Augmented Reality’s Presence in Security is at Our Fingertips

The methods by which Americans secure their assets are rapidly advancing with the help of artificial intelligence, virtual, and augmented reality. Security innovation is found throughout almost every industry of every-day life, from cell phone companies adopting facial-recognition technology to hotels experimenting with concealed weapon scanners. As these companies try to balance between high-tech security and growing privacy concerns in an increasingly turbulent world; the pressure is certainly felt to continue improving the safety and security of consumers everywhere.

Researchers at Arizona State University have developed a new type of security system that employs a users’ hand gestures as a pass code—and the accuracy is surprising. The program, called FMCode, utilizes complex algorithms from within a wearable sensor or camera that can detect a person’s hand gestures, whether that be drawing a shape or writing a signature in the air, to accurately identify users in up to 96.7 percent of the time.

Developing the program did not come without challenges, however.

ASU researchers Duo Lou and Dijiang Huang encountered some significant hurdles in reaching near-perfect accuracy. Given that humans are naturally imperfect at replicating anything perfectly for any number of times (that does not involve a fingerprint or face-scan) the researchers turned to Artificial Intelligence for answers. To help minimize misidentification, the program employs a machine learning platform that can distinguish frauds from simple differences in speed and shape.

When the program went through a survey, respondents, although impressed with the security aspect of the technology, were still unconvinced by the speed and simplicity when compared to traditional login methods. The future of gesture control has the potential to be very bright. The system is seen as a less intrusive form of security compared to fingerprints and facial recognition. As the hardware improves and the machine learning continues getting smarter, consumers have much to be optimistic about in regard to the future of the state of security.

Follow us on social media for the latest updates in B2B!

Image

Latest

zero trust architecture
Secure Grid Modernization with Zero Trust Architecture
April 19, 2024

Ray Bauer of Verizon Business engages with Del Rodriguez from Palo Alto Networks at DISTRIBUTECH 2024. Rodriguez shares insights into the significance of cybersecurity within the utility sector, particularly in light of increasing cyber threats and the convergence of IT and operational technology (OT). Bauer and Rodriguez discuss Palo Alto Networks’ initiatives to enhance […]

Read More
private wireless networks
Private Wireless Networks
April 19, 2024

Verizon host Wayne Weeks discusses the evolving utility industry with John Gaster, CEO of KSI Data Sciences at DISTRIBUTECH 2024. Together, they explore how KSI focuses on harnessing data from remote sensing devices to enhance the safety, efficiency, and cost-effectiveness of utility operations. Gaster emphasizes the significant role of AI and machine learning in […]

Read More
5G network platforms
5G Network Platforms
April 19, 2024

Verizon host Matt Montgomery chats with Blaze Vincent and Thedy Wana from Ericsson, where they discuss pressing challenges and opportunities within the utility sector, emphasizing the significant role of digital transformation and 5G technology in addressing these issues. The conversation highlights Ericsson’s contributions to smart grid modernization and how their innovative solutions are tailored […]

Read More
5G security policies
Leveraging 5G to Extend Security Policies
April 19, 2024

Guests Jeff Brown and Carlos Augusto from Fortinet join Brett Barganz of Verizon to discuss the integration of extended security policies with 5G technology at DISTRIBUTECH 2024. They delve into the transformation and challenges in cybersecurity within the utility sector, highlighting the strategic partnership between Fortinet and Verizon to advance security solutions that leverage […]

Read More