1 min read

Human gait may soon replace passwords and PINs

Luana PASCU

May 24, 2017

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Human gait may soon replace passwords and PINs

The number of companies embracing biometrics for authentication is increasing; after introducing “selfie pay” last year, Mastercard is now testing fingerprint-authorized payments in South Africa, smartphones ask for fingerprints to be unlocked and speech recognition can control your Windows PC.

Kinetic Energy Harvesting is the newest kid on the block, with technology developed by Data61 lab, part of the Australian Commonwealth Scientific and Industrial Research Organization.

Because passwords can be guessed and have often proven weak and inefficient, the group of researchers aims to turn the human gait into a unique authentication method through wearable sensors, such as accelerometers, and detect spoofing attacks.

“The feasibility of KEH-Gait is based on the fact that human gait has distinctive movement patterns for different individuals, which is expected to leave distinctive patterns for KEH as well,” the research paper says.

With Fitbit and Apple watch leading the way, wearables are becoming essential in daily life, turning into a market expected to be worth 70 billion dollars by 2025. Not only is it no longer convenient to regularly introduce manual PIN codes to unlock devices, but solely relying on traditional authentication methods may prove inefficient in case of malicious, targeted attacks.

The performance of the prototype was tested on 20 subjects by using two types of hardware.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read