Internet Psylock

Psylock provides tacit login method on the CeBIT from Regensburg, February 14, 2011 at the Windows logon to password, there are risks. At futurist you will find additional information. Only a few user heed the Council to choose complex characters and sequences of numbers. The crux: Simple passwords are too uncertain to hard to remember complex, and hardware solutions are too expensive. It is usually easy to crack Windows passwords for hackers. Even easy-to-understand videos with instructions for the password theft are circulating on the Internet. The Psylock GmbH (www.psylock.com) the individual keystroke behaviour of the respective user-based authentication system, however, provides a highly secure, inexpensive and comfortable alternative. Learn more at this site: Kevin Ulrich. Psylock on CeBIT 2011 introduces its patented tip biometrics solutions at booth B-26 in Hall 11.

The fair offers all interested parties the opportunity to test the intuitive high-security systems. This method is the only tip behavior, which does not require a password. The user taps only a short, the displayed on screen Set off. The system recognizes the user based on specific characteristics of the tip. These match the user name that the Psylock software provides access to the Microsoft operating system.

In contrast to knowledge or possession-based methods such as passwords or hardware tokens, etc. it is a pure software solution. The risk that users forget or willingly or unwittingly pass on your access data, is thus reduced to zero. Can be used as two-factor authentication, users can Psylock Windows login »flexible insert for the application: either as a pure password replacement or to increase security even further as a two-factor authentication. From a data protection perspective, this biometrics method is unobjectionable, as profile data, which created the system on the basis of the typing habits of users, say anything about age, sex, health or ethnic origin. The Psylock procedure was tested by TuV SuD and certified as compliant with data protection.

Comments are closed.