<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          Global EditionASIA 中文雙語Fran?ais
          Opinion
          Home / Opinion / Barry He

          Security passwords should take a walk

          By Barry He | China Daily Global | Updated: 2019-07-15 18:54
          Share
          Share - WeChat

          Could log-in misery soon be a thing of the past?

          [Photo/IC]

          Only when my smartphone died earlier this week did I truly realize just how much we rely on them. My late trusty steed, now outdated by new, faster, and certainly more expensive models on the market, was my lifeline. Importantly and unfortunately for myself, I had become heavily reliant on using password savers and 2 Factor Authentication (2FA) to log into various banking and personal affairs over the last two years. Inevitably, finding and retrieving all the correct log in details and passwords proved to be an arduous and time-consuming process.

          The concept of the computer password was born in the early 1960s. Computing pioneer Fernando Corbato himself admits that he never intended for the use of a security phrase to become so widely relied upon. Unfortunately, computer passwords have become a global mania of hastily jotted down words and infuriating moments when our memories fail us. Corbato has even used the word"nightmare"to describe this escalation of alpha numerical mania.

          The current IT security dogma of not using the same password for everything has led to people having dozens to remember, with each website or app enforcing different rules governing the type or length of the characters you can use. Hackers too have upped their game in recent years, and new virility in keylogging technology in recent years has made passwords more vulnerable than ever.

          Instead, the future of security verification relies on biometric authentication, whether that be scanning your fingerprints, eye, face, and now even the way you walk. Earlier this year a team of researchers from the University of Pretoria and City University of Hong Kong developed a smartphone authentication system based on sensing the way an individual walks. This form of"gait analysis", takes advantage of the fact that as strange bipedal apes, the way we walk differs greatly from person to person. The system uses a smart phones pre-existing hardware to recognize gait patterns, which are then analyzed by a wearable device.

          The beauty of this is that instead of relying on new smartphone handsets equipped with both new biometric features and ever-increasing eye watering prices, this simple but accurate form of biometric data can be analyzed by using the phone's accelerometer. This is a feature which even my recently deceased phone possessed during its lifespan, and one which is readily available on cheap accessible phones across the world.

          No upgrades or new costs are needed in this concept which is being explored by researchers around the world and works by continuously monitoring gait-related data collected by the smartphone. There is no dreaded log in nor any intrusive scanning of fingers or faces, you are just continuously logged in so long as the system can verify that you are you, the simplest and most necessary principle of security verification. All this time while blissfully just walking going about your day to day life.

          In the future, it is not hard to imagine that the system could just email the smartphone owner to notify them if any unusual gait patterns are detected, and allow trust in the accuracy of our unique gait signature for us to be continuously allowing us access.

          We may soon even be able to generate power for our devices through the kinetic energy of our walks. Power and security are two significant factors in our day to day lives as we are constantly glued to our smartphones. In our current ever-complicating world of apps, financial affairs and personal social media profiles, we will need every convenience we can have.

          Humans have enjoyed fully developed brains for several thousand years, yet our memories still fail us when it comes to password verification. We are living in a security system for which we are poorly evolved, but we have been walking upright for around 3 million years. We are certainly more used to doing the latter, and when it comes to smartphone security, maybe it is time to go back to basics.

          Most Viewed in 24 Hours
          Top
          BACK TO THE TOP
          English
          Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 亚洲午夜成人精品电影在线观看| 日产国产一区二区不卡| 亚洲精品中文字幕一二三| 亚洲精品宾馆在线精品酒店| 92精品国产自产在线观看481页| 把女人弄爽大黄A大片片| 亚洲AV蜜桃永久无码精品| 亚洲色大成网站WWW永久麻豆| 国产精品美女一区二三区| 一个本道久久综合久久88| 国产人妻人伦精品无码麻豆| 毛片大全真人在线| 熟妇人妻av中文字幕老熟妇| 色图网免费视频在线观看十八禁| 高清国产一区二区无遮挡| 亚洲欧美日韩在线不卡| 日本韩无专砖码高清观看| 亚洲国产一区二区三区久| 亚洲综合精品成人| 亚洲人成电影在线天堂色| 国产精品福利自产拍久久| 亚洲a毛片| 久久日产一线二线三线| 国产成人无码a区在线观看导航| 国产一区二区三区啪| 亚洲欧洲一区二区免费| 一区二区三区四区自拍视频| 国产亚洲精品综合99久久| 国产综合精品一区二区三区 | 一区二区三区四区亚洲自拍| 91精品国产高清久久久久久g| 亚洲AV无码一区二区二三区软件| 最新精品国产自偷在自线| 人人澡人摸人人添| 性色av无码久久一区二区三区| 精品久久香蕉国产线看观看亚洲| 亚洲嫩模一区二区三区视频| 久久99久久99精品免视看国产成人| 亚洲国产精品综合一区二区| 2021国产精品视频网站| 青青青视频免费一区二区 |