According to Google's principal engineer, who specialists in security, Mayank Upadhyay at the RSA security conference in San Francisco last week, "Using personal hardware to log in would remove the dangers of people reusing passwords or writing them down." "Everyone is familiar with an ATM. What if you could use the same experience with a computer?" Upadhyay said, adding that Google's trial was focused on a slim USB key that performs a cryptographic transaction with an online service to prove the key's validity when it's plugged into a computer.The key also has a contact-less chip inside so that it can be used to log in via mobile devices.Tokens like the ones Google is testing do not contain a static password that could be copied.The cryptographic key unique to the device is stored inside and is never transmitted.When the key is plugged in, it proves its validity by correctly responding to a mathematical challenge posed by the online service it is being used to log into, in a way that doesn't produce any information that could be used to log in again.Google is already talking with other companies to lay the groundwork for using the technology to access different services and websites."It's extremely early stages, and we're trying to get more partners," said Upadhyay.
According to Google's principal engineer, who specialists in security, Mayank Upadhyay at the RSA security conference in San Francisco last week, "Using personal hardware to log in would remove the dangers of people reusing passwords or writing them down." "Everyone is familiar with an ATM. What if you could use the same experience with a computer?" Upadhyay said, adding that Google's trial was focused on a slim USB key that performs a cryptographic transaction with an online service to prove the key's validity when it's plugged into a computer.The key also has a contact-less chip inside so that it can be used to log in via mobile devices.Tokens like the ones Google is testing do not contain a static password that could be copied.The cryptographic key unique to the device is stored inside and is never transmitted.When the key is plugged in, it proves its validity by correctly responding to a mathematical challenge posed by the online service it is being used to log into, in a way that doesn't produce any information that could be used to log in again.Google is already talking with other companies to lay the groundwork for using the technology to access different services and websites."It's extremely early stages, and we're trying to get more partners," said Upadhyay.
Comments
Post a Comment