Analytics
5/30/2013
04:06 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Startup To Offer 'Human' Authentication

Identify Security Software Inc. will launch next week and preview new technology that eschews passwords and biometrics

A new security startup is building a new authentication model with what it describes as a "human" approach that doesn't use biometrics, passwords or passcodes.

Identify Security Software Inc. -- which will emerge from stealth mode on Monday -- plans to roll out an authentication product in the next nine months or so that uses a camera that recognizes users by their physical presence, physical attributes, thermal image, facial expressions, and authorized activity, in lieu of traditional passwords and other authentication methods. The system verifies that the user is who he or she says he is via the camera and the known information and attributes of the user, and does so multiple times per second.

The identifyME product currently under development is basically a dynamic access control system that watches the user in action and ensures he or she executes only authorized tasks and access. Identify Security Software describes the approach as "person, place and purpose."

"Our aim is human recognition by application," says Andre Limarenko, president and chief operating officer of the Boca Raton, Fla.-based startup. The system works with all types of client machines, including mobile devices, he says.

Unlike biometric technology that still requires software, identifyME relies on the camera's recognition of the user on the other end of the endpoint. The company plans to offer its own highly secure camera for sensitive environments, such as utilities or hospitals, but users can employ their machines' existing cameras as well, which also communicate with the product, for less sensitive operations.

So when an end user sits in front of his machine or grabs his smartphone, the camera records his physical attributes and location. "The moment you walk away, the system sees you're gone, so it shuts" down the session, he says.

If a user falls for a targeted phishing attack or malware hits his machine, the application won't allow activity that doesn't fit with the user's authorized duties, location and other attributes. "We don't stop malware from getting in, but we do stop anyone from entering [from outside] to get" data out of the network, he says.

Limarenko says the camera basically determines the level of security a user has access to. "If you have mission-critical applications for designs, you won't be looking at it on your iPhone. If you want access to it, you go to a secure location where your PC is," he says.

The user data and authorization is handled on a server in the network or in the cloud that stores the facial recognition, thermal sensing, and GPS data on users. "The secret sauce that we bring is the 'glue' that links all those elements together plus a change on the user information repository being in more of a dictionary, less of a database, which doesn't offer backdoors to hackers," according to a description on the company's website.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Tedlschroeder
50%
50%
Tedlschroeder,
User Rank: Apprentice
6/13/2013 | 6:32:35 PM
re: Startup To Offer 'Human' Authentication
I'd like to know how it solves the problem with the Android face recognition when the light is "wrong". My Android doesn't even see me when the light is too low and when it's super sunny it doesn't have enough contrast to see me either.
J-Lo
50%
50%
J-Lo,
User Rank: Apprentice
6/8/2013 | 6:51:21 PM
re: Startup To Offer 'Human' Authentication
Kelly, how different is this app from face recognition software available in Android smart phones?
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0640
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to bypass intended restrictions on resource access via unspecified vectors.

CVE-2014-0641
Published: 2014-08-20
Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users.

CVE-2014-2505
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to trigger the download of arbitrary code, and consequently change the product's functionality, via unspecified vectors.

CVE-2014-2511
Published: 2014-08-20
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.

CVE-2014-2515
Published: 2014-08-20
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.