Phones can now determine who uses them. Innovation or espionage

Biometry

In recent years, hackers have made it increasingly difficult for individual cybersecurity companies to redouble their efforts and try to fool the multiple cyber protections that tried to block your path to your illicit business.

Many of his cyber attacks consisted of identity theft And to deal with them, more advanced security mechanisms were developed, such as fingerprint recognition, but here too, hackers found a way around it.

To overcome all these shortcomings, a more advanced level of security has been implemented and it is able to identify people based on elements that are more difficult to copy, such as gait.

Biometrics the new way to identify behaviors

This new system is based on behavioral biometrics. More specifically, this system will use sensor-based data from phones to determine and record how people hold their phones when they use them, how they use them, and how they work.

This system can also analyze actions performed on touchscreens, keyboards, and mice to determine the different ways that users' hands and fingers move.

The sensors detect whether the phone has been placed on a hard surface, such as a table, or soft, such as a bed.

Once all this data is collected, the system can establish a corresponding unique profile to the owner of the phone and therefore be able to determine whether a person trying to use the device is the regular user or not.

John Whaley, Director of UnifyID, a Silicon Valley company, explains that behavioral biometrics makes it possible to uniquely identify the fingerprint of an individual's movement.

Y phone sensor data, combined with the right software, could do even more, such as determining if the phone in question is in a trouser bag, in a pocket, in one hand or even if it is carried in another object or if it is found in another part of the body (chest, foot, forearm, etc.)

Fate is noble, but use can be detrimental

Biometric sensors

Behavioral biometrics is useful for gathering very important information that uniquely identifies each user.

But its application is not limited to verifying the identity of a user, it can also be used to determine the circumstances in which fraud is likely to be committed.

For example, we know that most people type with their thumbs on their smartphone keyboard touch screens, so the time between 2 keystrokes is longer. So from the moment this weather changes, it will become suspicious.

When you think about it, you can only think about such a breakthrough, given the vast possibilities of use it offers.

UnifyID and a car manufacturer even develop a system to unlock the doors of a vehicle once the driver's gait is recognized, measured by his phone.

However, It should be noted that some may use behavioral biometrics for less noble purposes, such as espionage.

We would end up with devices in our pockets that would allow malicious people to monitor our actions all day.

But also this can be one more step for user tracking by advertising companies and even from social networks in order to put even more "advertising", recommend applications, places, etc.

And this is not new, since if we only think of Google Maps, it records our locations throughout the day, the time at each point, the routes made during the point-to-point movement and more.

This information in the hands of others can be a great threat to the integrity of the user, since you never know the purposes for which all this is used.

Even if Google says that this information is collected to recommend places, venues, etc. From the point of view of many this is a total violation of user privacy. 


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.