Startup To Offer Human Authentication

  /     /     /  
Publicated : 22/11/2024   Category : security


Startup To Offer Human Authentication


Identify Security Software Inc. will launch next week and preview new technology that eschews passwords and biometrics



A new security startup is building a new authentication model with what it describes as a human approach that doesnt use biometrics, passwords or passcodes.
Identify Security Software Inc.
-- which will emerge from stealth mode on Monday -- plans to roll out an authentication product in the next nine months or so that uses a camera that recognizes users by their physical presence, physical attributes, thermal image, facial expressions, and authorized activity, in lieu of traditional passwords and other authentication methods. The system verifies that the user is who he or she says he is via the camera and the known information and attributes of the user, and does so multiple times per second.
The identifyME product currently under development is basically a dynamic access control system that watches the user in action and ensures he or she executes only authorized tasks and access. Identify Security Software describes the approach as person, place and purpose.
Our aim is human recognition by application, says Andre Limarenko, president and chief operating officer of the Boca Raton, Fla.-based startup. The system works with all types of client machines, including mobile devices, he says.
Unlike biometric technology that still requires software, identifyME relies on the cameras recognition of the user on the other end of the endpoint. The company plans to offer its own highly secure camera for sensitive environments, such as utilities or hospitals, but users can employ their machines existing cameras as well, which also communicate with the product, for less sensitive operations.
So when an end user sits in front of his machine or grabs his smartphone, the camera records his physical attributes and location. The moment you walk away, the system sees youre gone, so it shuts down the session, he says.
If a user falls for a targeted phishing attack or malware hits his machine, the application wont allow activity that doesnt fit with the users authorized duties, location and other attributes. We dont stop malware from getting in, but we do stop anyone from entering [from outside] to get data out of the network, he says.
Limarenko says the camera basically determines the level of security a user has access to. If you have mission-critical applications for designs, you wont be looking at it on your iPhone. If you want access to it, you go to a secure location where your PC is, he says.
The user data and authorization is handled on a server in the network or in the cloud that stores the facial recognition, thermal sensing, and GPS data on users. The secret sauce that we bring is the glue that links all those elements together plus a change on the user information repository being in more of a dictionary, less of a database, which doesnt offer backdoors to hackers, according to a description on the companys website.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Startup To Offer Human Authentication