Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Data Security
Register for a certification exam.
Average Rating:
Rate this article:  
In Google
In Google's Future, You May Log in with Your Ring

By Barry Levine
January 21, 2013 2:05PM

Bookmark and Share
A smartphone or "smartcard-embedded finger ring," wrote the Google authors, could "authorize a new computer via a tap on the computer, even in situations in which your phone might be without cellular connectivity." The Google authors call for the "primary authenticator" to be a piece of hardware, but envision a second authentication might also be involved.
 


Just as we Google people now, will we ring ourselves into our e-mail account in the near future? That's a possibility outlined in a new Google research paper, which proposes such options as a ring that taps on a computer to logon.

The paper, by Google Vice President of Security Eric Grosse and Engineer Mayank Upadhyay, is scheduled for publication this month in IEEE Security & Privacy Magazine. It argues for post-password computing because, according to the authors, "passwords and simple bearer tokens such as cookies are no longer sufficient to keep users safe."

It's hard to argue with that conclusion. While individual account hackings do not normally make news, most users have such experiences as someone breaking into their e-mail account, or receiving a notice about a security breach from their credit card company. And the news is regularly populated with reports of companies whose confidential user information has been stolen, with the pilfered accounts often numbering in the thousands or millions.

'Tap to Logon'

To address this situation, Google proposes a variety of physical logon devices, such as utilizing the small Yubico cryptographic card. It can be inserted into a USB port, and a modified Google Chrome browser can accept such a login without a separate software download. The Yubico card first needs to be registered, after which it's good to go.

While external, keychain-held physical devices that function as a second factor are not uncommon in some corporate environments, they are not widely used by consumers or many businesses, at least in part because of the convenience factor and the need for IT support. Google is attempting to circumvent both obstacles by suggesting that a ring or the ubiquitous smartphone could have Yubico-like capabilities built-in, along with a "tap to logon" capability -- not unlike the "tap to buy" capability of near field communication (NFC)-equipped smartphones.

In a recent story here, "Will Near Field Communication Change the World?", author Ira Brodsky outlined the change wave being driven by NFC, the security advantages, and a coming world where tap-to-do is a common activity. He called NFC a "wireless game changer" that can only operate in close physical proximity to the receiver.

Independent Protocol

A smartphone or "smartcard-embedded finger ring," wrote the Google authors, could "authorize a new computer via a tap on the computer, even in situations in which your phone might be without cellular connectivity." The authors envision that a second factor of authentication, including an on-screen one, might also be involved to ensure against a break-in if the physical device is stolen or lost, but they call for the "primary authenticator" to be a piece of hardware.

To support this vision, Google says it has developed a device- and vendor-independent protocol that uses a Web browser to support device-based authentication.

Google already offers two-step authentication to its users, with a one-time password sent to your smartphone to be entered along with your regular login. Other sites, such as Dropbox or Blizzard, also offer two-factor authentication schemes, but the weakness is that second-factor codes could be susceptible to fake Web sites and phishing attempts. Another possible possible approach is reflected in a recent rumor that the next Apple iPhone will provide a different kind of physical authentication -- a built-in fingerprint sensor.
 

Tell Us What You Think
Comment:

Name:



Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.


 Data Security
1.   Tor Working To Fix Security Exploit
2.   Hackers Breached StubHub Accounts
3.   Juniper DDoS for High-IQ Networks
4.   Google Hacker Team to Hunt Bugs
5.   Cloud Firms Offer Azure Starter Kit


advertisement
Tor Working To Fix Security Exploit
Bug reportedly reveals ID of users
Average Rating:
Gartner Rates IT Security Companies
IBM, HP, McAfee, Splunk ranked well.
Average Rating:
Hackers Target Western Energy Firms
Appears to be state-sponsored group.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.