Safelock: Biometric Typing Security

[youtube=http://www.youtube.com/watch?v=_vMb9JUhC1g]

We’ve seen some ways to bypass biometric security measures but here’s a new offering that we think will be hard to fool. The Safelock system is used in conjunction with a password to identify a specific user. This software records your typing style including the time between keystrokes, the time keys are held, and key pressure data. This information is then normalized and compared to the information stored about the user when the password was originally set. If you don’t fall within specifications that match the stored data, you won’t get in even with the right password.

The icing on the cake is that Safelock will look for malicious users. If you enter the wrong password, it will begin to record and analyze your typing style. If you make enough incorrect attempts you will be labeled as a security threat and locked out of the system altogether. We can only think of one reliable way to circumvent this and that’s using a man-in-the-middle method of recording the keyboard inputs of the legitimate user for playback later.

This is an innovative user identification system and we’re not the only ones that think so. [Jeff Allen] and [John Howard], students at SMU won first prize for the Student Innovation Contest at the 2009 User Interface Software and Technology Symposium.

Adding A Keypad To A Key Card Lock

keypad

[Colin Merkel] had a little problem: he was continually forgetting his electronic key card, locking himself out of his own dorm room. Like any normal Hack a Day reader, rather than getting in the habit of always carrying his card, the natural impulse of course is to build this elaborate rig of electronics and duct tape. Right?

The result is an additional keypad that can be used to gain access…not by altering the existing electronic lock, but with a secondary mechanism that operates the inside door handle. An 8-bit PIC microcontroller scans the outside keypad (connected by a thin ribbon cable), and when a correct access code is entered, engages a 12 volt DC motor to turn the handle. It’s a great little writeup that includes a parts list, source code, and explains the process of keypad scanning.

It’s similar to the RFID-based dorm hack we previously posted. By physically operating the handle, most any approach could be used: facial recognition, other biometrics, DDR pad, or whatever inspired lunacy you can dream up.

Robot Security Patrol Brings Skynet Closer

autonomous_atv

The students at the University of Oklahoma have put together a robot that will surely join the other drones in our future robot overlord regime. This autonomous vehicle was produced to replace human security patrols which can be both boring and dangerous. Intent on delivering surveillance to most locations, an all terrain vehicle was used as the base. It can navigate by itself through an obstacle avoidance system and communicate video and audio wirelessly. After the break we’ll take a look at the systems that make this work. Continue reading “Robot Security Patrol Brings Skynet Closer”

Garage Door… Packet Sniffer

Some type of logger or sniffer exists for almost every form of electronic communication. Your keystrokes, phone conversations, and wireless networks could all be monitored. In this awesome proof-of-concept project, [James] expanded that array to include garage door openers. After receiving a piece of chain mail which stated that criminals have the technology to record any remote code and play it back, [James] wondered if he could build such a device that would work on at least his opener model. Continue reading “Garage Door… Packet Sniffer”

See Through Walls Via Wireless Network

Seeingthroughwalls

Researchers at the University of Utah have been able to detect movement in a room based on variations in wireless signals. Accurate to about a meter, they are using a 34 node wireless network to do their sensing.  As a person moves, they change the signals, and can therefore be detected. They state one possible application being rescue workers deploying multiple wireless nodes around a building to find people located inside.

[via Gizmodo]

Homemade Bokode

[vimeo http://vimeo.com/6803291%5D

We’ve recently been getting a lot of new comments on our Bokode post from a while back, and with good reason.  [M@] has managed to find a way to replicate Bokode at home, using $0 worth of equipment (before the price of microprint). To accomplish Bokode at home, it seems all you need is and old webcam lens assembly and an LED.  Of course the his version is not as thin as a regular barcode so it probably wont be replacing anything in the near future, but the concept of from MIT to home within such a short period of time is amazing.

Batcave-style Entrance (on A Budget)

buttonhead

Want to enter your hidden lair in style? Well [Jimmy] simply wanted to create a cool prop for his school’s homecoming dance. This project includes some obvious inspiration from Wayne Manor. [Jimmy] wired up the automated entrance with a 12VDC motor. In order for it to be able to push the door , the motor had to be attached to a gearbox, which directly powered a wheel. Current consumption issues were solved by using a wall-wart. Because a real bookshelf would still be too heavy, [Jimmy] dressed up a regular door with some patterned wallpaper to give it the right look. Coupled with a Shakespearean bust concealing the button, and some other cosmetic touches, this project was sure to impress any student who knew its secret.