Authentication Beyond Passwords

A strong password contains capital and lowercase letters, numbers and some special characters. Done properly, the result is a password that grants access to computer systems to the proper user. The only problem is the password is hard to remember, and it’s not supposed to be written on yellow sticky notes that can sometimes be found on the bottom of keyboards. And don’t get comfortable with this long password; it has to be changed every 90 days or so.

With DARPA’s new Active Authentication program, program manager Richard Guidorizzi would like to change that. Instead of current authentication systems that force humans to adapt to computers, Guidorizzi wants to make computers adapt to the humans that built them in the first place. He wants researchers who will work in the Active Authentication program to investigate innovative software approaches that determine a computer user’s identity through activities a user normally performs.

This changes how things are currently done by removing the secret a human holds, a cumbersome and hard to remember password, and focuses on making the user the actual password. Guidorizzi puts it a different way.

“My house key will get you into my house, but the dog in my living room knows you’re not me. No amount of holding up my key and saying you’re me is going to convince my dog you’re who you say you are.  My dog knows you don’t look like me, smell like me or act like me. What we want out of this program is to find those things that are unique to you, and not some single aspect of computer security that an adversary can use to compromise your system,” Guidorizzi said.

While these identifying aspects of a person are what we hope to use to grant levels of access to computer systems as appropriate, Active Authentication seeks to make you the key to your access, not to track aspects of who you are. Guidorizzi expects researchers to take special care to ensure this program doesn’t violate privacy laws or allow information about a user’s identity to be misused by others.  He doesn’t want to capture user aspects in a database; he only wants to use this information as the key to user access of their computer systems.

Examples of existing research include work with fingerprints, although deployment of sensors makes this more challenging so this program focuses more on software-based solutions. Mouse tracking has received attention as a tool that can validate a person’s identify while sitting at a computer, suggesting this as a possible candidate for further research. In addition, forensic authorship is a field where people are able to identify an author by language usage.

Guidorizzi hosts Active Authentication’s performers day Nov. 18. Those interested in attending can find additional information here.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3