SlideShare a Scribd company logo
1 of 2
Download to read offline
BIOMETRICS NEWS BIOMETRICS FEATURES BIOMETRICS RESEARCH
← Previous Next →
Tweet
July 25, 2016 ­ 
BluStor’s CyberGate uses biometrics to
guard Personal Mobile Cloud
By Chris Burt
The same improvements made in chip and battery
technology over the past few years that have driven the mobile
explosion have also enabled BluStor’s solution to the security problems
created by the connected, mobile world. By focussing on the individual,
the CyberGate secures the most vulnerable point in any transaction
with biometric identification, device control, and data storage on a
familiar form factor that fits in your wallet.
BluStor is the latest project from Seagate and Conner Peripherals founder Finis Conner. Conner
found that early in the development of huge growth areas like mobile, wearables, and IoT,
functionality and convenience for consumers were prioritized over security, he said in an interview
with Biometric Update in 2013, when the company was in its early days. A major security
vulnerability – the individual – was largely ignored.
Network and system security have reached points of diminished return for many companies,
BluStor chief operating officer Mark Bennett told Biometric Update in an interview.
“The weakest link in the security chain is actually the individual, whether it’s the employer or end
user performing that transaction, and very little had been invested in terms of solving that
particular problem,” Bennett says. “A classic example is the typical employee ID badge, which is
nothing but a piece of plastic with a picture on it, and you may have an RFID chip that you can use
to scan in and out of a turnstile or a door. But it does very little other than that and of course if
somebody drops it or loses it, particularly if they don’t report it, then anybody who picks it up can
use it. We spent billions of dollars trying to secure all the devices and back­end systems, but we
spend a nickel trying to secure the individual.”
Securing the individual means confirming that they are who they say they are, and that they are
allowed to do what they are trying to. It also means moving the identification system off of mobile
devices. The millions of lines of source code in the operating systems of devices make them
inherently vulnerable, Bennett says, which is a major factor in the 640 percent increase in Android
malware, and Apple finding it necessary to constantly update iOS to patch the security holes used
to jailbreak devices.
“We firmly believe that separating the keys to your digital identity from those kinds of devices is
absolutely essential to protecting your digital identity and keeping that information safe and
secure,” Bennett says. “That’s the fundamental purpose of our product.”
Improvements in technology led to BluStor’s development of its first prototypes last summer while
working with the army on ways to carry secure personal medical records into the field.
Search   Search
BIOMETRIC NEWS BRAND FOCUS RESEARCH REPORTS BLOG WHITE PAPERS EXPLAINERS COMPANIES SOLUTIONS EVENTS
SAS Lab experimenting with
palm scanning to improve
travel process
iCivil promises much needed
birth registration in Africa
Special Report: Biometrics and
banking
Like 10
Advertisement
CyberGate provides mobile biometric authentication with a device that looks and feels like a thick
credit card. The device features three key applications, which combine to secure the identity and
data of the person who carries it. BuStor calls these applications GateKeeper, AutoLogN, and File
Vault.
GateKeeper is an API that sits in the cards’ firmware, which positively identifies the user with
multi­factor biometric authentication, and drives the Bluetooth, NFC, and USB interfaces.
GateKeeper handles all secure transactions between the card and whatever application it is used
with.
AutoLogN uses a low­energy BlueTooth signal to transmit an attenuated, low power signal to the
user’s laptop, desktop, or tablet. By automatically locking and unlocking devices without the user
having to enter a password or touch the keyboard, AutoLogN allows organizations to limit access
to times when the authorized user is physically present, with the Cybergate card in their wallet or
hanging from a lanyard around their neck.
The application has particularly high potential for uses involving
multiple users and multiple sensitive devices. Bennett gives the
example of hospitals, in which teams of nurses need to constantly
access equipment which literally keeps people alive. Nurses
typically access hospital computers upwards of 100 times each
shift, and if they must rely on passwords to do so, they will naturally
tend towards ones that are quick, easy­to­remember, and therefore
weak.
By associating the authorized user’s identity with their biometric
profile on the Cybergate card, AutoLogN addresses this risk, and generally mitigates the need for
enterprises to enforce good password practices.
File Vault stores sensitive data directly to the card on up to 8GB of flash storage. Data is
transmitted by encrypted standard­strength BlueTooth which provides high speed and avoids
potentially risky WiFi use. BluStor sees the onboard File Vault as a place to store any sensitive
data, like product information or trade secrets for business users or copies of travel documents
and medical information for consumers.
The combination makes CyberGate a holistic ID and authorization control that can deliver a major
return in security for a relatively modest investment of cost and time. Capturing the biometrics for
each card takes less time than typing out a password, while matching takes milliseconds. The
same backup access and authentication systems used by administrators can be applied, though
they may be used less.
“An enterprise can bring that into their infrastructure with little to no change in their existing tools
and environment,” Bennet says. Each card is meant to last for years, with over the air firmware
updates incorporating whatever biometric technology is best at the time.
Because credentials are worth nearly 100 times as much as credit card numbers on the dark web,
identity will be increasingly targeted by cybercriminals, making identity protection all the more
important. BluStor is working with the US Army on providing veterans with a way to securely store
medical records on their person, and is receiving major interest from the insurance and health
care industries.
Cybergate cards begin shipping this month, and BluStor is offering them for $99.99, one­third off
the regular price, for a limited time.
Federal judge orders man to unlock iPhone via fingerprint recognition
Details leak about the Samsung Galaxy Note 7 iris scanner setup
EyeLock announces iris recognition technology breakthrough
Acuity report forecasts biometric ID credentials to reach one billion a year by 2022
Recommended by
Leave a Comment
0 comments
CyberlinkASP
Easily Integrate Your
IT Resources. Cloud
Desktop Support &
Service

More Related Content

What's hot

Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and AccessSE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and AccessAMD Developer Central
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellAMD Developer Central
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
Inventory of my IoT slide sets
Inventory of my IoT slide setsInventory of my IoT slide sets
Inventory of my IoT slide setsBob Marcus
 
Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Arun Shankar
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and AnsweredADCBarcode
 
Cloud Sweden Charter English
Cloud Sweden Charter EnglishCloud Sweden Charter English
Cloud Sweden Charter EnglishPredrag Mitrovic
 
Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013John Earnhardt
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...AMD Developer Central
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...sandhibhide
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT WorkshopHaider Iqbal
 
Smart grid cyber
Smart grid cyberSmart grid cyber
Smart grid cyberDale Butler
 

What's hot (20)

Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and AccessSE-4111 Max Berman, User Authentication for Mobile Devices and Access
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
Enterprise, Architecture and IoT
Enterprise, Architecture and IoTEnterprise, Architecture and IoT
Enterprise, Architecture and IoT
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Security of,for & by cloud
Security of,for & by cloudSecurity of,for & by cloud
Security of,for & by cloud
 
Inventory of my IoT slide sets
Inventory of my IoT slide setsInventory of my IoT slide sets
Inventory of my IoT slide sets
 
Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
 
Vitra AG
Vitra AGVitra AG
Vitra AG
 
Cloud Sweden Charter English
Cloud Sweden Charter EnglishCloud Sweden Charter English
Cloud Sweden Charter English
 
Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT Workshop
 
Smart grid cyber
Smart grid cyberSmart grid cyber
Smart grid cyber
 

Viewers also liked

Viewers also liked (8)

Bennett_Resume-2016
Bennett_Resume-2016Bennett_Resume-2016
Bennett_Resume-2016
 
SyncNI Magazine Spring 2012
SyncNI Magazine Spring 2012SyncNI Magazine Spring 2012
SyncNI Magazine Spring 2012
 
Amateur Expert Traveler
Amateur Expert TravelerAmateur Expert Traveler
Amateur Expert Traveler
 
11-2016_Entrepreneurial Engineer
11-2016_Entrepreneurial Engineer11-2016_Entrepreneurial Engineer
11-2016_Entrepreneurial Engineer
 
Cookies
CookiesCookies
Cookies
 
Tecnologopercaso may 2012
Tecnologopercaso may 2012Tecnologopercaso may 2012
Tecnologopercaso may 2012
 
Cách học từ vựng nhanh nhất với Oxford picture dictionary
Cách học từ vựng nhanh nhất với Oxford picture dictionaryCách học từ vựng nhanh nhất với Oxford picture dictionary
Cách học từ vựng nhanh nhất với Oxford picture dictionary
 
Bangalore IT Directory
Bangalore IT DirectoryBangalore IT Directory
Bangalore IT Directory
 

Similar to BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ BiometricUpdate

Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfRosalie Lauren
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
220943-RSP.pptx
220943-RSP.pptx220943-RSP.pptx
220943-RSP.pptxINDHUJALV
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
WmScammell--CDX-Chi-D1-p1
 WmScammell--CDX-Chi-D1-p1 WmScammell--CDX-Chi-D1-p1
WmScammell--CDX-Chi-D1-p1William Scammell
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022Bernard Marr
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
"TechVision 2024: Navigating the Future of Innovation"
"TechVision 2024: Navigating the Future of Innovation""TechVision 2024: Navigating the Future of Innovation"
"TechVision 2024: Navigating the Future of Innovation"Himani201861
 
Applied Biometrics Products, Inc.; Still the Market Leader
Applied Biometrics Products, Inc.; Still the Market LeaderApplied Biometrics Products, Inc.; Still the Market Leader
Applied Biometrics Products, Inc.; Still the Market LeaderJCAT2012
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
Emerging Horizons: Unveiling the Future Path of Cybersecurity
Emerging Horizons: Unveiling the Future Path of CybersecurityEmerging Horizons: Unveiling the Future Path of Cybersecurity
Emerging Horizons: Unveiling the Future Path of CybersecurityRenan Batista Silva
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTWitekio
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 

Similar to BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ BiometricUpdate (20)

Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdf
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
220943-RSP.pptx
220943-RSP.pptx220943-RSP.pptx
220943-RSP.pptx
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
 
WmScammell--CDX-Chi-D1-p1
 WmScammell--CDX-Chi-D1-p1 WmScammell--CDX-Chi-D1-p1
WmScammell--CDX-Chi-D1-p1
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022The 5 Biggest Internet Of Things (IoT) Trends In 2022
The 5 Biggest Internet Of Things (IoT) Trends In 2022
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Biometrics
BiometricsBiometrics
Biometrics
 
"TechVision 2024: Navigating the Future of Innovation"
"TechVision 2024: Navigating the Future of Innovation""TechVision 2024: Navigating the Future of Innovation"
"TechVision 2024: Navigating the Future of Innovation"
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Applied Biometrics Products, Inc.; Still the Market Leader
Applied Biometrics Products, Inc.; Still the Market LeaderApplied Biometrics Products, Inc.; Still the Market Leader
Applied Biometrics Products, Inc.; Still the Market Leader
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Emerging Horizons: Unveiling the Future Path of Cybersecurity
Emerging Horizons: Unveiling the Future Path of CybersecurityEmerging Horizons: Unveiling the Future Path of Cybersecurity
Emerging Horizons: Unveiling the Future Path of Cybersecurity
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 

BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ BiometricUpdate