Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home CRM Systems Customer Service Business Intelligence Sales & Marketing More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Network Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Google Buys Start-Up Offering Sound-Based  Log-In
Google Buys Start-Up Offering Sound-Based Log-In

By Barry Levine
February 18, 2014 10:57AM

Bookmark and Share
The technology by Israeli start-up SlickLogin, just acquired by Google, could be used as the sole authenticator in place of a username/password, or as a step in a two-step authentication. SlickLogin says that Web sites or mobile apps just need to add five lines of codes to enable the sound-based log-in authentication system.
 


Israeli start-up SlickLogin has developed sound-based technology that allows a user to log in to a secure Web site by holding a smartphone up to a speaker to process an inaudible sound. That enterprise-targeted sound authentication is now part of Google, following news the technology giant has purchased the firm for an undisclosed amount.

SlickLogin's innovative technology enables a site or other provider to generate a high-pitched sound that is unique to the user and the log-in session. The SlickLogin smartphone app analyzes the sound, and, if everything checks out, then transmits a message to the authorizing server to allow log-in. The uniqueness of the signal is intended to ensure that the same sound cannot be used for another session, and it is time-based so that its utility has a temporal limit. A nearby smartphone or other sound pickup device that tries to grab the sound when it was played would not have the required log-in credentials.

In an announcement on its Web site, SlickLogin said Google "shares our core beliefs that logging in should be easy instead of frustrating, and authentication should be effective without getting in the way." It added that Google was "the first company to offer 2-step verification to everyone, for free."

Israeli Cyber Unit

SlickLogin describes its authentication system as military-grade, which might be taken as hyperbole for many start-ups, but, in this case, all three of the founders -- CEO Or Zelig, CTO Eran Galili, and Vice President for Research and Development Ori Kabeli -- have experience working in the Israeli Defense Forces' elite cyber security unit.

John Grady, an analyst with industry research firm IDC, told us that the technology was "definitely interesting." Given that "people hate passwords and passwords are insecure," he said, there's obviously a major opportunity here, and using smartphones as second-factor tokens "obviously becomes easier as they become more ubiquitous."

Grady added that he sees this kind of sound-based system as being "one part of a multi-tiered next-generation authentication mechanism."

Beta Phase

The technology began its beta testing phase in September. It could be used as the sole authenticator in place of a username/password, or as a step in a two-step authentication process. The start-up says that Web sites or mobile apps just need to add five lines of code to enable the system. Of course, one potential flaw is if someone physically has possession of your smartphone, which is why the system may make more sense in a two-step authentication.

A variety of technology experiments by several companies are attempting to use transmitted sound as an information carrier, including works-in-progress to conduct financial transfers via a high-frequency sound or using sound to transfer files. Some security analysts have said they expect passwords to become part of various two-step authentication systems, particularly for businesses. In addition to a stable step that doesn't change, such as a password or even a biometric identity like a fingerprint, a generated second step -- like a text code or a generated sound signal sent to a smartphone -- appears to be a likely route.
 

Tell Us What You Think
Comment:

Name:



Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.


 Network Security
1.   Lessons from Verizon's Threat Report
2.   Verizon Report Exposes Cyberthreats
3.   How Are Web Sites Post-Heartbleed?
4.   White House Updating Privacy Policy
5.   Target Hackers May Be Tough To Find


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Business Intelligence | Sales & Marketing | Contact Centers | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.