Future of password – How mobile password works

Future of password – How mobile password works

Future of password : Introduction

Hey my dear reader, hope you are doing well. Today I am going to tell you about the future of password. Here password stands for every password like phone password, atm password or any password. So the question is what is future of password? How current password works and What is a vulnerability in the current password. So be with me till the end to know the rocket science behind a password

The current form of passwords – future of password

* PIN/ Passwords

* Pattern

* Bio-metric method
               * Fingerprint
               * Iris scanning

These are the common security systems that are currently being used by us. So let look into the brief of these

1. Pin/Password – future of password

PIN stands for the personal identification number, which is used by the machine to identify a particular person. This is any no. or alphanumeric codes that is given to the person. By using this thing person can unlock that thing. Earlier it used to be easy, but nowadays alphanumeric passwords become necessary in many websites or systems.
The best part of using the PIN as a password is, it is not easily guessable by a stranger. The downside of that is, it is always tough to type PIN in compare to other methods

2. Pattern – future of password

Pattern unlocking came into limelight due to its easy and fast processing system. It is much easier to use pattern than PIN, so people started using pattern unlock.
But as per a report downside of using pattern unlock is, it can easily be seen by the movement of your shoulder. Many people don’t set a lengthy pattern and mainly use 3,4 point pattern due to which anyone can easily guess the pattern using shoulder movement. So it is always recommended to set 5,6 point pattern to keep your phone data safe.

3. Bio metric method – future of password

Bio stands for method in which biological body parts involves.

The bio metric method includes face recognization, fingerprint, and Iris scanning. In the research paper of 1999 titled Biometrics personal identification in networked society” Three scientists determined the 7 factors that would determine the identification in a future device. Those seven things are Universality, Uniqueness, Permanence, Measurability , Performance, Acceptability, Circumvention. You can read full history of bio metrics here
Let’s have a brief of methods used in biometrics security

3.1 Facial recognization

Research on this initially started in 1964. The current face recognization technology works on picking dots of human’s face and algorithm made for face recognization. On the basis of that, any machine works to identify the person. Even if the person has twin sibling still have different face dots, by this method machine differentiate and identify the correct person. Right now it is one of the secure methods. But the drawback of this method is, if someone forcefully put your face before scanner in open eye condition then the machine will mark it as correct effort and so unlock that device.

3.2 Palm or fingerprint security

Both of these work the same technology. If you look at your finger then you will see a different pattern made of wavy, circle lines. When researched done on these marks then researchers found no two people have the same fingerprint pattern. Everyone has a different form of a pattern. Study on this started in 1665.
This technology is first used by Apple and then Samsung in their phones, as a security option. It is secure but again not that much. Fingerprint scanning works even if you are in sleeping condition. So if someone put your finger on the scanner then the machine will read your finger and unlock that device.

3.3 Iris scanning

closeup of iris - Future of password - How mobile password works

Image source

Firstly retina scanning used in the biometric method, but later on, Iris scanning came into limelight. It is a more reliable and secure option. In this method, the machine uses complex pattern looks like woven fiber, which is totally unique in each person. So the machine uses it as an identification method. The drawback of this method is, For now, It is not available for public devices and the 2nd one is if you donate your eyes then another person can able to access this.

The bio metric method came into more limelight when A scheme called Adhaar (national identification card) is made in India using Fingerprint scanning and Iris scanning. More than 80 crores people enrolled in this by providing their Bio metrics data.

So this is all for current security thing. But technology is changing very rapidly .now the question, for now, is what is the future of password?

Future of password

Password travel through your body

As per recent research, a new method discovered. This is currently for door opening process, where one hand is being used in mobile fingerprint sensor and another hand is used to touch the lock of the door. By this method, the password will flow from hand to door and thus unlock the door. Isn’t so great.

Holographic password identification

In this method, your body is going to work as a password. The machine will generate a holographic image of your body and use it as identification

Tongue scanning

Like a fingerprint, every person has a unique tongue print. As per the NCBI report, tongue print could be a great security option.

AI-based security

Artificial intelligence is growing rapidly. I am soon going to write a detailed article on the topic will AI replace humans. So soon AI is going to discover a new way for person identification.

But the current method of passwords is not going to change soon. It will improve day by day.

That is all for the future of password. Hope you liked it. If like so then don’t forget to share with your friends and family. To read more life-changing unique topic subscribe to our newsletter.

Brain hacking read here 

printfriendly pdf email button - Future of password - How mobile password works

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.