Sending a password or secret code over airborne radio waves like WiFi or Bluetooth means anyone can eavesdrop, making those transmissions vulnerable to hackers who can attempt to break the encrypted code.
Now, University of Washington computer scientists and electrical engineers have devised a way to send secure passwords through the human body — using benign, low-frequency transmissions generated by fingerprint sensors and touchpads on consumer devices.
“Fingerprint sensors have so far been used as an input device. What is cool is that we’ve shown for the first time that fingerprint sensors can be re-purposed to send out information that is confined to the body,” said senior author Shyam Gollakota, UW assistant professor of computer science and engineering.
These “on-body” transmissions offer a more secure way to transmit authenticating information between devices that touch parts of your body — such as a smart door lock or wearable medical device — and a phone or device that confirms your identity by asking you to type in a password.
This new technique, which leverages the signals already generated by fingerprint sensors on smartphones and laptop touchpads to transmit data in new ways, is described in a paper presented in September at the2016 Association for Computing Machinery’s International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016) in Germany.
“Let’s say I want to open a door using an electronic smart lock,” said co-lead author Merhdad Hessar, a UW electrical engineering doctoral student. “I can touch the doorknob and touch the fingerprint sensor on my phone and transmit my secret credentials through my body to open the door, without leaking that personal information over the air.”
The research team tested the technique on iPhone and other fingerprint sensors, as well as Lenovo laptop trackpads and the Adafruit capacitive touchpad. In tests with 10 different subjects, they were able to generate usable on-body transmissions on people of different heights, weights and body types. The system also worked when subjects were in motion — including while they walked and moved their arms.
“We showed that it works in different postures like standing, sitting and sleeping,” said co-lead author Vikram Iyer, a UW electrical engineering doctoral student. “We can also get a strong signal throughout your body. The receivers can be anywhere — on your leg, chest, hands — and still work.”
The research team from the UW’s Networks and Mobile Systems Labsystematically analyzed smartphone sensors to understand which of them generates low-frequency transmissions below 30 megahertz that travel well through the human body but don’t propagate over the air.
The researchers found that fingerprint sensors and touchpads generate signals in the 2 to 10 megahertz range and employ capacitive coupling to sense where your finger is in space, and to identify the ridges and valleys that form unique fingerprint patterns.
Normally, sensors use these signals to receive input about your finger. But the UW engineers devised a way to use these signals as output that corresponds to data contained in a password or access code. When entered on a smartphone, data that authenticates your identity can travel securely through your body to a receiver embedded in a device that needs to confirm who you are.
Their process employs a sequence of finger scans to encode and transmit data. Performing a finger scan correlates to a 1-bit of digital data and not performing the scan correlates to a 0-bit.
The technology could also be useful for secure key transmissions to medical devices such as glucose monitors or insulin pumps, which seek to confirm someone’s identity before sending or sharing data.
The team achieved bit rates of 50 bits per second on laptop touchpads and 25 bits per second with fingerprint sensors — fast enough to send a simple password or numerical code through the body and to a receiver within seconds.
This represents only a first step, the researchers say. Data can be transmitted through the body even faster if fingerprint sensor manufacturers provide more access to their software.
Learn more: Secure passwords can be sent through your body, instead of air
The Latest on: Secure passwords
[google_news title=”” keyword=”secure passwords” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
The Latest on: Secure passwords
- A shockingly high number of us are still reusing passwords — and lots are even writing them downon April 27, 2024 at 5:18 am
Despite security experts constantly warning about the risks of reusing passwords, a shockingly high number of people still do just that - and to make matters worse, many are even writing them down on ...
- New Apple ID Password Reset Issue Hitting iPhone, iPad And MacBook Userson April 27, 2024 at 2:06 am
Phone, iPad and MacBook users are waking up to find themselves logged out of their Apple accounts and forced to reset their Apple ID passwords and nobody knows why.
- Best iPhone Password Manager In Canada For 2024on April 26, 2024 at 7:24 am
Kathy Haan, MBA is a former financial advisor-turned-writer and business coach. For over a decade, she’s helped small business owners make money online. When she’s not trying out the latest tech or ...
- 13 Passwords You Should Never Use Because Every Hacker Knows Them Alreadyon April 25, 2024 at 5:51 am
Discover the 13 most vulnerable passwords that hackers love to exploit. Learn why it's crucial to use strong, secure passwords to safeguard your online identity.
- Are Password Managers Safe? Everything To Knowon April 24, 2024 at 5:03 pm
Are password managers safe? Yes! Discover the different types of password managers and how they keep your passwords safe.
- Tired of getting those mysterious password reset emails? Here’s what to do about iton April 24, 2024 at 7:00 am
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
- Brute Force Password Cracking Takes Longer, But Celebration May Be Prematureon April 24, 2024 at 5:00 am
Brute force cracking of passwords takes longer now than in the past, but the good news is not a cause for celebration, according to the latest annual audit of password cracking times released Tuesday ...
- New Password Cracking Analysis Targets Bcrypton April 24, 2024 at 3:22 am
Hive Systems conducts another study on cracking passwords via brute-force attacks, but it’s no longer targeting MD5.
- 7 Best Windows Password Managers of 2024on April 23, 2024 at 1:46 pm
The best Windows password managers come packed with leading security features like multifactor authentication and data breach alerts. They offer terrific value and easy compatibility for Microsoft and ...
via Bing News