BBB Accredited Business Frustrated with Your Computer? Call Us Today!
US 1-833-200-7536

Computer and Internet Security

EyeVerify Shows Future Of Computer and Internet Security with mchelper

The next needed step in computer and Internet security will soon be here, thanks to technology being developed and tested by EyeVerify. This company has developed a way to identify people by the whites of their eyes.

It is technology that was previously only seen in science fiction movies, such as “Star Trek II: The Wrath of Khan.” In this movie, Admiral Jim Kirk asks the computer for top secret information on Project Genesis. To confirm his identity, and those of his fellow officers he wants to see the secret file, the computer scans their eyeballs and matches them with images on file.

This is essentially what EyeVerify can do right now. A video camera scans the subject’s eyeball and maps out the pattern of the blood vessels in the whites of the eye.

Purdue University tested it and showed that EyeVerify is 98.7 percent accurate. This is essentially just as accurate as using fingerprint identification, and it is much easier to implement.

The need for this is apparent as passwords are easy to guess or even steal. In general, people are very bad at making passwords difficult enough to prevent breaches of security. And even if they do make a good password, there is no way to guarantee that the person with the correct password is the one that is supposed to have the password.

Computer and Internet security could be beefed up by EyeVerify

with mchelper

While no security system is completely infallible, it would be nearly impossible to “steal” this type of identification. Even if someone tried something gruesome, EyeVerify claims that the technology won’t be fooled.

Take the famous scene from “The Avengers” movie. Loki kills a man and removes his eyeball in order to have it scanned to gain access to a vault. EyeVerify uses streaming video instead of a still picture, so the company claims that an eye removed from a person or scanned from a dead person will not be confused with the original video of an eye still connected to a living person because the technology looks at the pattern of the blood circulating in the vessels.

Of course, these are extreme examples of rare events. A more common problem would be someone playing the video of an eye to a scanner through a smartphone or tablet.

However, the company claims that its technology will recognize the different ways that light reflects off an actual eye instead of a video screen, so EyeVerify won’t be fooled in this manner either.

For right now, this technology is made specifically for smartphones and other mobile devices. All the device needs is a 2MP camera and an iOS or Android operating system to go along with the EyeVerify app.

However, it is not difficult to see this software being adapted for computer and Internet security as well. It could be adapted to use the cameras that many computers already have.

Computer and Internet security is limited to passwords and the occasional fingerprint scanner. Imagine not having to keep track of passwords, but only having to sit down at a computer and have the camera scan your eye to gain access to your computer and any secured websites. And while fingerprint scanners would work just as well, they require scanning devices that have only one purpose, as opposed to using a camera that can be used for many different things.

This entry was posted in Computer and Internet Security and tagged , , , , . Bookmark the permalink.

Computer Tech Support | Computer Repair USA | Computer Repair, Computer Maintenance. Technical Computer Support, Slow and Poor Performance. My Computer Helper will diagnose, repair & resolve Technical Problems.

  • IT Support Slow and Poor Performance.
  • Technical Support
  • Slow or Inconsistent Boot-Up
  • Data Recovery
  • Virus, Malware and Spyware Removal

We serve the following states:

| Alabama | Alaska | Arizona | Arkansas | California | Colorado | Connecticut | Delaware | Florida | Georgia | Hawaii | Idaho | Illinois | Indiana | Iowa | Kansas | Kentucky | Louisiana | Maine | Maryland | Massachusetts | Michigan | Minnesota | Mississippi | Missouri | Montana | Nebraska | Nevada | New Hampshire | New Jersey | New Mexico | New York | North Carolina | North Dakota | Ohio | Oklahoma | Oregon | Pennsylvania | Rhode Island | South Carolina | South Dakota | Tennessee | Texas | Utah | Vermont | Virginia | Washington | West Virginia | Wisconsin | Wyoming

We also provide Data recovery Services and Support Services. Connect now!