BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ BiometricUpdate
1. BIOMETRICS NEWS BIOMETRICS FEATURES BIOMETRICS RESEARCH
← Previous Next →
Tweet
July 25, 2016
BluStor’s CyberGate uses biometrics to
guard Personal Mobile Cloud
By Chris Burt
The same improvements made in chip and battery
technology over the past few years that have driven the mobile
explosion have also enabled BluStor’s solution to the security problems
created by the connected, mobile world. By focussing on the individual,
the CyberGate secures the most vulnerable point in any transaction
with biometric identification, device control, and data storage on a
familiar form factor that fits in your wallet.
BluStor is the latest project from Seagate and Conner Peripherals founder Finis Conner. Conner
found that early in the development of huge growth areas like mobile, wearables, and IoT,
functionality and convenience for consumers were prioritized over security, he said in an interview
with Biometric Update in 2013, when the company was in its early days. A major security
vulnerability – the individual – was largely ignored.
Network and system security have reached points of diminished return for many companies,
BluStor chief operating officer Mark Bennett told Biometric Update in an interview.
“The weakest link in the security chain is actually the individual, whether it’s the employer or end
user performing that transaction, and very little had been invested in terms of solving that
particular problem,” Bennett says. “A classic example is the typical employee ID badge, which is
nothing but a piece of plastic with a picture on it, and you may have an RFID chip that you can use
to scan in and out of a turnstile or a door. But it does very little other than that and of course if
somebody drops it or loses it, particularly if they don’t report it, then anybody who picks it up can
use it. We spent billions of dollars trying to secure all the devices and backend systems, but we
spend a nickel trying to secure the individual.”
Securing the individual means confirming that they are who they say they are, and that they are
allowed to do what they are trying to. It also means moving the identification system off of mobile
devices. The millions of lines of source code in the operating systems of devices make them
inherently vulnerable, Bennett says, which is a major factor in the 640 percent increase in Android
malware, and Apple finding it necessary to constantly update iOS to patch the security holes used
to jailbreak devices.
“We firmly believe that separating the keys to your digital identity from those kinds of devices is
absolutely essential to protecting your digital identity and keeping that information safe and
secure,” Bennett says. “That’s the fundamental purpose of our product.”
Improvements in technology led to BluStor’s development of its first prototypes last summer while
working with the army on ways to carry secure personal medical records into the field.
Search Search
BIOMETRIC NEWS BRAND FOCUS RESEARCH REPORTS BLOG WHITE PAPERS EXPLAINERS COMPANIES SOLUTIONS EVENTS
SAS Lab experimenting with
palm scanning to improve
travel process
iCivil promises much needed
birth registration in Africa
Special Report: Biometrics and
banking
Like 10