Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Data Security
DDoS Protection Powered By Verisign
Average Rating:
Rate this article:  
In Google's Future, You May Log in with Your Ring

In Google's Future, You May Log in with Your Ring
By Barry Levine

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

A smartphone or "smartcard-embedded finger ring," wrote the Google authors, could "authorize a new computer via a tap on the computer, even in situations in which your phone might be without cellular connectivity." The Google authors call for the "primary authenticator" to be a piece of hardware, but envision a second authentication might also be involved.
 


Just as we Google people now, will we ring ourselves into our e-mail account in the near future? That's a possibility outlined in a new Google research paper, which proposes such options as a ring that taps on a computer to logon.

The paper, by Google Vice President of Security Eric Grosse and Engineer Mayank Upadhyay, is scheduled for publication this month in IEEE Security & Privacy Magazine. It argues for post-password computing because, according to the authors, "passwords and simple bearer tokens such as cookies are no longer sufficient to keep users safe."

It's hard to argue with that conclusion. While individual account hackings do not normally make news, most users have such experiences as someone breaking into their e-mail account, or receiving a notice about a security breach from their credit card company. And the news is regularly populated with reports of companies whose confidential user information has been stolen, with the pilfered accounts often numbering in the thousands or millions.

'Tap to Logon'

To address this situation, Google proposes a variety of physical logon devices, such as utilizing the small Yubico cryptographic card. It can be inserted into a USB port, and a modified Google Chrome browser can accept such a login without a separate software download. The Yubico card first needs to be registered, after which it's good to go.

While external, keychain-held physical devices that function as a second factor are not uncommon in some corporate environments, they are not widely used by consumers or many businesses, at least in part because of the convenience factor and the need for IT support. Google is attempting to circumvent both obstacles by suggesting that a ring or the ubiquitous smartphone could have Yubico-like capabilities built-in, along with a "tap to logon" capability -- not unlike the "tap to buy" capability of near field communication (NFC)-equipped smartphones.

In a recent story here, "Will Near Field Communication Change the World?", author Ira Brodsky outlined the change wave being driven by NFC, the security advantages, and a coming world where tap-to-do is a common activity. He called NFC a "wireless game changer" that can only operate in close physical proximity to the receiver.

Independent Protocol

A smartphone or "smartcard-embedded finger ring," wrote the Google authors, could "authorize a new computer via a tap on the computer, even in situations in which your phone might be without cellular connectivity." The authors envision that a second factor of authentication, including an on-screen one, might also be involved to ensure against a break-in if the physical device is stolen or lost, but they call for the "primary authenticator" to be a piece of hardware.

To support this vision, Google says it has developed a device- and vendor-independent protocol that uses a Web browser to support device-based authentication.

Google already offers two-step authentication to its users, with a one-time password sent to your smartphone to be entered along with your regular login. Other sites, such as Dropbox or Blizzard, also offer two-factor authentication schemes, but the weakness is that second-factor codes could be susceptible to fake Web sites and phishing attempts. Another possible possible approach is reflected in a recent rumor that the next Apple iPhone will provide a different kind of physical authentication -- a built-in fingerprint sensor.
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Data Security
1.   9 Norton Security Products Are Now 1
2.   Data Stolen from U.S. Health Network
3.   FBI Cybersquad To Add Agents
4.   Microsoft Patch Tuesday Stars IE
5.   CloudFlare To Offer Free Encryptions


advertisement
9 Norton Security Products Are Now 1
Symantec takes software-as-service tack.
Average Rating:
FBI Cybersquad To Add Agents
Rewarded for recent security successes.
Average Rating:
Data Stolen from U.S. Health Network
Chinese hackers targeted hospital firm.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Chinese Hackers Nab Info on Millions of U.S. Patients
A group of Chinese hackers has stolen the personal information, including names and Social Security numbers, of about 4.5 million patients at hospitals operated by Community Health Systems.
 
Premier FBI Cybersquad in U.S. To Add Agents
After helping prosecutors charge Chinese army officials with stealing trade secrets from major companies and by snaring a Russian-led hacking ring, the premier FBI cyber-squad is getting a boost.
 
Apple Opens iCloud Data Center in China
Treading lightly, Apple acknowledged it has started to store encrypted iCloud personal data of some Chinese users on servers in mainland China, operated by the state-owned China Telecom.
 

Enterprise Hardware Spotlight
Compression, Deduplication Come to Violin Concerto 2200
Violin Memory has announced that data deduplication and compression capabilities are now available on its Concerto 2200 solution. Typically, users will experience deduplication rates between 6:1 and 10:1.
 
Cisco Axes 6,000 Employees in Restructuring Plan
Faced with declining profits, Cisco is laying off up to 6,000 employees in the months ahead -- a whopping 8 percent of its global workforce. That's in addition to the 4,000 jobs Cisco cut last year.
 
Web Slows, Have Internet Routers Reached The Limit?
If you encountered problems connecting to the Internet on August 12, you weren't alone. Networking experts blame the wide-scale slowdown on outdated routing systems that are reaching their limits.
 

Mobile Technology Spotlight
HTC Debuts Windows Phone Version of One M8 Smartphone
HTC is bringing the Windows Phone mobile OS to its flagship One M8 device -- the first time any mainstream flagship smartphone has been offered with a choice of operating systems.
 
Verizon Earns Top Rating in Mobile Network Comparison
A new report says Verizon Wireless was the top-performing U.S. cellphone service provider in the first half of 2014, on a nationwide and state-by-state basis, as well as in metro areas.
 
Sprint Comes Out with Data Guns Blazing
As its new CEO promised, Sprint has rolled out a new aggressively competitive price plan. The shared data plans promise twice the high-speed data and at lower prices than AT&T and Verizon Wireless.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.