systems:security
Differences
This shows you the differences between two versions of the page.
Next revisionBoth sides next revision | |||
systems:security [2013/11/18 23:43] – created superwizard | systems:security [2013/11/18 23:46] – superwizard | ||
---|---|---|---|
Line 14: | Line 14: | ||
But instead of having to read the password off the token and retype it, employees can simply plug | But instead of having to read the password off the token and retype it, employees can simply plug | ||
the token into a USB port or touch it on a mobile device using near-field communication | the token into a USB port or touch it on a mobile device using near-field communication | ||
+ | | ||
+ | risk-based authentication. This technology sifts through masses of user data from various groups | ||
+ | at a company to establish " | ||
+ | | ||
+ | Test subjects in the research wore a headset that measured their brain-wave signals as they imagined | ||
+ | performing a particular task, and the researchers were able to distinguish between different people | ||
+ | with 99% accuracy. | ||
+ | | ||
+ | London-based PixelPin Ltd., meanwhile, wants to replace passwords with pictures. Choose a picture of | ||
+ | your spouse, for example, and log in by clicking on four parts of her face in a sequence you've memorized |
systems/security.txt · Last modified: 2019/03/30 05:03 by superwizard