Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/30/2013
04:06 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Startup To Offer 'Human' Authentication

Identify Security Software Inc. will launch next week and preview new technology that eschews passwords and biometrics

A new security startup is building a new authentication model with what it describes as a "human" approach that doesn't use biometrics, passwords or passcodes.

Identify Security Software Inc. -- which will emerge from stealth mode on Monday -- plans to roll out an authentication product in the next nine months or so that uses a camera that recognizes users by their physical presence, physical attributes, thermal image, facial expressions, and authorized activity, in lieu of traditional passwords and other authentication methods. The system verifies that the user is who he or she says he is via the camera and the known information and attributes of the user, and does so multiple times per second.

The identifyME product currently under development is basically a dynamic access control system that watches the user in action and ensures he or she executes only authorized tasks and access. Identify Security Software describes the approach as "person, place and purpose."

"Our aim is human recognition by application," says Andre Limarenko, president and chief operating officer of the Boca Raton, Fla.-based startup. The system works with all types of client machines, including mobile devices, he says.

Unlike biometric technology that still requires software, identifyME relies on the camera's recognition of the user on the other end of the endpoint. The company plans to offer its own highly secure camera for sensitive environments, such as utilities or hospitals, but users can employ their machines' existing cameras as well, which also communicate with the product, for less sensitive operations.

So when an end user sits in front of his machine or grabs his smartphone, the camera records his physical attributes and location. "The moment you walk away, the system sees you're gone, so it shuts" down the session, he says.

If a user falls for a targeted phishing attack or malware hits his machine, the application won't allow activity that doesn't fit with the user's authorized duties, location and other attributes. "We don't stop malware from getting in, but we do stop anyone from entering [from outside] to get" data out of the network, he says.

Limarenko says the camera basically determines the level of security a user has access to. "If you have mission-critical applications for designs, you won't be looking at it on your iPhone. If you want access to it, you go to a secure location where your PC is," he says.

The user data and authorization is handled on a server in the network or in the cloud that stores the facial recognition, thermal sensing, and GPS data on users. "The secret sauce that we bring is the 'glue' that links all those elements together plus a change on the user information repository being in more of a dictionary, less of a database, which doesn't offer backdoors to hackers," according to a description on the company's website.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
J-Lo
50%
50%
J-Lo,
User Rank: Apprentice
6/8/2013 | 6:51:21 PM
re: Startup To Offer 'Human' Authentication
Kelly, how different is this app from face recognition software available in Android smart phones?
Tedlschroeder
50%
50%
Tedlschroeder,
User Rank: Apprentice
6/13/2013 | 6:32:35 PM
re: Startup To Offer 'Human' Authentication
I'd like to know how it solves the problem with the Android face recognition when the light is "wrong". My Android doesn't even see me when the light is too low and when it's super sunny it doesn't have enough contrast to see me either.
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.