Recently I made my way on reading some security aspects related to wearable computing. Many commercial vendors introduced Two-step authentication to claim the correct identity of their users. But that have been in the edge recently mainly because the emergent of wearable computing. As an example Google have two-step authentication for all their services by sending users a randomly code to their phones & taking the secret password. But that two steps are not completely possible on today’s world computing. Many wearable devices lack embedded keyboards with them & some of the times even a touchscreen . So implementing a password or PIN based authentication is a real challenge.
Google Android wear (moto), Samsung Gear, Apple iWatch & Sony smartwatch all are competing products in the market. But everyone have the fundamental challenge on securing their services. Many vendors explore the possibility of taking ‘factors’ as their authentication metrics…
View original post 237 more words