Facelock Technology: The Future of Passwords
Security

Facelock Technology: The Future of Passwords

When it comes to creating secure passwords, the issue doesn’t necessarily lie in the fact that we aren’t capable of making it difficult for those looking over our shoulders. By now, it should be clear that even the most intricately-crafted password is ultimately crackable. Words are simple to hack, and that’s a fact. Regardless of how many additional characters and numbers we add, the password system we have relied upon for over a decade has become outdated and is often easily exploited.

Enter Facelock Technology

While many of us would enjoy living in our own science-fiction-esque world where retinal scanners would become the norm for identification, Facelock would prefer their technology not to be so involved.

Rather than rely on the use of cameras to record your face (and prove beyond a shadow of a doubt that you are the one attempting to access your bank account), Facelock technology actually relies upon psychological research to determine whether or not you can recognize a face displayed on your screen. The idea behind Facelock is not that something can recognize you, but that users and prying eyes can’t recognize every face that they see.

In practice, the technology would work something like this:

  • You would choose a set of faces that are well-known to you, but perhaps are not well-known to others.
  • These faces would be placed in a grid and you would be forced to pick out the recognizable face.
  • Those who do not know the faces you chose will have difficulty picking the right one, while you will be able to easily make the right choice.

Why Does It Work?

Researchers suggest that familiarity with faces is almost impossible to lose, so if you know what someone in a picture looks like, you’ll be able to pick their face out of a grid quite quickly and easily. Conversely, if someone who doesn’t know you or the faces that you are familiar with attempts to access your information, they will be forced to pick out a face from a set of strangers that they are unfamiliar with.

Even if you choose someone relatively famous for your set of faces, malicious users would find it difficult to pick the right famous identity when given a choice of many familiar faces. They may know who the person in the picture is, but they won’t know which one you chose for your Facelock protection.

So far, there is only one app on the marketplace that even comes close to performing the task put forth by the concept of this new technology. Passfaces is an app that assigns a group of faces to you and tasks you with picking those faces out of a crowd in order to authenticate your access of personal information. Presumably, Facelock would be different because it would allow users to pick faces they were already familiar with, which would make it immediately easier for them to remember their “password” while still making it difficult for others to crack through their security. This wouldn’t be the first time that one app outdid another.

Needless to say, the creation of new forms of authentication and protection is definitely a good thing. Although Facelock doesn’t quite have the same appeal of James Bond technology, it is pretty interesting nonetheless. However strange it may seem, concepts like these could soon find their way into our everyday lives, and we should probably be thankful. After all, scientists may have just found a way to eliminate the need to remember a ridiculous password and strengthen the security of our information at the same time. Here’s hoping that Facelock becomes the next big thing in data security.

 

Megan Ritter is an online journalist, social media manager, and tech enthusiast. Her writing covers everything from global business communications to reputation management to developing technology. Follow her on Pinterest to find more cool technology!

PREVIOUS ARTICLE

«Acq-hiring: Tapping Talent in the Tech Sector

NEXT ARTICLE

Seizing Opportunities in Hong Kong Retail Land Grab»

Comments

no-images

Dalibor on August 15 2014

Sounds interesting, however, if the password created from various characters can be cracked using X attempts...the same can happen with selecting the correct face,right? Can't imagine how this could be secured and eventually used in industry like Banking, where the security is definitely one of the major critical concern..

no-images

Dalibor on August 15 2014

Sounds interesting, however, if the password created from various characters can be cracked using X attempts...the same can happen with selecting the correct face,right? Can't imagine how this could be secured and eventually used in industry like Banking, where the security is definitely one of the major critical concern..

Add Your Comment

  • captcha

Related reading

McAfee

Storage Security

McAfee Server Security Suite Advanced

The data center has been in the midst of a major transition over the last few years across storage, server, networks, and the applications it deliv

Panda Security

SMB

IT Security Or IT Management For SMBS? Can You Have One...

The influx of investment in malware development is breaking all malware creation records; in 2013 the number of malware created represented 20% of

Content Library

<div class='left_content'><p><a>Business Process Management (BPM)</a></p><h2>Applying Social Business:...</h2><p>Read this white paper for more information about seven...</p><a href='/download/22051'>Download Content</a></div><div class='left_content'><p><a>Operations Planning</a></p><h2>DevOps: Why IT Operations...</h2><p>This analyst report reveals how DevOps benefits IT...</p><a href='/download/22050'>Download Content</a></div><div class='left_content'><p><a>Cybercrime</a></p><h2>The Ten Most Critical...</h2><p>This paper outlines 10 Critical Web Application Security...</p><a href='/download/22066'>Download Content</a></div><div class='left_content'><p><a>Networking & Communications</a></p><h2>The Active Advantage:...</h2><p>This paper outlines why deploying ADCs in “active-active...</p><a href='/download/22065'>Download Content</a></div><div class='left_content'><p><a>Remote Access Technologies</a></p><h2>Achieve Business Continuity...</h2><p>This paper looks at how to achieve business continuity...</p><a href='/download/22057'>Download Content</a></div><div class='left_content'><p><a>Cloud Computing Applications</a></p><h2>A Revolution in Cloud...</h2><p>This white paper introduces a cloud networking solution...</p><a href='/download/22056'>Download Content</a></div><div class='left_content'><p><a>Desktop Virtualization</a></p><h2>Accelerate Your Windows...</h2><p>Find out how desktop virtualization enables faster...</p><a href='/download/22055'>Download Content</a></div><div class='left_content'><p><a>Software Development Tools</a></p><h2>Six Capabilities of a...</h2><p>This executive brief looks at six proven capabilities...</p><a href='/download/22054'>Download Content</a></div><div class='left_content'><p><a>Collaborative Tools</a></p><h2>Improving Collaboration...</h2><p>This paper looks at why email remains the primary mode...</p><a href='/download/22053'>Download Content</a></div><div class='left_content'><p><a>Collaborative Tools</a></p><h2>Energizing Life's Work...</h2><p>If your life's work is about caring for people in the...</p><a href='/download/22052'>Download Content</a></div><div class='left_content'><p><a>Business Process Management (BPM)</a></p><h2>Applying Social Business:...</h2><p>Read this white paper for more information about seven...</p><a href='/download/22051'>Download Content</a></div><div class='left_content'><p><a>Operations Planning</a></p><h2>DevOps: Why IT Operations...</h2><p>This analyst report reveals how DevOps benefits IT...</p><a href='/download/22050'>Download Content</a></div><div class='left_content'><p><a>Cybercrime</a></p><h2>The Ten Most Critical...</h2><p>This paper outlines 10 Critical Web Application Security...</p><a href='/download/22066'>Download Content</a></div><div class='left_content'><p><a>Networking & Communications</a></p><h2>The Active Advantage:...</h2><p>This paper outlines why deploying ADCs in “active-active...</p><a href='/download/22065'>Download Content</a></div>
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Is the internet a disappointment?