HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Beth Stackpole
User Rank
Blogger
What about security breaches?
Beth Stackpole   6/22/2012 7:12:32 AM
NO RATINGS
That's a pretty interesting development, although I would think from a security standpoint, there are tradeoffs. Isn't it easier to mimic someone's gestures and writing style than to somehow clone their biometrics identity? In any regard, pretty cool stuff and if nothing else, the science behind the cognitive fingerprint could have great application in a host of areas.

Charles Murray
User Rank
Blogger
Re: What about security breaches?
Charles Murray   6/22/2012 5:28:44 PM
NO RATINGS
I agree on all counts, Beth. It's interesting from a science standpoint, but I don't think I would want my data at the risk based on my "cognitive fingerprint."

Ann R. Thryft
User Rank
Blogger
Re: What about security breaches?
Ann R. Thryft   7/11/2012 12:01:31 PM
NO RATINGS
I agree, Chuck. This sounds uncomfortably like a Philip K. Dick science fiction story.

mrdon
User Rank
Platinum
Re: What about security breaches?
mrdon   6/23/2012 4:43:37 PM
NO RATINGS
This DARPA technology reminds me of the Context Awarness research being conducted by MIT's Media Lab where the computer can recognize the user's emotional behavior patterns and adjust automatically their work environment. Hackers will definitely find this method of security intriguing to crack.

Greg M. Jung
User Rank
Platinum
Refinement and Development
Greg M. Jung   6/23/2012 9:56:10 PM
NO RATINGS
This is a very interesting concept and one that would throw hackers a curve as the technology develops.

I think this will start out like voice recognition technology... llimted and a little rough around the edges.  However, as time progresses and more sophisticated algorithms are employed, I think this will become a valuable security option.

robatnorcross
User Rank
Gold
Re: Refinement and Development
robatnorcross   6/25/2012 5:33:39 PM
NO RATINGS
Who was it that said "the person who trades freedom for security deserves neither" (or something like that)

I suspect something more sinister.

If you elect me dictator for a year one of the first bureaucracies that I'll disband is DARPA.

I can't wait for the "name" of this technology. Something like "Homeland Security" oh wait that one is already used. Maybe "Personal happy recognition system" to make it sound "nice".

Mike J
User Rank
Iron
Useful as a security layer
Mike J   6/26/2012 9:17:47 AM
NO RATINGS
Say someone gets your p/w and accesses your computer...but doesn't use it like you usually do- too hesitant, maybe typing much faster or slower, something. The operating system recognizes that there's an issue. It challenges you to further identify yourself, and if "you" can't it locks down again. Maybe to a tighter level. A system like that might actually be, as they say, a good thing.

William K.
User Rank
Platinum
Cognitive fingerprints???
William K.   6/29/2012 4:28:36 PM
NO RATINGS
The cognitive fingerprint would not work when I was tired or not feeling well, and if microsoft had anything to do with it, it would not work at all. The problem of this concept, as with all similar concepts, is that the key record must reside someplace, and that place is not secure, and can't be secure. Likewise the fingerprint and eye exam systems. Each is a fair deterent but none is invinceable. A password with pauses in the cadence could be quite secure until hackers figured out how to record keyboard entry cadence.

A far better system is to only have "trustworthy" people in the area, and to mandate that sensitive material never leave the secure area. Yes, that would indeed be quite inconvenient. But staying secure is almost always inconvenient. Oh Well!



Partner Zone
Latest Analysis
On Memorial Day, Americans remember the sacrifices the US armed forces have made, and continue to make, in service to the country. All of us should also consider the developments in technological capabilities and equipment over the years that contribute to the success of our military operations.
Imagine if you could train it from San Francisco to New York faster than flying?
In order to keep in line with safety protocols, industrial networks need to be filtered in a semantic way so that only information related to diagnostics is flowing back to the vendor and that any communications that could be used for remote machine operations are suppressed.
Siemens PLM has launched an online store to help customers search for, compare, and purchase partner-developed apps for its Solid Edge software.
Advanced visualization can depict an entire plant in motion, while also detailing an individual workstation. Individual products can be rendered different for each discipline involved — marketing, engineering, or suppliers.
More:Blogs|News
Design News Webinar Series
5/21/2015 11:00 a.m. California / 2:00 p.m. New York
5/7/2015 11:00 a.m. California / 2:00 p.m. New York
3/31/2015 11:00 a.m. California / 2:00 p.m. New York
2/25/2015 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
May 18 - 22, Embedded System Design Techniques™ - Mastering the ARM Cortex-M Processor
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Course June 2nd-4th:
Sponsored by Proto Labs
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2015 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service