• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 23rd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News

You can soon securely unlock smartphone with your “body sweat”

November 13th, 2017 Carolina Technology News 0 comments
You can soon securely unlock smartphone with your “body sweat”
Share on FacebookShare on Twitter

As incredulous as it sounds, it is indeed true that scientists at “University at Albany” in the US have developed a new biometric based verification concept that utilizes our body sweat to unlock wearable devices and smartphones. Researchers explained that this new approach relies upon analyzing the skin secretions, that is, sweat to generate a unique amino acid profile. This profile is associated with the owner of the device.

The profile gets stored inside the device and is later used to authenticate the owner every time he or she attempts to unlock the device. As per an assistant professor at the University at Albany, Jan Halamek, this method might serve as a “new form of security,” and quite possibly it can fully transform the verification procedure used by electronic devices.

“Using sweat as an identifier cannot be easily mimicked/hacked by potential intruders. It is close to full- proof,” explained Halamek.

The reason why this new approach seems legit and useful as an identity authentication mechanism is that skin secretions contain various small molecules also called metabolites. Each of these molecules can be targeted for performing authentication.

To create a user’s profile, the device will undergo a stage that is referred to as Monitoring Period by the research team. During this phase, the device would measure the sweat levels of the owners continuously, and at different times of the day. After the profile development phase is over, the owner will be verified when holding or wearing the device.

[fullsquaread][/fullsquaread]

It is evident that this new approach will improve the authentication methods that are being used nowadays. Researchers claim that the current modes of user verification are not much reliable and this is why there is a dire need for a more straightforward and accurate method.

Moreover, it will be helpful for disabled people or those who are unable to move their fingers in a certain direction to unlock the device. Moreover, there won’t be any need to memorize a password. As Halamek noted:

[q]Your sweat will be the most secure password for your smartphone[/q]

“Passwords and pins can easily be seen over someone’s shoulder, and there are many internet tutorials on how to create a fingerprint mold that is capable of opening a device. There are also issues with facial recognition, which often does not work correctly.”

The analysis was tested by Halamek, who led this research study, and achieved success; now he is thinking about collaborating with engineers to initiate the implementation process. The study was published [PDF] in the journal ChemPhysChem.

Source: University at Albany News | H/T: Deccan Chronicle

  • Tags
  • Biometric
  • Energy
  • internet
  • Password
  • Privacy
  • security
  • Smartphone
  • Technology
Facebook Twitter LinkedIn Pinterest
Previous article Homeland Security Hackers Remotely Hack Boeing 757
Next article NSA rocked after The Shadow Brokers Breach
Carolina

Carolina

Carolina works for HackRead as a technical writer. She is a Brazilian traveller who has been to almost every country around the world. She has a keen interest in technology, gadgets and social media.

Related Posts
What are the future prospects of a Cloud architect?

What are the future prospects of a Cloud architect?

Study: Android sends more data to Google than iOS to Apple

Study: Android sends more data to Google than iOS to Apple

A child sent out gibberish tweet from official US Nuclear-agency account

A child sent out gibberish tweet from official US Nuclear-agency account

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Hacked Android phones mimicked connected TV products for fake ad views
Cyber Crime

Hacked Android phones mimicked connected TV products for fake ad views

Signal CEO hacks Cellebrite cellphone hacking, cracking tool
Hacking News

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Play Store apps plagued with malware have 700,000 downloads
Security

Play Store apps plagued with malware have 700,000 downloads

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us