{"id":58822,"date":"2014-05-06T14:30:44","date_gmt":"2014-05-06T18:30:44","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-03-19T14:52:27","modified_gmt":"2022-03-19T18:52:27","slug":"security-from-the-heart","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/security-from-the-heart\/","title":{"rendered":"Security From the Heart"},"content":{"rendered":"<p><a href=\"https:\/\/password-managers.bestreviews.net\/can-your-heart-beat-the-password\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-104883\" title=\"Security From the Heart\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heart_biometric.png?resize=90%2C82&#038;ssl=1\" alt=\"Security From the Heart\" width=\"90\" height=\"82\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heart_biometric.png?resize=150%2C136&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heart_biometric.png?resize=75%2C68&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/heart_biometric.png?w=768&amp;ssl=1 768w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>We have all heard the horror stories of <strong><a class=\"zem_slink\" title=\"Password management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Password_management\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">password management<\/a><\/strong>. Users choose the same <a title=\"25 Most-Used Passwords Revealed\" href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/25-most-used-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">weak passwords<\/a>, <a title=\"Would you trade your password for a candy bar?\" href=\"https:\/\/web.archive.org\/web\/20160324142247\/http:\/\/www.hrmorning.com\/would-you-trade-your-password-for-a-candy-bar\/\" target=\"_blank\" rel=\"noopener noreferrer\">trade them for chocolate bars<\/a>. They keep track of them on <a title=\"Why Post-it notes are not a safe way to store passwords\" href=\"https:\/\/web.archive.org\/web\/20140917204756\/http:\/\/www.insidetechnology360.com\/index.php\/why-post-it-notes-are-not-a-safe-way-to-store-passwords-30536\/\" target=\"_blank\" rel=\"noopener noreferrer\">post-it notes<\/a>. <a title=\"Court Says FTC Can Go After Companies Who Get Hacked For Their Weak Security Practices\" href=\"http:\/\/www.techdirt.com\/articles\/20140408\/16472526845\/court-says-ftc-can-go-after-companies-who-get-hacked-their-weak-security-practices.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">Firms are negligent in managing weak passwords<\/a>. <a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Help Net Security<\/em><\/a> wrote about the latest innovation in passwords from Canadian security start-up <strong><a title=\"Bionym\" href=\"https:\/\/www.biometricupdate.com\/202204\/nymi-acquired-by-innominds-to-integrate-continuous-workplace-biometrics\" target=\"_blank\" rel=\"noopener noreferrer\">Bionym<\/a><\/strong>.<\/p>\n<p><a href=\"https:\/\/www.biometricupdate.com\/202204\/nymi-acquired-by-innominds-to-integrate-continuous-workplace-biometrics\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104886 size-medium\" title=\"Bionym logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biony_-logo.png?resize=150%2C45&#038;ssl=1\" alt=\"Bionym logo\" width=\"150\" height=\"45\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biony_-logo.png?resize=150%2C45&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biony_-logo.png?resize=75%2C22&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biony_-logo.png?w=181&amp;ssl=1 181w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Bionym created <strong><a title=\"Nymi\" href=\"https:\/\/web.archive.org\/web\/20200512053146\/https:\/\/getnymi.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nymi,<\/a><\/strong>\u00a0a bracelet\/wristband containing an ECG (<strong><a title=\"What Is an Electrocardiogram?\" href=\"http:\/\/www.nhlbi.nih.gov\/health\/health-topics\/topics\/ekg\/\" target=\"_blank\" rel=\"noopener noreferrer\">electrocardiogram<\/a><\/strong>) sensor that &#8220;reads&#8221; the unique heartbeat pattern of the wearer. The bracelet will use the ECG to authenticate into electronic devices; cars, computers, smartphones, TVs, etc.<\/p>\n<p><em>\u201cIt was actually observed over 40 years ago that ECGs had unique characteristics,<\/em>\u201d Bionym CEO Karl Martin <a title=\"Maker Bionym says its Nymi wristband can ID you via your heartbeat\" href=\"https:\/\/web.archive.org\/web\/20150515165438\/http:\/\/www.techhive.com\/article\/2047895\/maker-bionym-says-its-nymi-wristband-can-id-you-via-your-heartbeat.html\" target=\"_blank\" rel=\"noopener noreferrer\">pointed out<\/a> to <a title=\"Tech Hive\" href=\"http:\/\/www.techhive.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Tech Hive<\/em><\/a>. \u201c<em>What we do is ultimately look for the unique features in the <strong>shape of the wave<\/strong> that will also be permanent over time. The big breakthrough was a set of signal-processing and machine-learning algorithms that find those features reliably and to turn them into a <strong>biometric template<\/strong><\/em>.\u201d<\/p>\n<p>&#8220;<em>When you clasp the <a title=\"Nymi\" href=\"http:\/\/techcrunch.com\/2014\/04\/29\/nymi-wristband-live-demo\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nymi<\/a> around your wrist it powers on. By placing a finger on the topside sensor while your wrist is in contact with the bottom sensor, you complete an electrical circuit. After you feel a vibration and see the LEDs illuminate, your Nymi knows you are you and your devices will too. You will stay authenticated until your Nymi is taken off,<\/em>&#8221; it&#8217;s explained on the firm&#8217;s website.<\/p>\n<h3>3-factor security<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104888\" title=\"Nymi knows you are you\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nymi.jpg?resize=100%2C99&#038;ssl=1\" alt=\"Nymi knows you are you\" width=\"100\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nymi.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nymi.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nymi.jpg?w=200&amp;ssl=1 200w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>The Nymi functions on a <strong>3-factor security system<\/strong>. To take control of your identity you must have your Nymi, your unique heartbeat, and an Authorized <a class=\"zem_slink\" title=\"Authentication\" href=\"http:\/\/en.wikipedia.org\/wiki\/Authentication\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Authentication<\/a> Device (AAD). The AAD could be a smartphone or device registered with their app.<\/p>\n<p>No details about the bracelet&#8217;s security have been share on the site. <a title=\"Ars Technica\" href=\"https:\/\/arstechnica.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Ars Technica&#8217;s<\/em><\/a> Dan Goodin has pumped Martin for information and, so far, the news is good. <a title=\"Elliptic curve cryptography\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/elliptical-curve-cryptography\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Elliptic curve cryptography<\/strong><\/a> is used to ensure data traveling between the bracelet and the device is not monitored or intercepted by attackers. ECC also encrypts the handshake performed between the bracelet and the devices being unlocked.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200512053146\/https:\/\/getnymi.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104890 size-medium\" title=\"perform remote, gesture-specific commands\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nymi_use.jpg?resize=150%2C83&#038;ssl=1\" alt=\"perform remote, gesture-specific commands\" width=\"150\" height=\"83\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nymi_use.jpg?resize=150%2C83&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nymi_use.jpg?resize=75%2C42&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/nymi_use.jpg?w=560&amp;ssl=1 560w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>&#8220;<em>The Nymi also has motion sensing and proximity detection that allows users to perform remote, <strong>gesture-specific commands<\/strong>, creating a dynamic and interactive environment,<\/em>&#8221; it is explained. &#8220;<em>A simple twist of the wrist can unlock your car door<\/em>.&#8221;<\/p>\n<p>When it arrives, Nymi will offer <a class=\"zem_slink\" title=\"Multi-factor authentication\" href=\"http:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">three-factor authentication<\/a>. The wristband itself, your unique cardiac rhythm, and a mobile device, like a smartphone or tablet. The Nymi hardware acts as a <a class=\"zem_slink\" title=\"Security token\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security_token\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">secure token<\/a> that ties into the biometric. The wristband will need to check in with your smartphone or tablet at the beginning of the day.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>The thing that excites me most about Nymi is its potential to get rid of\u00a0passwords. I think the password has a limited shelf-life. Once <a class=\"zem_slink\" title=\"Wearable computer\" href=\"http:\/\/en.wikipedia.org\/wiki\/Wearable_computer\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">wearable computing<\/a> takes off, payment processing will be integrated with biometrics on the wearable devices, there will be no need for passwords.<\/em><\/p>\n<p><em><a href=\"https:\/\/rbach.net\/index.php\/fido\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104892 size-medium\" title=\"Nymi will be compatible with the FIDO Alliance\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password_Dog-3.jpg?resize=150%2C113&#038;ssl=1\" alt=\"Nymi will be compatible with the FIDO Alliance\" width=\"150\" height=\"113\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password_Dog-3.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password_Dog-3.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Password_Dog-3.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Bionym&#8217;s Martin stated, \u00a0 \u201c[Killing the password] is one of our goals,\u201d noting that the Nymi will be compatible with the <a title=\"FIDO Alliance\" href=\"http:\/\/fidoalliance.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>FIDO Alliance<\/strong><\/a>.<\/em><\/p>\n<p><em>FIDO, which stands for <strong>Fast IDentity Online<\/strong>, was created by <a class=\"zem_slink\" title=\"PayPal\" href=\"http:\/\/www.paypal.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">PayPal<\/a> and <a href=\"http:\/\/www.lenovo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lenovo<\/a>\u00a0(<a href=\"https:\/\/www.tradingview.com\/symbols\/OTC-LNVGY\/\" target=\"_blank\" rel=\"noopener noreferrer\">LNVGY<\/a>)\u00a0and now counts <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a>\u00a0(<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>)\u00a0and <a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>\u00a0(<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>)\u00a0among its members. The alliance has set out to create the next-generation standard for identity verification.\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Canadian security startup Bionym created Nymi a bracelet containing an ECG sensor that reads your heartbeat to authenticate into our iDevices<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,2099,1452,2101,2100,536,92,2098,1524,82,421,2097,1594,4],"class_list":["post-58822","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-authentication","tag-biometrics","tag-bionym","tag-fido-alliance","tag-goog","tag-google","tag-karl-martin","tag-lenovo","tag-microsoft","tag-msft","tag-nymi","tag-paypal","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/58822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=58822"}],"version-history":[{"count":16,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/58822\/revisions"}],"predecessor-version":[{"id":131332,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/58822\/revisions\/131332"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=58822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=58822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=58822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}