Your brain waves can replace passwords in the future


Results showed that brain waves can be used in security systems to verify a person's identity.

Researchers at Binghamton University have discovered that with a little practice, your computer may recognize the employer based on the way your brain reacts to certain words. This means that instead of having to remember a password, you only need to hear a few words to unlock the files "confidential" in the computer.

"In" Van brain ", a study has been published in academic journals Neurocomputing, researchers from the University of Binghamton observe the brain signals of 45 volunteers as they read a list of 75 acronyms eg "FBI" or "DVD". They recorded the brain's response to each person from being read, concentrate on the brain in charge of reading and word recognition. Finally, they found that the brains of the participants react differently to each acronym, enough for a computer system that can distinguish the volunteers with an accuracy of up to 94%. The results showed that brain waves can be used in security systems to verify a person's identity. "

This cycle will be extremely simple: You just sit down, turn on the brain and a computer scanner will read you some words. Then, based on the reaction of your brain, the computer will decide to allow or deny you access to some security software. 94% may not be the ideal number but it is likely to be further improved. Interestingly, the brain still also "unique" as fingerprints, but are much more flexible.

Sarah Laszlo, assistant professor of psychology and linguistics involved in the project said, "If a person's fingerprint is stolen, of course, can not replace it by finger fingerprint of a person who is unique and exists forever. Fingerprint identification method 'indestructible.' In contrast, the brain still can. So, in case there is doubt wondering who stole the brain from an authorized user, they can "reset" the brain so immediately ".

Whether this will soon become feasible? Probably very difficult, but this idea can fully apply to the system require high security.
SHARE

Unknown

  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment

0 comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Popular Posts