Feeds

New Android plan: Gurn at your phone to unlock it

'No, mine's an iPhone. This is actually how I look'

Website security in corporate America

Google has filed a patent for a new method for controlling computers and other devices by pulling funny faces.

In the future, Chocolate Factory fans might be able to unlock their gizmos by sticking out their tongue, rather than by having to remember passwords, according to a new patent.

Android users can currently use a system called Face Unlock to access their phones, but the new tech purports to be more reliable because it can't be fooled by photographs. Google introduced a system called "liveness" last year which requires users to flutter their eyelashes to prove they are alive and not just a photo, but researchers managed to fool it using image editing software to create a photo that appears to show the subject blinking. All a hacker would need to do is show the original photograph followed by the edited one.

The new patent includes aspects of this research, but goes further by introducing a range of gestures, including smiling with the mouth open, frowning and wrinkling the forehead or nose. It also recognises when a person does a "tongue protrusion".

The system would be more effective, because it could ask for any of the gestures, raising the prospect that anyone looking to send a text on their mobe would have to spend goodness-knows how long pulling silly faces in public before being allowed to send it.

Like the current Liveness tech, Google's new facial recognition software would take two photographs of an individual and then compare them using details on "facial landmarks" from each snap. These images could then be analysed to make sure that the person in front of the camera had pulled the correct expression.

Other "anti-spoofing" systems introduced in the patent could send light beams towards the subject, which are then detected when they reflect off the cornea. The exact colour of the light could be different each time, ensuring that access is not granted to someone waving a photo around.

However, facial recognition software is not an entirely reliable way of securing your telephone or computer just yet.

"The problem with biometrics in the past has been that you have always been able to find a way to work round the requests to deliver what's needed," Prof Alan Woodward, chief technology officer at the consultancy Charteris, said in an interview.

"It sounds like Google is thinking about how try and counter this with randomness and movement.

"But there's a long way between writing a patent about an idea and delivering it as a reliable security measure. I would expect people will still use traditional passwords for some time to come."

A Google spokeperson said that some ideas "later mature into real products or services, some don't".

"Prospective product announcements should not necessarily be inferred from our patent applications," he added.

It wasn't clear how the system might work on one well-known Android platform, the wearable computer Google Glass. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.