US military working on behavioural biometrics ID verification system

New system to determine identity of users under development in US

biometrics

Fingerprints, passwords and iris scans could soon be a thing of the past for the US military, with plans afoot to create a new identity verification system.

The US military is working with West Point to develop a new biometric API technology, as part of a deal worth millions of dollars, that can determine a person's identity using algorithms that recognises how they use their PCs or smartphone.

Advertisement - Article continues below

It does this by recognising things such as typographical errors, rate of type, and how an individual uses their mouse, according to a document seen by Sky News.

One of the contract documents references a "cognitive fingerprint", which is the term used to describe how an individual uses their electronic devices.

The system works on the premise that the way a person uses technology is unique to them, and this forms the basis of a new and emerging field of security technology called behavioural biometrics.

The offering also consists of new capabilities, such as the ability to examine how a document is constructed. This will be useful to determine if plagiarism has occurred and when checking for academic authorship.

The military intends on developing this software for defence purposes initially, as a part of the Defence Advanced Research Projects Agency programme.

Advertisement
Advertisement - Article continues below

Eventually it is hoped it could be used in civilian markets for tasks such as shopping, online banking, and for other consumer-focused applications.

Advertisement - Article continues below

Sharif Sakr, a tech strategy consultant, told Sky News that anyone can commit fraud, harass others, or spy on people right now because there is currently no way to identify people.

Therefore, any tech device that can identify people rapidly and effectively will be useful in "making the web a more civilised place".

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020
Visit/business-strategy/it-infrastructure/356258/the-growing-case-for-it-flexibility
Sponsored

The growing case for IT flexibility

30 Jun 2020