EyeLock brings biometric security to your websites

May 13, 2011 by Katie Gatto weblog
EyeLock brings biometric security to your websites

(PhysOrg.com) -- Biometric security is always a field of interest for those people who need to keep your data secure. Currently, it is used in a wide variety of high security applications, mostly by large companies with large amounts of customer data to protect. But, in the future you may be able to use a retinal scan to sign into your favorite social networking sites such as Facebook, and your email.

The company behind this idea is the Hoyos Group which is a New York-based company that was founded in 2005. They have created a new product, called EyeLock, which was first unveiled at the Finovate conference in San Francisco. The device, which is a portable iris-scanner about the size of a business card, is also a USB drive. This allows it to work with a variety of machines.

Once the user has installed a special program they can choose which applications to EyeLock. You can give the system software your log in information for those sites. The next time you want to sign into your favorite site all you have to do is hold the scanner in front of your eye. The tool will then automatically log you into your site. Users who wear glasses will be happy to find out that they do not have to remove them in order to complete the scan.

This will be the first time that iris will be an option for users on the consumer market. Since it will allow for the tracking of multiple log on the devices will no doubt be convenient. Though it may make signing onto your favorite sites more secure users should be aware that if they lose the device they will have a lot of different passwords to change since no device is un-hackable and the passwords are stored on it.

Explore further: Tired of Passwords? Replace Them With Your Fingerprint

More information: www.hoyos.com/Products/ConsumerProducts.aspx
via CNET

Related Stories

Tired of Passwords? Replace Them With Your Fingerprint

September 14, 2004

If you're like most people, you have more than a dozen passwords and user names to remember. Whether you're checking your e-mail for new messages, catching up on the news, posting to a Web discussion group, or playing games ...

Gawker hack underscores flaws with passwords

December 19, 2010

The fallout from a hacking attack on Gawker Media Inc. a week ago underscores a basic security risk of living more of our lives online: Using the same username and password for multiple sites is convenient, but costly.

Help! How to avoid fast-moving computer worm

January 28, 2009

Since early January, a worm that has been referred to by several names, including "Downadup," "Kido" and "Conficker," has been infecting millions of computers around the world. The worm exploits a previously discovered vulnerability ...

Hackers turn PlayStation into pay station

May 10, 2011

In late April, a hacker crippled Sony’s PlayStation Network by stealing the names, home addresses and perhaps even the credit card numbers of some 70 million subscribers, who play and download games through the online ...

Recommended for you


Adjust slider to filter visible comments by rank

Display comments: newest first

4 / 5 (1) May 13, 2011
They really missed the boat on this product... If they had made it a hardware/software combo, where sensitive password data is encrypted on your PC, then losing the device wouldn't be such an issue.

Having all my passwords on (basically) a flashdrive for all to steal is simply not something I'd be willing to buy into.

That being said, I'm looking forward to the day that someone gets this right - I can't wait to stop remembering passwords.
1 / 5 (1) May 13, 2011
Sounds like another great plan for human liberty and free communication. Why don't just skip all the hand-wringing and transition years and jump straightaway into global dictatorship and social control matrices?

It would save us the pain and dissonance of watching our formerly free republic collapse into the less elegant social configuration known as "tyranny" and "oppression."

This condition results from the combination of evil and limitless power, and historically occurs immediately before a major war destroys the deranged society or internal revolution purges its derangement. The branch between war and revolution is determined by the totality of control that society exerts over its citizens.

Fortunately we live in a society that has little control over our movements and possessions, so I predict revolution as the inevitable result of today's factional rule.
not rated yet May 17, 2011
I'm pretty sure a smart hacker could catch the data easily in an interface between software and whatever Internet page. As there is malware out there which already steals what you type with your keyboard or alters the information in realtime, what should be the big deal for them to program something for those devices?

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.