer because everyone needs privacy,” Xu said. “Logging-in and logging-out are tedious,” he added.

To make sure no one else steps in to run your computer, the system uses low-level Doppler radar to measure your heart, and then continuall­y monitors your heart.

The system needs about eight seconds to scan a heart the first time, and thereafter the monitor can continuous­ly recognise that heart.

The researcher­s are scheduled to present a paper describing the technology at the 23rd Annual Internatio­nal Conference on Mobile Computing and Communicat­ion (MobiCom) in Utah in October.

The signal strength of the system’s radar “is much less than WiFi”, and therefore does not pose any health threat, Xu said.

“We are living in a Wi-Fi surroundin­g environmen­t every day, and the new system is as safe as those Wi-Fi devices,” he said.

The system, which was three years in the making, uses the geometry of the heart, its shape and size, and how it moves to make an identifica­tion.

Heart-based biometrics systems have been used for almost a decade, primarily with electrodes measuring electrocar­diogram signals, “but no one has done a noncontact remote device to characteri­se our hearts’ geometry traits for identifica­tion,” he said.

The new system has several advantages over current biometric tools, like fingerprin­ts and retinal scans, Xu said.

First, it is a passive, non-contact device, so users are not bothered with authentica­ting themselves whenever they log-in.

And second, it monitors users constantly. This means the computer will not operate if a different person is in front of it. Therefore, people do not have to remember to log-off when away from their computers.

The system could also be used for user identifica­tion on cell phones. —

 ??  ??

Newspapers in English

Newspapers from United Arab Emirates