HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Beth Stackpole
User Rank
Blogger
What about security breaches?
Beth Stackpole   6/22/2012 7:12:32 AM
NO RATINGS
That's a pretty interesting development, although I would think from a security standpoint, there are tradeoffs. Isn't it easier to mimic someone's gestures and writing style than to somehow clone their biometrics identity? In any regard, pretty cool stuff and if nothing else, the science behind the cognitive fingerprint could have great application in a host of areas.

Charles Murray
User Rank
Blogger
Re: What about security breaches?
Charles Murray   6/22/2012 5:28:44 PM
NO RATINGS
I agree on all counts, Beth. It's interesting from a science standpoint, but I don't think I would want my data at the risk based on my "cognitive fingerprint."

mrdon
User Rank
Gold
Re: What about security breaches?
mrdon   6/23/2012 4:43:37 PM
NO RATINGS
This DARPA technology reminds me of the Context Awarness research being conducted by MIT's Media Lab where the computer can recognize the user's emotional behavior patterns and adjust automatically their work environment. Hackers will definitely find this method of security intriguing to crack.

Greg M. Jung
User Rank
Platinum
Refinement and Development
Greg M. Jung   6/23/2012 9:56:10 PM
NO RATINGS
This is a very interesting concept and one that would throw hackers a curve as the technology develops.

I think this will start out like voice recognition technology... llimted and a little rough around the edges.  However, as time progresses and more sophisticated algorithms are employed, I think this will become a valuable security option.

robatnorcross
User Rank
Gold
Re: Refinement and Development
robatnorcross   6/25/2012 5:33:39 PM
NO RATINGS
Who was it that said "the person who trades freedom for security deserves neither" (or something like that)

I suspect something more sinister.

If you elect me dictator for a year one of the first bureaucracies that I'll disband is DARPA.

I can't wait for the "name" of this technology. Something like "Homeland Security" oh wait that one is already used. Maybe "Personal happy recognition system" to make it sound "nice".

Mike J
User Rank
Iron
Useful as a security layer
Mike J   6/26/2012 9:17:47 AM
NO RATINGS
Say someone gets your p/w and accesses your computer...but doesn't use it like you usually do- too hesitant, maybe typing much faster or slower, something. The operating system recognizes that there's an issue. It challenges you to further identify yourself, and if "you" can't it locks down again. Maybe to a tighter level. A system like that might actually be, as they say, a good thing.

William K.
User Rank
Platinum
Cognitive fingerprints???
William K.   6/29/2012 4:28:36 PM
NO RATINGS
The cognitive fingerprint would not work when I was tired or not feeling well, and if microsoft had anything to do with it, it would not work at all. The problem of this concept, as with all similar concepts, is that the key record must reside someplace, and that place is not secure, and can't be secure. Likewise the fingerprint and eye exam systems. Each is a fair deterent but none is invinceable. A password with pauses in the cadence could be quite secure until hackers figured out how to record keyboard entry cadence.

A far better system is to only have "trustworthy" people in the area, and to mandate that sensitive material never leave the secure area. Yes, that would indeed be quite inconvenient. But staying secure is almost always inconvenient. Oh Well!

Ann R. Thryft
User Rank
Blogger
Re: What about security breaches?
Ann R. Thryft   7/11/2012 12:01:31 PM
NO RATINGS
I agree, Chuck. This sounds uncomfortably like a Philip K. Dick science fiction story.



Partner Zone
Latest Analysis
Released on September 19, 2014, this 5.5 inch screen iPhone is the larger version of the iPhone 6, whose teardown follows tomorrow.
A Design News course on field programmable gate arrays (FPGAs) should help engineers who are considering the technology for their upcoming designs.
In many engineering workplaces, there’s a generational conflict between recent engineering graduates and older, more experienced engineers. However, a recent study published in the psychology journal Cognition suggests that both may have something to learn from another group: 4 year olds.
CTC releases EtherCAT Master module for high-performance control of networked servos, stepping motors, and I/O devices.
Conventional wisdom holds that MIT, Cal Tech, and Stanford are three of the country’s best undergraduate engineering schools. Unfortunately, when conventional wisdom visits the topic of best engineering schools, it too often leaves out some of the most distinguished programs that don’t happen to offer PhD-level degrees.
More:Blogs|News
Design News Webinar Series
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
7/17/2014 11:00 a.m. California / 2:00 p.m. New York
9/25/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Sep 22 - 26, MCU Software Development – A Step-by-Step Guide (Using a Real Eval Board)
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: September 30 - October 2
Sponsored by Altera
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service