Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

13 technologies that are safer than passwords

4 of 20 NEXT PREV
  • Fingerprint sensor

    Fingerprint sensor

    As we've learned over and over again, passwords are failing us. But maybe the fingerprint can save us.

    "Fingerprint sensors are the most widely adopted of all biometric technologies," says Jason Chaikin, president of the biometric authentication developer Vkansee.

    They're easy to use, and difficult (though not impossible) to fool. The technology, common on smartphones, reads your digit's unique pattern of ridges.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Getty Images/iStockphoto

    Caption by: Joal Ryan

  • Not much room for error

    Not much room for error

    Apple says the probability of two different fingerprints registering as the same fingerprint on one of its devices with Touch ID is "1 in 50,000."

    "By comparison," the company notes, "the odds of guessing a typical 4-digit passcode are 1 in 10,000."

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: CNET

    Caption by: Joal Ryan

  • ​Otoacoustic authentication

    ​Otoacoustic authentication

    Now in the prototype stage, and expected on the commercial market in 2018, NEC's wearable, earbud-esque device aims to best passwords with technology that emits a signal and then identifies the user by the resulting "sounds emitted by the inner ear."

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: NEC

    Caption by: Joal Ryan

  • Facial recognition

    Facial recognition

    A Scientific American columnist called face-reading scanners his favorite alternative to the old "123456."

    It's "secure, effortless and available now," David Progue wrote in 2016.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Igor Stevanovic, Getty Images/iStockphoto

    Caption by: Joal Ryan

  • Tough to fool

    Tough to fool

    The biometric system that inspired Scientific American's praise was Windows Hello, which allows properly equipped Windows 10 users to log in with fingerprints, iris scans -- or face scans.

    "You can't fool [the face scan] with a photograph, a 3-D model of your head or even an identical twin," Progue wrote.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Matt Elliott/CNET

    Caption by: Joal Ryan

  • Iris scanner

    Iris scanner

    A leading manufacturer of the technology calls the iris scan "the most accurate human identifier other than DNA." The false-accept rate, according to EyeLock, is "1-in-1.5 million for a single eye."

    Rumor has it the forthcoming iPhone 8 will feature an iris scanner. Other smartphones, including the notorious Samsung Galaxy Note 7, already have.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Shutterstock/Nik Bruining

    Caption by: Joal Ryan

  • Finger-vein recognition

    Finger-vein recognition

    This infrared technology can confirm "liveness," as Vkansee's Chaikin puts it.

    "[It] allows moving blood and other things that can only happen on a living person to be recognized," he says.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Shutterstock / Vladimir Zhoga

    Caption by: Joal Ryan

  • Finger-vein focused: Hitachi

    Finger-vein focused: Hitachi

    "Hitachi has most of the technology for finger-vein recognition," Chaikin says.

    The company's scanners are widely used by banks, especially in Japan.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Hitachi via YouTube

    Caption by: Joal Ryan

  • Voice recognition

    Voice recognition

    Barclays is so bullish on this technology that the bank has pulled the plug on passwords and security questions in favor of voice recognition for its phone-using personal-banking customers.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Getty Images/iStockphoto

    Caption by: Joal Ryan

  • More unique than you think

    More unique than you think

    " ... [U]nlike a password," Steven Cooper, CEO of Personal Banking at Barclays, said at the system launch, "each person's voice is as unique as a fingerprint."

    Barclays said its technology would identify the customer "from the first few words that are spoken."

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Getty Images

    Caption by: Joal Ryan

  • One-time passwords

    One-time passwords

    Either in physical or software form, this tech generates random passwords that, as billed, may only be used once. It's a more-secure alternative to the static password -- i.e., the one you create, perhaps scribble down and proceed to key in for months, if not years, on end.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Yevgen Romanenko, Getty Images/iStockphoto

    Caption by: Joal Ryan

  • Use with passwords

    Use with passwords

    Chaikin of Vkansee warns that the one-time password is "just one layer of a larger security system."

    "When a one-time-use token, such as a one-time-use password, is added on top of a password and login, it helps with multiple-layer authentication," Chaikin says.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Photographer:

    Caption by: Joal Ryan

  • ​Windows 10 PINs

    ​Windows 10 PINs

    You can still log in to a Windows 10 device with a password, but Microsoft requires a PIN to access Windows Hello, because, as it argues at length, the PIN is flat-out "better."

    One reason: "... [T]he PIN is tied to the specific device on which it was set up," Microsoft says. "That PIN is useless to anyone without that specific hardware."

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Microsoft

    Caption by: Joal Ryan

  • Passphrases

    Passphrases

    Passphrases tend to be longer than passwords -- and that's why they're safer. More words, more characters and more spaces mean hackers must spend more time doing their dirty work.

    "I can't stress enough the importance of having length paired with complexity," wrote the software-test engineer behind the blog Crambler.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Getty Images/iStockphoto

    Caption by: Joal Ryan

  • Multi-step authentication

    Multi-step authentication

    If a long passphrase offers more security than a short password -- and it does -- then it follows that a two- or even three-step authentication process trumps a one-step.

    In practice, this means that when you log in to an account, you are expected to provide not only a password (something you know), but also perhaps a one-time password (something you have) or a fingerprint (something you are) -- and maybe both.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Getty Images/iStockphoto

    Caption by: Joal Ryan

  • Behavior recognition

    Behavior recognition

    Dubbed a password-killer, this technology IDs you by the way you use, interact with or even hold your smartphone.

    "We can even measure air pressure using the barometer on the latest smartphones, which can give us another indication of where the phone is and whether that corresponds to where the user says he is," Zia Hayat, chief executive of Callsign, told the BBC.

    Banks, including Deutsche, have given the technology trial runs.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Getty Images

    Caption by: Joal Ryan

  • Palm scans

    Palm scans

    As with finger-vein recognition, palm scans analyze vein patterns via infrared technology. They've been enlisted not only by the banking industry, but also hospitals.

    "Palm scanning is 100 percent more accurate than fingerprints," Nader Mherabi, chief information officer at NYU Langone Medical Center in New York, said to CBS News.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Getty Images/iStockphoto

    Caption by: Joal Ryan

  • Would you use one on your laptop?

    Would you use one on your laptop?

    The Japanese tech company Fujitsu's PalmSecure has been used to safeguard ATM transactions, and even laptops, where a hovering hand over the scanner is all the system needs to authorize a log in.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Fujitsu via YouTube

    Caption by: Joal Ryan

  • ​Ear identification

    ​Ear identification

    Eyeballs and veins aren't the only unique body parts we've got. Your ears are one of a kind, too, so to speak.

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Descartes Biometrics via Facebook

    Caption by: Joal Ryan

  • Your ears are unique

    Your ears are unique

    The dual-screen Siam 7X smartphone made a splash in part by deploying technology that "utilizes a device's camera to authenticate or identify a user from their unique ear features."

    Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

    Photo by: Siam Mobile via Facebook

    Caption by: Joal Ryan

4 of 20 NEXT PREV

By Joal Ryan | July 27, 2017 -- 10:59 GMT (03:59 PDT) | Topic: Security

  • Fingerprint sensor
  • Not much room for error
  • ​Otoacoustic authentication
  • Facial recognition
  • Tough to fool
  • Iris scanner
  • Finger-vein recognition
  • Finger-vein focused: Hitachi
  • Voice recognition
  • More unique than you think
  • One-time passwords
  • Use with passwords
  • ​Windows 10 PINs
  • Passphrases
  • Multi-step authentication
  • Behavior recognition
  • Palm scans
  • Would you use one on your laptop?
  • ​Ear identification
  • Your ears are unique

Vein scans, eye scans, fingerprint scans and more up the security game

Read More Read Less

Facial recognition

A Scientific American columnist called face-reading scanners his favorite alternative to the old "123456."

It's "secure, effortless and available now," David Progue wrote in 2016.

Published: July 27, 2017 -- 10:59 GMT (03:59 PDT)

Caption by: Joal Ryan

4 of 20 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers

By Joal Ryan | July 27, 2017 -- 10:59 GMT (03:59 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums