SlideShare una empresa de Scribd logo
1 de 19
COLLEGE OF TECHNOLOGY AND ENGINEERING
(Affiliated to MPUAT, Udaipur Rajasthan)
A Technical Seminar on
Password Pill
Outlines…
• Introduction
• What is a Password Pill?
• Why Password Pill?
• Technology
• Working n process
• Digital Tattoo
• Working
Introduction
• In October 2013, the Motorola company is working on new methods
that would make remembering passwords unnecessary. Motorola
thinks it has a solution to the password problem.
• Motorola Advanced Technology and Projects Group Chief Regina
Dugan disclosed that the firm is working on electronic tattoo or
implantable chips that would make the human body the tool for
identification.
• Motorola is working with mc10,
• Motorola disclosed two ways of logging into your electronic device that
require no password typing at all:
 Pills..
 tattoos..
What is password pill
 Pill that would serve as a password
for all your accounts.
Password Pill…
 Motorola has developed a unique way for securing your digital device,
 Pill is developed by Proteus Digital Health.
 This PILL has a Small Chip inside of it, with a switch, a swallow pill
known as a “vitamin authentication” system.
 When you swallow it, the acids in your stomach serve as the electrolyte
and power it up. And the switch goes on and off, and it creates an 18-bit
ECG-like signal in your body and essentially “your entire body
becomes your authentication token”.
Why Password Pill
People generally don’t use unique passwords for each site they visit.
Some people just use Plain password. Even if you use strong
passwords, sites still get hacked ,
That chip would basically turn your entire body into an
authentication device, and you would theoretically never have to
remember a password .
Motorola thinks it has a solution of the Multiple Password
problem and security issues.
To avoid remember multiple password problem and provide a
better way of security.
using authentication :
Two -Factor Authentication for Unnecessary Remembering
Passwords,
Two-Factor Authentication:
 Two-factor authentication- where a user logs in with a user
name and password, and then a second password is sent by the
system to the user via another channel, such as a code sent to
the user's phone. The second password is then entered, to
complete the authentication. If tattoos/stickers or pills were
used, they could become the second factor.
Example
Flow chart of Pill Process:
Advantage of Password Pill:
Security
Easy to use
Not harm for body
Editable Password Pill
All Password in just one Pill
Pill is government-approved and “safe” enough that a person
could take 30 a day.
Disadvantage of Password Pill:
Authentication Pill take every day to maintain the effect which could
be slight disadvantage, “you may forget your password but you will
have to remember to take the pill”.
Digital Tattoo:
“This is a developmental system made by MC10. It has an Antenna
and some Sensors embedded in it, and what we plan to do is work with
them to advance a tattoo that could be used for authentication.”
MC10 specializes in products that utilize its stretchable circuits.
contain flexible electronic circuits.
The tattoo is stretched or twisted, the connections won't break. It's also
waterproof, which means that even if you're swimming or in the shower,
the tattoo won't be affected.
Electronic sticker
 Described electronic tattoo as a variation of wearable
technology, with sensors that would unlock your Digital
account, tattoo with an electronically generated bar code like
image is placed on someone’s arm, Antenna that can recognize
your device after which it sent out an authentication signal.
 It is clear that the digital tattoo is capable of further
breaking down the boundary between users and their
devices.
 One important thing to note is that this tattoo would almost
certainly not be a permanent one.
Advantage of Tattoo:
Transparent sticker
Stretchable Circuit
Wearable technology
Waterproof tattoo
Temporary tattoo
Week long electronic sticker
WHAT WE CONCLUDE...
 Google owns several services that require authentication. Imagine a
future where Google is even more a part of your everyday life, to
the point that you’re taking a pill each morning so you can open up
Gmail without having to type in your password.
Password Pill

Más contenido relacionado

La actualidad más candente

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationDhvani Shah
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importanceshubhangi singh
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
How Educational Institutions Can Provide Digital Mark Sheets To Students Us...
How Educational Institutions Can  Provide Digital Mark Sheets To Students  Us...How Educational Institutions Can  Provide Digital Mark Sheets To Students  Us...
How Educational Institutions Can Provide Digital Mark Sheets To Students Us...DigiLocker
 
Basic of Robotics Process Automation
Basic of Robotics Process AutomationBasic of Robotics Process Automation
Basic of Robotics Process AutomationShubham Akole
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 

La actualidad más candente (20)

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
3 d password
3 d password 3 d password
3 d password
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Internet
3D Internet3D Internet
3D Internet
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D Password
3D Password3D Password
3D Password
 
3D password
3D password3D password
3D password
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
What Is Immersive Technology? by Advrtas
What Is Immersive Technology?  by AdvrtasWhat Is Immersive Technology?  by Advrtas
What Is Immersive Technology? by Advrtas
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
How Educational Institutions Can Provide Digital Mark Sheets To Students Us...
How Educational Institutions Can  Provide Digital Mark Sheets To Students  Us...How Educational Institutions Can  Provide Digital Mark Sheets To Students  Us...
How Educational Institutions Can Provide Digital Mark Sheets To Students Us...
 
3 d password
3 d password3 d password
3 d password
 
Basic of Robotics Process Automation
Basic of Robotics Process AutomationBasic of Robotics Process Automation
Basic of Robotics Process Automation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 

Destacado

Wiimote Whiteboard
Wiimote WhiteboardWiimote Whiteboard
Wiimote WhiteboardmystrE
 
How To Collaborate Using Writeboard
How To Collaborate Using WriteboardHow To Collaborate Using Writeboard
How To Collaborate Using WriteboardLora Shinault
 
speed detection camera
speed detection cameraspeed detection camera
speed detection cameraAkhil Kc
 
Passing the healthcare innovation torch: from medicinal chemistry, though bio...
Passing the healthcare innovation torch: from medicinal chemistry, though bio...Passing the healthcare innovation torch: from medicinal chemistry, though bio...
Passing the healthcare innovation torch: from medicinal chemistry, though bio...Martin Sumner-Smith
 
Vehicle Speed detecter By PRAGYA AGARWAL
Vehicle Speed detecter By PRAGYA AGARWALVehicle Speed detecter By PRAGYA AGARWAL
Vehicle Speed detecter By PRAGYA AGARWALiamtheone5
 
Vehicle Over Speed Detection on Highways
Vehicle Over Speed Detection on HighwaysVehicle Over Speed Detection on Highways
Vehicle Over Speed Detection on HighwaysEdgefxkits & Solutions
 
E skin.pptx
E skin.pptxE skin.pptx
E skin.pptxfoysalmd
 
Electronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain functionElectronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain functioncmr cet
 
Speed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasSpeed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasVIKAS SINGH BHADOURIA
 

Destacado (15)

Password pill
Password pillPassword pill
Password pill
 
Wiimote Whiteboard
Wiimote WhiteboardWiimote Whiteboard
Wiimote Whiteboard
 
How To Collaborate Using Writeboard
How To Collaborate Using WriteboardHow To Collaborate Using Writeboard
How To Collaborate Using Writeboard
 
ELECTRONIC TATTOO
ELECTRONIC TATTOOELECTRONIC TATTOO
ELECTRONIC TATTOO
 
speed detection camera
speed detection cameraspeed detection camera
speed detection camera
 
Passing the healthcare innovation torch: from medicinal chemistry, though bio...
Passing the healthcare innovation torch: from medicinal chemistry, though bio...Passing the healthcare innovation torch: from medicinal chemistry, though bio...
Passing the healthcare innovation torch: from medicinal chemistry, though bio...
 
Vehicle Speed detecter By PRAGYA AGARWAL
Vehicle Speed detecter By PRAGYA AGARWALVehicle Speed detecter By PRAGYA AGARWAL
Vehicle Speed detecter By PRAGYA AGARWAL
 
Vehicle Over Speed Detection on Highways
Vehicle Over Speed Detection on HighwaysVehicle Over Speed Detection on Highways
Vehicle Over Speed Detection on Highways
 
E skin.pptx
E skin.pptxE skin.pptx
E skin.pptx
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 
Electronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain functionElectronic' skin monitors heart, brain function
Electronic' skin monitors heart, brain function
 
Speed cameras ppt full ...
Speed cameras ppt full ...Speed cameras ppt full ...
Speed cameras ppt full ...
 
Speed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasSpeed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-cameras
 
Google glass
Google glassGoogle glass
Google glass
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar a Password Pill

A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Passwordijtsrd
 
IRJET - A Review of Cyber Security using Biometric Devices
IRJET -  	  A Review of Cyber Security using Biometric DevicesIRJET -  	  A Review of Cyber Security using Biometric Devices
IRJET - A Review of Cyber Security using Biometric DevicesIRJET Journal
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital TrustBahaa Al Zubaidi
 
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEOTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEKethavathSrinu
 
Supply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationSupply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationBilcareltd
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain UsageBilcareltd
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access systemAkshay Govekar
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET Journal
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 

Similar a Password Pill (20)

3 steps security
3 steps security3 steps security
3 steps security
 
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
 
IRJET - A Review of Cyber Security using Biometric Devices
IRJET -  	  A Review of Cyber Security using Biometric DevicesIRJET -  	  A Review of Cyber Security using Biometric Devices
IRJET - A Review of Cyber Security using Biometric Devices
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
Smart door lock system
Smart door lock system Smart door lock system
Smart door lock system
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital Trust
 
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEOTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
 
Supply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationSupply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns Application
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
Fingerprint based authentication system
Fingerprint based authentication systemFingerprint based authentication system
Fingerprint based authentication system
 
Authentication
AuthenticationAuthentication
Authentication
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 

Último

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 

Último (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 

Password Pill

  • 1. COLLEGE OF TECHNOLOGY AND ENGINEERING (Affiliated to MPUAT, Udaipur Rajasthan) A Technical Seminar on Password Pill
  • 2. Outlines… • Introduction • What is a Password Pill? • Why Password Pill? • Technology • Working n process • Digital Tattoo • Working
  • 3. Introduction • In October 2013, the Motorola company is working on new methods that would make remembering passwords unnecessary. Motorola thinks it has a solution to the password problem. • Motorola Advanced Technology and Projects Group Chief Regina Dugan disclosed that the firm is working on electronic tattoo or implantable chips that would make the human body the tool for identification. • Motorola is working with mc10, • Motorola disclosed two ways of logging into your electronic device that require no password typing at all:  Pills..  tattoos..
  • 4. What is password pill  Pill that would serve as a password for all your accounts.
  • 5. Password Pill…  Motorola has developed a unique way for securing your digital device,  Pill is developed by Proteus Digital Health.  This PILL has a Small Chip inside of it, with a switch, a swallow pill known as a “vitamin authentication” system.  When you swallow it, the acids in your stomach serve as the electrolyte and power it up. And the switch goes on and off, and it creates an 18-bit ECG-like signal in your body and essentially “your entire body becomes your authentication token”.
  • 6. Why Password Pill People generally don’t use unique passwords for each site they visit. Some people just use Plain password. Even if you use strong passwords, sites still get hacked , That chip would basically turn your entire body into an authentication device, and you would theoretically never have to remember a password . Motorola thinks it has a solution of the Multiple Password problem and security issues. To avoid remember multiple password problem and provide a better way of security. using authentication : Two -Factor Authentication for Unnecessary Remembering Passwords,
  • 7. Two-Factor Authentication:  Two-factor authentication- where a user logs in with a user name and password, and then a second password is sent by the system to the user via another channel, such as a code sent to the user's phone. The second password is then entered, to complete the authentication. If tattoos/stickers or pills were used, they could become the second factor.
  • 8.
  • 9.
  • 10.
  • 12. Flow chart of Pill Process:
  • 13. Advantage of Password Pill: Security Easy to use Not harm for body Editable Password Pill All Password in just one Pill Pill is government-approved and “safe” enough that a person could take 30 a day. Disadvantage of Password Pill: Authentication Pill take every day to maintain the effect which could be slight disadvantage, “you may forget your password but you will have to remember to take the pill”.
  • 14. Digital Tattoo: “This is a developmental system made by MC10. It has an Antenna and some Sensors embedded in it, and what we plan to do is work with them to advance a tattoo that could be used for authentication.” MC10 specializes in products that utilize its stretchable circuits. contain flexible electronic circuits. The tattoo is stretched or twisted, the connections won't break. It's also waterproof, which means that even if you're swimming or in the shower, the tattoo won't be affected.
  • 15.
  • 16. Electronic sticker  Described electronic tattoo as a variation of wearable technology, with sensors that would unlock your Digital account, tattoo with an electronically generated bar code like image is placed on someone’s arm, Antenna that can recognize your device after which it sent out an authentication signal.  It is clear that the digital tattoo is capable of further breaking down the boundary between users and their devices.  One important thing to note is that this tattoo would almost certainly not be a permanent one.
  • 17. Advantage of Tattoo: Transparent sticker Stretchable Circuit Wearable technology Waterproof tattoo Temporary tattoo Week long electronic sticker
  • 18. WHAT WE CONCLUDE...  Google owns several services that require authentication. Imagine a future where Google is even more a part of your everyday life, to the point that you’re taking a pill each morning so you can open up Gmail without having to type in your password.