HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Ann R. Thryft
User Rank
Blogger
Re: What about security breaches?
Ann R. Thryft   7/11/2012 12:01:31 PM
NO RATINGS
I agree, Chuck. This sounds uncomfortably like a Philip K. Dick science fiction story.

William K.
User Rank
Platinum
Cognitive fingerprints???
William K.   6/29/2012 4:28:36 PM
NO RATINGS
The cognitive fingerprint would not work when I was tired or not feeling well, and if microsoft had anything to do with it, it would not work at all. The problem of this concept, as with all similar concepts, is that the key record must reside someplace, and that place is not secure, and can't be secure. Likewise the fingerprint and eye exam systems. Each is a fair deterent but none is invinceable. A password with pauses in the cadence could be quite secure until hackers figured out how to record keyboard entry cadence.

A far better system is to only have "trustworthy" people in the area, and to mandate that sensitive material never leave the secure area. Yes, that would indeed be quite inconvenient. But staying secure is almost always inconvenient. Oh Well!

Mike J
User Rank
Iron
Useful as a security layer
Mike J   6/26/2012 9:17:47 AM
NO RATINGS
Say someone gets your p/w and accesses your computer...but doesn't use it like you usually do- too hesitant, maybe typing much faster or slower, something. The operating system recognizes that there's an issue. It challenges you to further identify yourself, and if "you" can't it locks down again. Maybe to a tighter level. A system like that might actually be, as they say, a good thing.

robatnorcross
User Rank
Gold
Re: Refinement and Development
robatnorcross   6/25/2012 5:33:39 PM
NO RATINGS
Who was it that said "the person who trades freedom for security deserves neither" (or something like that)

I suspect something more sinister.

If you elect me dictator for a year one of the first bureaucracies that I'll disband is DARPA.

I can't wait for the "name" of this technology. Something like "Homeland Security" oh wait that one is already used. Maybe "Personal happy recognition system" to make it sound "nice".

Greg M. Jung
User Rank
Platinum
Refinement and Development
Greg M. Jung   6/23/2012 9:56:10 PM
NO RATINGS
This is a very interesting concept and one that would throw hackers a curve as the technology develops.

I think this will start out like voice recognition technology... llimted and a little rough around the edges.  However, as time progresses and more sophisticated algorithms are employed, I think this will become a valuable security option.

mrdon
User Rank
Platinum
Re: What about security breaches?
mrdon   6/23/2012 4:43:37 PM
NO RATINGS
This DARPA technology reminds me of the Context Awarness research being conducted by MIT's Media Lab where the computer can recognize the user's emotional behavior patterns and adjust automatically their work environment. Hackers will definitely find this method of security intriguing to crack.

Charles Murray
User Rank
Blogger
Re: What about security breaches?
Charles Murray   6/22/2012 5:28:44 PM
NO RATINGS
I agree on all counts, Beth. It's interesting from a science standpoint, but I don't think I would want my data at the risk based on my "cognitive fingerprint."

Beth Stackpole
User Rank
Blogger
What about security breaches?
Beth Stackpole   6/22/2012 7:12:32 AM
NO RATINGS
That's a pretty interesting development, although I would think from a security standpoint, there are tradeoffs. Isn't it easier to mimic someone's gestures and writing style than to somehow clone their biometrics identity? In any regard, pretty cool stuff and if nothing else, the science behind the cognitive fingerprint could have great application in a host of areas.



Partner Zone
Latest Analysis
Samsung's Galaxy line of smartphones used to fare quite well in the repairability department, but last year's flagship S5 model took a tumble, scoring a meh-inducing 5/10. Will the newly redesigned S6 lead us back into star-studded territory, or will we sink further into the depths of a repairability black hole?
Fifteen European research centers have launched EuroCPS to help European companies develop innovative products for the Internet of Things.
Get your Allman Brothers albums ready. The iconic Volkswagen Microbus may be poised for a comeback, and this time it could be electric.
In 2003, the world contained just over 500 million Internet-connected devices. By 2010, this figure had risen to 12.5 billion connected objects, almost six devices per individual with access to the Internet. Now, as we move into 2015, the number of connected 'things' is expected to reach 25 billion, ultimately edging toward 50 billion by the end of the decade.
NASA engineer Brian Trease studied abroad in Japan as a high school student and used to fold fast-food wrappers into cranes using origami techniques he learned in library books. Inspired by this, he began to imagine that origami could be applied to building spacecraft components, particularly solar panels that could one day send solar power from space to be used on earth.
More:Blogs|News
Design News Webinar Series
3/31/2015 11:00 a.m. California / 2:00 p.m. New York
2/25/2015 11:00 a.m. California / 2:00 p.m. New York
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
5/7/2015 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Apr 20 - 24, Taking the Internet of Things to the Cloud
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Last Archived Class
Sponsored by Proto Labs
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2015 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service