Iris recognition gadget eliminates passwords

I am still searching for solution for passwordless access in my system and all those many many web pages 🙂 solution is maybe there. But do I want to spend 99$ on it, that’s the question?

Designed by the Hoyos Group, a device called EyeLock uses iris-recognition as an alternative to passwords to log you in to password-protected Web sites and applications. Hoyos calls EyeLock “the first and only portable iris-scanning device for consumers.”

Is int it nice to have this tiny gadget siting on your table and just checking your eye and you have access to all that you have defined to be able to access on your pc using this nice gadget. This thing eliminates you to remember those 1 million password that you have and those all pages, and good thing is that while you have no more need to remember those many passwords, you may wanna generate automatically really really wickedly long passphrases.  It uses usb connector and before you start it will take snapshot of your iris just to confirm that you are you. 🙂

The company who made this nice gadget says that the device is unhackable. Every time you log in, it reads your iris and creates a unique key, which is a series of numbers, and this key changes every time you log in, so no one can hack it.

You can’t compare this to fingerprint security. While fingerprints have somewhere around 18 unique points that allow you to identify who they belong to, your iris has 2,000 points. And as you have seen in movies when they cut your eye out and put in front of scanner, this wont work, because ones you dead your iris flattens and is not the same iris that was before. So even if you die they will not be able to get this thing running.

I think this is really nice gadget that can make life more easy for many people since passwords are going to kill our brain 🙂

References:

http://finance.yahoo.com/news/Finovates-EyeLock-uses-iris-cnnm-2411950306.html?x=0&.v=2

http://news.cnet.com/8301-1009_3-20062254-83.html

Advertisements
This entry was posted in IT Security, Week 20. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s