Cognitive Fingerprints Biometric Behavioral Identification System

The US military is investing several million dollars in a biometric identification system (Cognitive Fingerprints) that could replace traditional passwords for of the Internet.Cognitive Fingerprints brain

As reported by Sky News, the US military has signed a multimillion-dollar deal with researchers at the West Point military academy. The team of researchers is working on the so-called "cognitive digital " , the Cognitive Fingerprints, which not only use the physical characteristics of one's identification but also the characteristics of the behavior.

West Point researchers are hoping to develop cognitive fingerprint algorithms that learn to recognize patterns of behavior based on how someone uses their mobile device. This means that the algorithm will recognize how someone is handling the smartphone screen, and how it moves the cursor. All these templates are identified and applied to verify the identity of the user.

In a paper the researchers explain:

"Just like when you touch something with your finger you leave a fingerprint behind, when you interact with technology you create a pattern of behaviors based on how your mind processes information. So you leave behind the "cognitive fingerprints."

If the project is successfully developed, this recognition technology φαίνεται να είναι πολύ πιο than traditional passwords or the more modern two-factor authentication.

The military hopes the Cognitive Fingerprints system can be developed and applied to encrypted communications on its service networks as part of Defense Advanced Research Projects Agency (DARPA) programs.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).