Thursday, April 25, 2024

En Route to Security 3.0

- Advertisement -

Mostly, the system relies on facial recognition. Using a profile picture, it tries to understand a person’s unique features, such as say, the number of pixels between her eyes. Then, every time that person approaches a protected area, the SafeRise system tries to compare all the special features it has stored. If you watch the output of the security camera, the software puts a yellow box over anything that registers as a face. If it recognises the face, the box turns green, else it turns red and the door remains locked. As the system ‘watches’ the person more, it assimilates more biometric details about her including her gait and voice. The more it learns about the person, the faster it identifies the person. SafeRise is incorporated into FST products like the Digital Doorman.

Quantum leap in mobile phone security
Considering the amount of transactions people are conducting using mobile devices, researchers have now started considering mobile security on the same lines as banking security! A team at the University of Bristol, in collaboration with Nokia, recently demonstrated how quantum cryptography using Quantum Key Distribution (QKD), a bulky and expensive technique currently used for securing fixed physical locations like server rooms in banks, could be used to implement an ultra-high security scheme for mobile devices. New hope comes from the team’s efforts to reduce the bulky and expensive resources required for quantum cryptography, so that it can be implemented by simply integrating an optical chip into a mobile handset.

This is basically a client-server QKD scheme, wherein the cumbersome equipment, such as the laser and detectors, are located at the server side and are accessible to a client over a communication network. The client only requires an on-chip polarisation rotator, which may be integrated into a handheld device. While the experiments seem successful, the team is now working towards implementing the client-server QKD system in a real communications network.

- Advertisement -

More examples, all around us
There are lot more interesting developments in security across the world—and most of them accurately reflect the changing mindsets of people and the newer threats of networking, increased mobile usage, cloud computing and the Internet of things. For example, a decade ago people would not have thought of do-it-yourself customised home security using sensor-software kits but today people need it to protect their privacy and changing lifestyles. Likewise, nobody would have even imagined that it would become necessary to protect trivial devices like, say, the printer. But, with almost all devices getting connected to the corporate or home network, every device becomes a point of vulnerability.

The threats faced by people today are much more—thanks to the technologies that seemingly promise to make life easier for them, and that means more sleepless nights for technologists paving the way for security X.0!


The author is a technically-qualified freelance writer, editor and hands-on mom based in Chennai

SHARE YOUR THOUGHTS & COMMENTS

Unique DIY Projects

Electronics News

Truly Innovative Tech

MOst Popular Videos

Electronics Components

Calculators