How Apple and Google will kill the password
Prediction: Your phone is about to become a universal biometric ID and debit card
Computerworld - Imagine sitting down at a public PC, surfing the Web, visiting Facebook, checking your online bank account and buying something on Amazon.com -- all without entering passwords or credit card information.
It gets better. You get up and leave without even logging out. Some shady criminal type sits down at the same PC and finds his attempts at cracking your password foiled at every turn. Your accounts can't be accessed because your phone is no longer on the desk.
It gets better still. Hop in your car and press the "Start" button -- no key necessary. The car knows it's you after you wave your phone over the dashboard, and it adjusts the driver's seat and steering wheel just for you.
On your way to work, you swing by Starbucks to grab a Trenta Iced Cafe Mocha with whip. To pay, you wave your phone over a terminal on the counter, grab your drink and head for work.
Arriving at the office, you sail past security with doors unlocking automatically as you approach them. When you walk into your office, the lights and PC come on auto-magically.
But what's this? While you were out, IT replaced your old-and-busted PC with the latest and greatest. The PC is a blank slate, and it's unaware of your data or settings. No worries. Just drop your phone on the desk, and the system instantly implements your settings and begins downloading your work documents from the cloud.
While all this is happening, a co-worker walks in talking smack about the game yesterday -- and the ill-advised bet you lost. You owe him $10, so you both pull out your phones. You launch an app, type in the number 10, and tap the phones together to transfer the money.
All this has taken place without a single password or credit card.
The magic happens when you can combine a biometric ID system (which uses some kind of scan from a smartphone to verify that you're actually in possession of the device) with a secure short-distance wireless communication technology that other devices (cash registers, PCs etc.) can read.
What's wrong with passwords?
Why do we need a new ID system? Because most users don't create secure passwords, and they can't always remember the ones they create.
On any public system -- like, say, Facebook -- if a hacker tries the 20 most common passwords on enough accounts, he'll eventually break in. Any two-bit suburban script-kiddie can download free software to crack the majority of passwords on a public system within hours.
Many people use a single password for all accounts. Once a hacker gains access to the password, he can wreak havoc, steal your identity, destroy your credit, ruin your relationships and expose your secrets.
Password protection -- or lack thereof -- is the IT industry's dirty little secret. Passwords are a broken and obsolete model, yet everyone relies on them and pretends they do what they're supposed to do.
The obvious password replacement is biometric identification -- the use of a system capable of recognizing unique physical attributes, such as fingerprints, iris patterns or voices.
Far too many people don't trust biometrics because it feels like Big Brother technology. But I believe that if the biometric system resides on the user's cell phone, and is under the user's control, such technology would be far more acceptable to the public.
How Apple will kill passwords
Apple doesn't discuss future product plans, but it appears likely that the company is aggressively pursuing the development of technologies that replace IDs, passwords and credit cards.
Two years ago, Apple was in the news for patenting a range of biometric ID tools for the iPhone, such as a voice recognition system, a retinal scanner that uses the phone's camera or, most likely, a system that uses the screen to scan fingerprints.
Last year, Apple hired an expert in Near Field Communication, or NFC, to head up the company's Mobile Commerce department. NFC is technology that enables the transfer of data over distances of just a few inches -- a model that's far more secure and reliable than, say, Bluetooth. Other inside sources have been quoted as saying that Apple plans to build NFC into the iPhone 5.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Future Focus: What's Coming in Enterprise Mobility Management (EMM) Find out why Enterprise Mobility Management (EMM) solutions that are truly future-ready must be designed to enable Machine-to-Machine (M2M) capabilities and much more.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts