大脑对特定词语的反应可代替密码
- 指点迷津
- 2024-11-30
- 8
You might not need to remember those complicated e-mail and bank account passwords for much longer. According to a new study, the way your brain responds to certain words could be used to replace passwords. In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of 45 volunteers as they read a list of 75
acronyms
2, such as FBI and DVD. They recorded the brain's reaction to each group of letters, focusing on the part of the brain associated with reading and recognizing words, and found that participants' brains reacted differently to each
acronym
1, enough that a computer system was able to identify each volunteer with 94 percent accuracy. The results suggest that brainwaves could be used by security systems to verify a person's identity., ,According to Sarah Laszlo, assistant professor of
psychology
3 and
linguistics
4 at Binghamton University and co-author of "Brainprint," brain biometrics are appealing because they are cancellable and cannot be stolen by
malicious
5 means the way a finger or retina can., ,"If someone's
fingerprint
6 is stolen, that person can't just grow a new finger to replace the compromised fingerprint -- the fingerprint for that person is compromised forever.
Fingerprints
7 are 'non-cancellable.' Brainprints, on the other hand, are potentially cancellable. So, in the unlikely event that attackers were actually able to steal a brainprint from an
authorized
9 user, the authorized user could then '
reset
10' their brainprint," Laszlo said. , ,Zhanpeng Jin, assistant professor at Binghamton University's departments of Electrical and Computer Engineering, and Biomedical Engineering, doesn't see brainprint as the kind of system that would be mass-produced for low security applications (at least in the near future) but it could have important security applications. , ,"We tend to see the applications of this system as being more along the lines of high-security physical locations, like the Pentagon or Air Force Labs, where there aren't that many users that are authorized to enter, and those users don't need to constantly be
authorizing
11 the way that a consumer might need to
authorize
8 into their phone or computer," Jin said.
本文由明日于2024-11-30发表在生活百科-红苹果乐园,如有疑问,请联系我们。
文章摘自:http://hpgly.com/post/37434.html
发表评论