{"id":4928,"date":"2013-02-27T05:00:04","date_gmt":"2013-02-27T13:00:04","guid":{"rendered":"http:\/\/www.yardi.com\/blog\/?p=4928"},"modified":"2020-12-24T01:19:51","modified_gmt":"2020-12-24T09:19:51","slug":"password-fast-forward","status":"publish","type":"post","link":"https:\/\/www.yardi.com\/blog\/password-fast-forward\/","title":{"rendered":"Password Fast Forward"},"content":{"rendered":"<p><a href=\"http:\/\/www.yardi.com\/blog\/technology\/password-fast-forward\/4928.html\/attachment\/stream-of-digital-data-and-eye\" rel=\"attachment wp-att-5397\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-5397\" title=\"Stream of digital data and eye\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL-300x225.jpg\" alt=\"Facial-eye recogniction software could be the new password.\" width=\"300\" height=\"225\" \/><\/a>These days, traditional passwords are suspect in their ability to handle the safety of our valuable online data. This isn&#8217;t a new problem.\u00a0 Nearly a decade ago, in 2004, Bill Gates was predicting the demise of the alpha-numeric password, calling it a weak spot in security and identity authentication. He was one of the first to propose moving security onto smartcards and biometrics. With few exceptions, most programs, websites and protected databases are still using the standard-issue username\/password combination for access. But with recent high-profile hackings like that of <em>Wired<\/em> tech writer <a title=\"Mat Honen accounts hacked\" href=\"http:\/\/www.wired.com\/gadgetlab\/2012\/08\/apple-amazon-mat-honan-hacking\/all\/\" target=\"_blank\" rel=\"noopener\">Mat Honen<\/a> last summer, the issue of changing password technology is a hot one again. So what are the current options?<\/p>\n<p><strong>Behavior based gestures<\/strong><\/p>\n<p>The government\u2019s Defense Advanced Research Projects Agency (DARPA) is on the lookout for other forms of authentication based on behaviors, like the way people type or make other hand gestures. Security researchers are investigating the way people are using their machines so that their identity can be verified at all times: \u201c<em>for example, how the user handles the mouse and how the user crafts written language in an e-mail or document<\/em>\u201d they say on their <a title=\"DARPA Active Authentication\" href=\"http:\/\/www.darpa.mil\/Our_Work\/I2O\/Programs\/Active_Authentication.aspx\" target=\"_blank\" rel=\"noopener\">website<\/a>. DARPA\u2019s program manager Richard Guidorizzi explains what makes this method different from the current password format:<\/p>\n<p><em>\u201cMy house key will get you into my house, but the dog in my living room knows you\u2019re not me. No amount of holding up my key and saying you\u2019re me is going to convince my dog you\u2019re who you say you are. My dog knows you don\u2019t look like me, smell like me or act like me. What we want out of this program is to find those things that are unique to you, and not some single aspect of computer security that an adversary can use to compromise your system.\u201d<\/em><\/p>\n<p><strong>Multi-step verification<\/strong><\/p>\n<p>This is an option Google made available a while ago, and if you haven\u2019t activated it, now would be a good time to do it. Google offers a two-step verification &#8211; it asks for the classical password, and also sends a text message with a code to your personal cellphone. According to <a>Honen<\/a>, who has taken on the issue of online security fallacy with a vengeance since his hack, this is just the beginning. The future of passwords means a combination of different identifiers that extend far beyond the password. The more pieces required for verification, the stronger the security of a system gets.<\/p>\n<p><strong>Smartcards<\/strong><\/p>\n<p>Google researchers are experimenting with a tiny <a title=\"Yubico\" href=\"http:\/\/www.yubico.com\/\" target=\"_blank\" rel=\"noopener\">Yubico<\/a> cryptographic card that works somewhat like a car key: you slid it into a USB reader and it automatically logs a web surfer into Google opening your web mail and online accounts. They have modified Google\u2019s web browser to work with these cards, but the best part is that there is no software download and once the browser support is there, it\u2019s quite easy to use.<\/p>\n<p><strong>Biometrics<\/strong><\/p>\n<ul>\n<li><strong>Facial Recognition. <\/strong>This option already exists under the form of a photo-based system that needs a picture of your face as login for the computer. Basically, if your computer is stolen and someone attempts to hack it, the software takes a photo of the person who tried and failed. For websites, <a title=\"Silicon Republic\" href=\"http:\/\/www.siliconrepublic.com\/innovation\/item\/25335-17-year-olds-facial\/\" target=\"_blank\" rel=\"noopener\">Silicon Republic<\/a> reports that teenagers Niall Paterson and Sam Gaulfield have created Viv.ie, a facial recognition system, available through an open API that website owners can deploy to allow their users to log in without a password. The technology is quite simple, it takes a photo of your face and then analyses it against the database of registered users. There are two problems though: whoever wants to hack your computer could show a photo of your face thus opening all channels to the uninvited guest, and it hasn\u2019t yet been finalized due to high costs and little experience in the business world for the two 17 year-olds. It is definitely a start.<\/li>\n<li><strong>Voice recognition.<\/strong> This one exists as well; some banks use it replacing the traditional PIN number with the sound of the account owner\u2019s voice.<\/li>\n<li><strong>Touch gestures.<\/strong> Computer scientists have been researching ways for your phone and tablet to recognize just your special touch. Some speculate that Apple purchased security firm AuthenTech in order to include a kind of <a title=\"Apple AuthenTech\" href=\"http:\/\/www.cmswire.com\/cms\/customer-experience\/apple-iphone-ipad-might-soon-have-fingerprint-authentication-via-authentec-acquisition-016718.php\" target=\"_blank\" rel=\"noopener\">fingerprinting technology<\/a> on its future devices.<\/li>\n<\/ul>\n<p><strong>Better Monitoring on the other end.<\/strong><\/p>\n<p>Facebook and Google are currently the only ones doing this. They are on the lookout for anomalies; first they flag them and then shut down the activity if it seems like fraud. For example, if they notice that your Google or Facebook account was accessed from an odd location, they will start asking a set of questions and when not answered properly they\u2019ll email a notification telling the account owner to change their password.<\/p>\n<p>The final solution is an official identity standard that has yet to be adopted; biometric fingerprints, iris scanning or smartcards, until a government adopts a national identity standard, the passwords will remain. Suggestions?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These days, traditional passwords are suspect in their ability to handle the safety of our valuable online data. This isn&#8217;t a new problem.\u00a0 Nearly a decade ago, in 2004, Bill Gates was predicting the demise of the alpha-numeric password, calling it a weak spot in security and identity authentication. He was one of the first [&hellip;]<\/p>\n","protected":false},"author":237,"featured_media":5397,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_s2mail":"yes","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[361,9,360,359,358],"class_list":["post-4928","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-biometrics","tag-consumer-technology","tag-new-password-options","tag-online-security","tag-password-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yardi Blog<\/title>\n<meta name=\"description\" content=\"These days, traditional passwords are suspect in their ability to handle the safety of our valuable online data. This isn&#039;t a new problem.\u00a0 Nearly a\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password Fast Forward\" \/>\n<meta property=\"og:description\" content=\"These days, traditional passwords are suspect in their ability to handle the safety of our valuable online data. This isn&#039;t a new problem.\u00a0 Nearly a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yardi.com\/blog\/password-fast-forward\/\" \/>\n<meta property=\"og:site_name\" content=\"Yardi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-27T13:00:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-24T09:19:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"488\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anca Gagiuc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anca Gagiuc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yardi.com\/blog\/password-fast-forward\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/password-fast-forward\/\",\"name\":\"Password Fast Forward - Yardi Corporate Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL.jpg\",\"datePublished\":\"2013-02-27T13:00:04+00:00\",\"dateModified\":\"2020-12-24T09:19:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/340a1a5e8e7dd137bd91ca1dd3a2e9d7\"},\"description\":\"These days, traditional passwords are suspect in their ability to handle the safety of our valuable online data. This isn't a new problem.\u00a0 Nearly a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yardi.com\/blog\/password-fast-forward\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#primaryimage\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL.jpg\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL.jpg\",\"width\":\"650\",\"height\":\"488\",\"caption\":\"Facial-eye recogniction software could be the new password.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yardi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Password Fast Forward\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\",\"url\":\"https:\/\/www.yardi.com\/blog\/\",\"name\":\"Yardi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yardi.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/340a1a5e8e7dd137bd91ca1dd3a2e9d7\",\"name\":\"Anca Gagiuc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3faafbc9e42cee6d04189129d2ee35dc7818b52bae9848e065f3b86af1df47e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3faafbc9e42cee6d04189129d2ee35dc7818b52bae9848e065f3b86af1df47e?s=96&d=mm&r=g\",\"caption\":\"Anca Gagiuc\"},\"description\":\"Anca Gagiuc brings more than a decade of experience within the real estate industry. She is a senior associate editor with Commercial Property Executive and Multi-Housing News who also writes monthly multifamily reports at Yardi Matrix. Contact Anca at anca.gagiuc@cpe-mhn.com\",\"url\":\"https:\/\/www.yardi.com\/blog\/author\/anca-gagiuc\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Yardi Blog","description":"These days, traditional passwords are suspect in their ability to handle the safety of our valuable online data. This isn't a new problem.\u00a0 Nearly a","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Password Fast Forward","og_description":"These days, traditional passwords are suspect in their ability to handle the safety of our valuable online data. This isn't a new problem.\u00a0 Nearly a","og_url":"https:\/\/www.yardi.com\/blog\/password-fast-forward\/","og_site_name":"Yardi Blog","article_published_time":"2013-02-27T13:00:04+00:00","article_modified_time":"2020-12-24T09:19:51+00:00","og_image":[{"width":650,"height":488,"url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL.jpg","type":"image\/jpeg"}],"author":"Anca Gagiuc","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anca Gagiuc","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yardi.com\/blog\/password-fast-forward\/","url":"https:\/\/www.yardi.com\/blog\/password-fast-forward\/","name":"Password Fast Forward - Yardi Corporate Blog","isPartOf":{"@id":"https:\/\/www.yardi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#primaryimage"},"image":{"@id":"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL.jpg","datePublished":"2013-02-27T13:00:04+00:00","dateModified":"2020-12-24T09:19:51+00:00","author":{"@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/340a1a5e8e7dd137bd91ca1dd3a2e9d7"},"description":"These days, traditional passwords are suspect in their ability to handle the safety of our valuable online data. This isn't a new problem.\u00a0 Nearly a","breadcrumb":{"@id":"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yardi.com\/blog\/password-fast-forward\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#primaryimage","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL.jpg","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL.jpg","width":"650","height":"488","caption":"Facial-eye recogniction software could be the new password."},{"@type":"BreadcrumbList","@id":"https:\/\/www.yardi.com\/blog\/password-fast-forward\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yardi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Password Fast Forward"}]},{"@type":"WebSite","@id":"https:\/\/www.yardi.com\/blog\/#website","url":"https:\/\/www.yardi.com\/blog\/","name":"Yardi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yardi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/340a1a5e8e7dd137bd91ca1dd3a2e9d7","name":"Anca Gagiuc","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3faafbc9e42cee6d04189129d2ee35dc7818b52bae9848e065f3b86af1df47e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3faafbc9e42cee6d04189129d2ee35dc7818b52bae9848e065f3b86af1df47e?s=96&d=mm&r=g","caption":"Anca Gagiuc"},"description":"Anca Gagiuc brings more than a decade of experience within the real estate industry. She is a senior associate editor with Commercial Property Executive and Multi-Housing News who also writes monthly multifamily reports at Yardi Matrix. Contact Anca at anca.gagiuc@cpe-mhn.com","url":"https:\/\/www.yardi.com\/blog\/author\/anca-gagiuc\/"}]}},"jetpack_featured_media_url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2013\/02\/Fotolia_35192641_Subscription_XL.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/4928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/users\/237"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/comments?post=4928"}],"version-history":[{"count":10,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/4928\/revisions"}],"predecessor-version":[{"id":26948,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/4928\/revisions\/26948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media\/5397"}],"wp:attachment":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media?parent=4928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/categories?post=4928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/tags?post=4928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}