Click me
Transcribed

Death of the Password – Infographic

DEATH OF THE ONE-TIME PASSWORD New hardware, software and emerging technologies are moving us towards a future without the 'one-time password'. A host of companies are aiming to provide the solution, while the FIDO Alliance are starting to implement industry standards. FIDO Alliance fido Alliance Member alliance The FIDO (Fast IDentity Online) Alliance is a The company is a member of the FIDO Alliance. non-profit organisation whose aim is to However, the product in question has yet to be given 'FIDO Ready' status. establish standards for authentication technologies. Their members include Microsoft, Google, Samsung, Visa, MasterCard, PayPal, etc. fido Ready Passwordless Experience (UAF Standards) fido" Second Factor Experience Ready (U2F Standards) Local Device Auth Online Auth Local Device Success Online Auth Sucess Request Auth Request £10,000 Transfer Now Transaction Show a Done Login & Password Insert Dongle Press Button Done Detail Biometric Biometrics Heart Beat ido alliance Apple Patent Nymi Bionym In late 2013 Apple was awarded a patent for a Touch the Nymi with a second hand to complete a circuit, and it will read your ECG. The wristband activates and unlocks registered 'seamlessly embedded heart rate monitor'. There have been no public announcements from Apple. devices once it detects your 'unique cardiac rhythm'. Iris/Eye Recognition eycLock fido Ready Myris Eyelock Eye Verify Video capture is used to read your iris. Eyelock The blood vessels in the white of the eyes claim that there is a 1 in 1.5 million chance of (eyeprint) are pattern matched by an on-device an accidentally matching iris. camera. Fingerprint fido fido Ready Ready IDKE X Series Sonavation Yukey Egistec This key fob doesn't read light, instead it The Yukey is a portable fingerprint dongle that Egistec claim can read 'virtually any finger; dry or wet'. A fingerprint template is created and produces a 3D scan using ultrasound. Sonavation claim that this results in a 'virtually unspoofable authentication'. stored, the template is then used for verification. ONYX fido fido Ready Ready FS7500 Touch Synaptics Oпух Diamond Fortress Synaptics manufacture touchscreens for Apple, Samsung, Dell, etc. They've developed their This software utilizes an on-device camera to read fingerprints. It scans 100 data points so it 'Natural ID' technology to create the FS7500 can compensate for dirt, scratches, etc. DF claim Touch. that Onyx can 'reliably enrol 99% of the population'. Voice Recognition Facial Recognition fido Ready KIVOX Mobile SDK v4.1.0 Agnito DeepFace Facebook DeepFace is the technology behind Facebook's tagging suggestions. A 3D model is generated from images and then matched against a single image, it currently has an accuracy of 97.25%. This software development kit utilizes on-device microphones for voice verification. The detection rate is 99.5%, with a false acceptance of less than 0.1%. Keystroke Dynamics Brain Waves fido alliance Behaviosec Mindwave Mobile Neurosky Keystroke and mouse behaviour are monitored Mindwave is a wearable tech device that on a desktop. Gesture, PIN-pad and typing measures brainwaves (EEG), the mobile version behaviour are all analysed on a touch screen. works with smart phones. A 2013 UC Berkeley Historical records build up a 'biometric profile', project tested it for authentication, error rates any anomalies are flagged up. were below 1%. 7 Finger Vein Ear Shape Peyurrher VeinlD Hitachi Ergo Descartes Biometrics Haemoglobin in the veins partially absorbs infrared light, which enables an image to be Place your ear on the touchscreen of the phone to unlock the device. The app provides recorded. Hitachi claim that there is a 0.0001% adjustable security, so if you choose a higher security setting it may take multiple scans to chance of false acceptance. The tech is used in ATMS in Japan & Poland, while Barclays plan to unlock the device. deploy it in the UK in 2015. Non-Biometrics Security Key Driver Entersekt fido fido Ready Ready Security Key Yubico Transakt Entersekt Installing this driver on your PC and the relevant app onto your phone provides an This key plugs into any USB port, simply touch the device's button to provide authentication. There is no client software, no drivers, and no alternative to carrying a USB token. middleware. In late 2014 Google announced their support for FIDO U2F security keys. Authentication requests are routed across a secure connection to the mobile. SD Cards Wearable Technology GD-Trust Java ms 8GB fido Ready FIDO microSD Go Trust Everykey This microSD makes smart phones and laptops This wristband broadcasts encrypted ready for devices which require FIDO authentication. It contains a cryptographic chip information to identify itself, only the devices associated with the wristband and within range that stores authentication ID. are able to decrypt the information and bypass the password. )O Proximity Devices Body Token Authentication EE UNIVERSITY OF O CAMBRIDGE Pills & Tattoos Proteus Digital Health & MC10 Pico Cambridge University In 2013 when Regina Dugan was at Motorola she showcased a pill (developed by PDH), which reacts with stomach acid and turns the body into an authentication token. Regina also The Pico is a small device which stores your login credentials. It only operates in an 'aura of safety' when near other smaller devices, named Picosiblings. The smaller siblings are wearable showcased a disposable tattoo that's based on accessories, or can be embedded within stretchable circuits developed by MC10. clothing. Mmndww Sound Recognition Face Image Familiarity PASSWORD SlickLogin THE UNIVERSITY of york Facelock Slicklogin Google University of York A series of face arrays are presented, the user An inaudible sound is emitted by a PC, the then selects images they recognise. The university study encompassed 400 participants, smartphone acts as a listening device and it verifies the sound. SlickLogin was acquired by and after a week 97.5% were able to Google in early 2014, after the team had authenticate their account. launched a closed beta. n) Image Authentication Passage Clef First of all registration of an image is required, such as a family photo. Then when logging in, A moving barcode is sent to the phone, the same barcode is also displayed on a second you hold this same image up to the device's screen. When holding the device to the screen, camera. the phone's camera reads the barcode and confirms the match. Servers Servers STRONGAUTH -Securing the Core fido fido Ready Ready Duo Security Strongkey Crypto Engine 2.0 Strong Auth Duo is compatible with U2F devices and The SKCE is free and open-source software browsers, it's a cloud based solution so there is licenced under the GNU Library, it can encrypt no software to install. and decrypt files of any size. Client/Server Technology Nok Nok MicroStrategy LABS fido Ready fido fido Ready alliance Nok Nok Labs Usher Micro Strategy Nok Nok Labs can integrate with virtually any Usher offers a very similar service to Nok Nok authentication method already found on a Labs. The software also utilizes on-device device. All future FIDO Ready authentication methods should be supported. systems to deliver biometric security to a range of applications. Sources agnitio-corp.com allthingsd.com behaviosec.com biometricupdate.com challengepost.com cryptoengine.strongauth.com descartesbiometrics.com everykey.com eyelock.com eyeverify.com fidoalliance.org getclef.com getnymi.com go-trust.com hitachi.eu/veinid/ neurosky.com noknok.com sonavation.com synaptics.com theverge.com yubico.com york.ac.uk diamondfortress.com duosecurity.com egistec.com entersekt.com ischool.berkeley.edu microstrategy.com mypico.org SSLS.com Same certs. Low price

Death of the Password – Infographic

shared by ssls on Jan 22
81 views
0 shares
0 comments
In 2004 Bill Gates predicted the death of the password. It now feels that we’re moving closer to seeing Gates’ prediction come to fruition, but why has it taken so long?

Publisher

SSLs.com

Writer


Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size