Connecting to LinkedIn...



New bracelet boosts computer security

24/09/2014 by


Forgot to log out from your computer? A bracelet-based security system ensures no one else uses it.

Researchers have developed a new bracelet that studies users' wrist movement to authenticate their identity and automatically logs them out when they leave or when someone else steps in to use their computer.

Common authentication methods based on passwords, tokens or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave.

But users often do not log out, which is a security risk, said researchers from Dartmouth College.

One solution is to authenticate users continuously while they are using the terminal and automatically log them out when they leave.

Several solutions are based on user proximity, but these are insufficient: they confirm whether the user is nearby but not whether the user is actually using the terminal.

Other proposed solutions based on behavioural biometrics (eg, keystroke dynamics) may not be reliable, recent research suggests.

Shrirang Mare, a Dartmouth computer science PhD student, developed an approach called Zero-Effort Bilateral Recurring Authentication, or ZEBRA.

In ZEBRA, a user wears a bracelet with a built-in accelerometer, gyroscope and radio on his or her dominant wrist; such bracelets are commonly sold as fitness devices.

When the user interacts with a computer terminal, the bracelet records the wrist movement, processes it and sends it to the terminal.

The terminal compares the wrist movement with the inputs it receives from the user via keyboard and mouse and confirms the continued presence of the user only if they correlate.

Because the bracelet is on the same hand that provides inputs to the terminal, the accelerometer and gyroscope data and input events received by the terminal should correlate because their source is the same - the user's hand movement.

In experiments, ZEBRA performed continuous authentication with 85 per cent accuracy in verifying the correct user and identified all adversaries within 11 seconds.

For a different threshold that trades security for usability, ZEBRA correctly verified 90 per cent of users and identified all adversaries within 50 seconds.

Thus, ZEBRA can recognise (in under a minute) when an unauthorised person steps in to use the terminal if the original user has stepped away from the terminal.

This article has been extracted from, please click on this link to read the article in full

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News


Virgin Atlantic adopts Salesforce to promote ...

2016-10-26 10:00:00 +0100

Salesforce, one of the global leaders in Customer Relationship Management (CRM) tools, is used by thousands of companies around the world. Now, Virgin Atlantic Airlines has said that not only do the solutions provide an effective modern tool for business, but they can also be used to promote community culture. Speaking about the benefits that his firm has seen, Virgin Atlantic Head of Global Sales Effectiveness Spencer Collins said that the solution pro...


SAP announces partnership with STC

2016-10-25 10:00:00 +0100

One of the world’s leading providers of enterprise resource planning (ERP) solutions, SAP, has revealed that it is partnering with STC Advanced Solutions to offer both private and public sector organisations more empowerment. The two firms will be working alongside one another to provide cloud-based subscription services to firms of all sizes. This will help to deliver better information communication technology (ICT) across the Kingdom of Saudi Arabia....