Password: Heart - Alternative View

Table of contents:

Password: Heart - Alternative View
Password: Heart - Alternative View

Video: Password: Heart - Alternative View

Video: Password: Heart - Alternative View
Video: Why Big Tech Wants You To Ditch Your Password 2024, September
Anonim

Taiwanese engineers and programmers propose to take a fresh look at the procedure for user authentication in various computing systems. In the beginning there were passwords, then smart cards, then biometric systems. Now it is proposed to use the user's heart, or rather his rhythm, as a "password"

Engineer Chun-Liang Lin from the National University of Zhongxing in Taiwan, says that the heart rate of each person is a kind of unique identifier, since there are no two heart muscles that work with completely identical indicators. Noises, rate of contraction, features of the valves and myocardium - all this is the unique handwriting of this or that person.

The developers of the new concept say that the idea of using the heart as a computer password was prompted by data obtained from electrocardiographs, after studying which the researchers concluded that with all the identity of the work of the heart of different people, there are no two absolutely identical cardiograms and this feature could be used in computing. technique.

Scientists intend to tell in detail about the proposed system in the new issue of the journal Information Sciences. Now the authors of the project say that the system they created creates a secret key based on the data of the heart, which is the main element of an encryption scheme based on the mathematical theory of chaos, when the smallest changes in the data lead to a huge difference in the results of transformations.

The Taiwanese researchers suggest using electronic keys based on the heartbeat not only as a password, but also as a means of decrypting sensitive data. The beauty of the system is that the user himself does not need to have any media with keys with him, since the system will create such a key for him on the fly, before each authentication. The user only needs to let the computer listen to the work of his heart muscle.