(Literally) Put a Ring on It: Protecting Biometric Fingerprints
Kaspersky creates a prototype ring you can wear on your finger for authentication.
It sounds more like science fiction, but it's basically another mode of authentication: Kaspersky has developed a wearable ring with a stone storing a unique "fingerprint" for authenticating to biometric systems.
The security firm, with the help of a 3D accessory designer, designed the ring, which contains a unique fingerprint made up of conductive fibers sitting in a rubber compound.
"That ring can be used to authenticate the user with biometric systems, such as a phone or a smart home door lock. And if the data of the ring fingerprint leaks, the user can block this particular ring and replace it with a new one — and their own unique biometric data won't be compromised," the company said in blog post announcing it.
When used to authenticate to a smartphone, the smartphone's sensor "reads" the biometric stone, which Kaspersky says comes in the shape and texture of a real finger (ew?). The fibers activate the reader.
When the stone is pressed on a fingerprint sensor, the conductivity activates the reader. The fingerprint sensor then measures both the connectivity and the pattern of the fibers, and also compares the physical pattern of the fingerprint with the one that was set up on the device.
But don't bother trying to find one for Christmas. "The ring is just a concept," not a product, to raise awareness about security issues of biometrics, according to Kaspersky.
Read more here.
Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "A Cause You Care About Needs Your Cybersecurity Help.
About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024