New Anti-Theft System Monitors Your Touchscreen Behavior

bad-guy-steaks-phone

Since phones are both small and valuable, they tend to be a hot item for many thieves, but some new anti-theft technologies may help deter phone burglary.

Last year, in the US alone, lost and stolen phones cost consumers over $30 billion.  Many initiatives have been discussed to abate this expense, such as fingerprint scanners and even a proposed national cell phone kill switch, but it’s so easy to steal a cell phone.  There has yet to be a foolproof method, but there are always more innovative new ways to stop a would-be thief emerging.

Researchers at Georgia Tech have been testing brand new system for Android called LatentGesture that monitors the way you use your cell phone–specifically the way you interact with the screen–and learns to watch for your unique behavior.  It then uses your behavior to monitor your device for anyone that doesn’t behave like you, and locks them out.

Everyone has a unique pattern with the way they interact–touch, tap, and swipe–at their touch screens.  The way we interact with our technology can be just as unique as our fingerprint or retinal scan.

The beauty of this system is that even if someone manages to guess a PIN code or password to access a stolen phone, they are still constantly being scrutinized by the software and will likely end up getting locked out anyway if they shouldn’t be poking around.  The software was found to be 98% accurate on phones and 97% accurate on tablets.  Considering Apple’s Touch ID only works 90% of the time for some users, this could be a much more reliable solution.

Behavioral security is also inherently stronger than any fixed or static security methods such as biometric scanners for fingerprints or irises, because fingerprints and irises are static.  They can be stolen and faked.  The problem when someone steals your fingerprints is that they are permanently attached to your body and cannot be changed.

Behaviors are extremely difficult to steal and even more difficult to mimic.  Accurately observing the way someone interacts with their phone for a long enough period of time is extremely difficult.  It’s not specified how detailed of a sample is collected by LatentGesture, but there are so many different and unique ways to interact with your touch screen from the distance and arc of a swipe the the staccato of a tap, “stealing” someone’s behavior is far more difficult than stealing their fingerprint, especially for a snatch and grab.

Phones are easy to steal, and the technology necessary to crack security is always hot on the heels of new security developments, but hopefully some new anti-theft initiatives–such as LatentGesture–will go a long way towards curbing the rampant phone theft.

Source: Engadget

Be social! Follow Walyou on Facebook and Twitter

Read more on Walyou, The Paradox of the WearableGoogle Might Become Your New Favorite Carrier

Apple Takes Two New Medical Sensor Experts on Board


Apple has just hired two additional staff members to help it in its sensor products-related team. Nancy Dougherty and Ravi Narasimhan have joined the huge conglomerate and are avidly lending their...

Guy Inserts Computer into Arm with No Help from Doctors

Some guys are just super hardcore. Like Rambo hardcore. Able to stitch themselves up on the battlefield hardcore. Take this guy for instance. A man named Tim Cannon is a “biohacker,” and he had himself opened up and inserted a computer chip in his arm -with no doctor helping. I must be a wimp, because there is no way I could do this.
biohacker 620x348magnify


Don’t try this at home kids. Being a walking computer just isn’t worth it. Tim had a large “Circadia” board implanted into his arm. It is even larger than normal due to a special case. The chip is powered by a battery but can also be charged wirelessly.

biohacker 2magnify

This chip sends all of Tim’s biometric signals to an Android device. He would have used a doctor, but he says that no certified doctor could preform the operation to implant the device. So he had a “body modification enthusiast” named Steve Haworth do the surgery. Sadly for Tim, Steve isn’t an official medical practitioner, so he wasn’t licensed to use anesthetics. That had to be painful.

Here’s an update from Tim showing off the wireless charging process for his arm-implanted computer:

Have fun monitoring your biometric signals, Tim. My idea of fun is playing video games.

[via Motherboard via Kotaku]

iPhone 5s fingerprint reader has a timed safeguard, dislikes sweaty digits

iPhone 5S' fingerprint sensor has a 48hour unlock window, dislikes sweaty digits

Beyond the basics, Apple has said little of how the iPhone 5s Touch ID fingerprint reader works -- we mostly know that it's inaccessible to the outside world. Thankfully, the company has shed further light on Touch ID through statements to the Wall Street Journal. To start, iPhone owners will have to unlock with a passcode if they either reboot or haven't unlocked within 48 hours. The safeguard prevents hackers from simply biding their time while they look for a workaround, Apple says. Legitimate users will also want to keep their hands dry, as the reader doesn't work well with fingers covered in sweat and other liquids. You won't want to try unlocking immediately after running, then, but it's evident that Apple already knows many of Touch ID's real-world limitations.

Filed under: , ,

Comments

Source: Wall Street Journal (1), (2)

iPhone 5s fingerprint reader authentication isn’t open to developers for time being

So, you know fancy new fingerprint reading home button Apple showed off for the iPhone 5s at today's event? The company demonstrated functionality for unlocking and buying stuff through iTunes. Cool, but what about third-party apps? We can imagine all sorts of neat uses not limited to buying stuff. For the time being, however, the authentication functionality is off-limits. Apple exec Phil Schiller told All Things D that the hardware won't be opened to developers initially. As to whether that functionality will be arriving in the future, Apple's not ready to say just yet.

Filed under: , ,

Comments

Source: All Things

Nymi Bracelet Replaces Passwords With Your Heartbeat

Nymi

Bionym takes security one step further with Nymi, which combines Bluetooth proximity detection technology and electrocardiograms to create a new authentication process. The device is meant to be worn as a bracelet and measures the wearer’s cardiac rhythm, which is unique to each person. This rhythm is then used as a password of sorts to unlock digital and physical devices, from smartphones and laptops to doors and other objects.

Once Nymi recognizes the wearer’s heartbeat, it communicates wirelessly to unlock nearby devices. It’ll keep going until the wearer removes it or when someone else wears it. At that point, it will detect a different cardiac rhythm and lock that person out.

The Nymi is also equipped with a proximity sensor and motion detector, which enables gesture command recognition. Bionym is hunting around for developers to work with to extend the capabilities and usefulness of the device.

Nymi is available for pre-order at $79 for the first 25,000 people. After that, it’s price will go up to $99. The first batch of devices will be compatible with Android, iOS, Macs, and Windows device, and are scheduled to ship out in early spring of 2014.

VIA [ Engadget ]

Nymi bracelet uses biometric heart data to unlock digital and physical doors (video)

Bionym's Nymi bracelet authenticates through a heartbeat

Unlike faces and fingerprints, a heart's electrical activity is difficult to fake -- it's a unique and potentially ideal security tool. Bionym is taking advantage of this trustworthiness in its upcoming Nymi bracelet. The wristwear authenticates users through a combination of electrocardiograms and Bluetooth proximity detection; if Nymi recognizes your heart rhythm, it automatically logs you into nearby devices. The bracelet also recognizes gesture commands, and a future developer kit should extend the gadget's usefulness beyond basic security for PCs and smartphones. It could unlock doors or make retail payments, for example. Nymi won't ship until early 2014, but it's already available for pre-order at a $79 early bird price.

Filed under:

Comments

Via: The Verge

Source: Bionym

Dual-SIM HTC One Max for China Unicom leaked, may pack a fingerprint reader

DualSIM HTC One Max for China Unicom leaked, may pack a fingerprint reader

Much like HTC itself, leaksters have also been hard at work to help promote this company. Courtesy of ePrice, the latest spy shots feature the upcoming 5.9-inch One Max, and specifically, this is a dual-SIM model destined for China Unicom. Like the One Dual (or better known as 802w, 802t or 802d in China), this much bigger device sports a removable metallic back cover for access to the dual SIM slots, along with what appears to be a microSD slot at the top right corner. There are also a set of docking pins towards the bottom right on the back, so chances are we'll see official dock accessories for this bad boy.

Filed under: , ,

Comments

Via: Engadget Chinese

Source: ePrice

iPhone Radio Dock with Hidden Safe Drawer

cannon radio vault iPhone Radio Dock with Hidden Safe Drawer
Play some music and secure your valuables closely at hand with the RadioVault iPhone Radio Dock with Hidden Safe Drawer from Cannon Security. This iPhone speaker dock has a alarm clock and an FM radio as well. Sit it inconspicuously in your home. But inside it’s hidden drawer, it safely secures your wallet, keys, money, jewelry or more. When the drawer is closed it looks like one of the speakers:
cannon radio vault closed iPhone Radio Dock with Hidden Safe Drawer
Hide your stuff in plain sight! The 9.5″ by 6.75″ by 1.75″ safe is opened via a biometric fingerprint scanner for added security. The steel reinforced door is spring loaded to pop open when your fingerprint is scanned. The scanner can actually be programmed to learn 120 different fingerprints (which I’d guess is about 118 more than most people will need). The dock charges your iPhone and can use it as one or both of the dual alarms, as well as display the date and time. An aux cable is included to play nicely with other MP3 devices.

buy now iPhone Radio Dock with Hidden Safe Drawer

iPhone Radio Dock with Hidden Safe Drawer

Paytouch lets your fingerprints make purchases, hopes to expand into Europe and America next year

Paytouch lets your fingerprints make purchases, hopes to expand into Europe and America next year

The business of commerce is alive and well, and while there's far too much noise for anyone to stand on the mobile side, Paytouch is hoping to add a new wrinkle on the conventional end. The Barcelona-based outfit was on hand here at The Next Web Conference, showcasing its biometric payment terminal and setting the stage for what's to come. For those unfamiliar, the Paytouch terminal is currently being used at Ushuaïa Ibiza Beach Hotel -- users with a Paytouch account simply link their credit card to their fingerprints, and a two-finger press is all it takes to order another glass of sangria. The benefits are fairly obvious for all parties involved. For the consumer, there's no longer a need to carry a credit card that can be skimmed, lost or stolen; for the retailer, it's able to encourage impulse buying in an entirely new way; for Paytouch, there's a commission paid on each purchase.

Filed under:

Comments

Source: Paytouch