biometric 4 Fingers IoT smart hub security

A Typical Day in a Biometric Life

From the Internet of Things to the widespread adoption of mobile devices, we rely on technology for nearly everything in our day-to-day lives. As these and related technologies enable further innovations like smart hubs, connected homes, and biometrics, we can see a future where nearly every aspect of our lives is automatically adjusted for our convenience with the touch of a hand or simple spoken phrase.

Today, let’s take a look at what the “biometric life” will look like in the not so distant future.

A Simpler Morning

Josh opens his eyes in the morning to his smartwatch vibrating him awake. The careful measurement of his sleep patterns helps the device select the optimal time to disrupt his dreams, with plenty of time to get ready for work. Sitting up, he rubs his eyes then speaks. “Good morning.”

At the sound of his voice, the smart hub on his dresser comes to live, turning on the lights and gently increasing the brightness to the equivalent of a sunny day. The daily weather forecast sounds off, followed by curated reports from the morning’s news based on Josh’s preferences. In the other room, the coffee pot clicks on, and his laptop and smartphone both “wake up,” exiting their power-save modes and preparing for use.

After heading to the bathroom and pouring himself a nice hot cup of coffee, Josh picks up his phone and snaps a selfie to unlock it. It doesn’t matter that he hasn’t showered or groomed yet, no one’s ever going to see this selfie, after the facial recognition is performed the image is automatically deleted for his privacy (and security). This snapshot authenticates Josh and grants him access to his phone, email, news, and social media apps. He browses the news as he sips his coffee, checks Facebook, then taps his Stocks app.

Upon opening, the app requests authentication via 4 Fingers. Josh scans his hand, and the app opens up to his portfolio. He reviews the latest data and shoots off a quick message to his financial advisor asking if he should buy more shares of Veridium. Since he recently authenticated biometrically, the message is validated and confirmed as coming from Josh before it even arrives in his advisor’s inbox.

Setting his phone down, Josh heads off to take a shower. After stepping a few feet away, his phone’s near field communication (NFC) sensors check the distance from his smartwatch and locks down. Josh finishes getting ready for work, grabs his phone, and walks out the front door. Walking up to his car, he presses his thumb against the sensor on the lock and the car door unlocks. At the same time, the driver’s seat and mirrors all adjust to his preset preferences, and the stereo syncs to his phone via Bluetooth, loading up his favorite podcast to listen to on his commute.

Pulling out of the driveway, the location sensors in his phone trigger his home’s security system to lock down. All the doors lock, his security alarm activates, and motion detection cameras inside and out switch on as well.

All without an explicit command from Josh himself.

A Smarter Workday

Pulling into the parking garage at work, Josh parks and starts walking toward the elevator. The location sensors in his phone activate again, and a push notification arrives requesting he take a selfie to authenticate. Pulling his phone out, he snaps the photo and the door unlocks. At the same time, his office’s workforce management system clocks him in for the day. He steps in the elevator and heads toward his office.

At his desk, Josh, who works at a software development firm, needs to authenticate again to gain access to secure servers. He wakes up his computer and clicks the login button. Instead of typing in his password, his phone receives another push notification asking for 4 Fingers authentication. Scanning his prints, Josh gets logged into the computer and the screen switches to his desktop. He’s also authenticated against his firm’s Active Directory database, and a single sign-on function logs him into his work email, Slack channel, and any other apps he uses regularly.

After working through the morning, Josh steps away to get some lunch. When he takes a few steps away from his computer, paired NFC sensors register the distance and his computer locks again, securing his particular terminal. Later, when he comes back from lunch, since he still has a strong confidence score through the constant collection of behavioral biometrics on his phone and smartwatch, the computer is able to unlock automatically, rather than requesting another 4 Fingers scan from him.

A Convenient Evening

Josh wraps up work and a few of his friends in the office invite him out for drinks. They head to their favorite after-work bar, Josh offers to buy the first round. After ordering, Josh makes a payment through his phone. He taps his payment app, scans his fingerprint, and taps his phone to the bar’s NFC reader. The payment goes through to his card immediately, and Josh balances four pints of beer back to the table.

After a drink and a few laughs, Josh is ready to head home. He pulls into his driveway, and the location sensors in his phone trigger a silent alert to his security system that he’s nearby. This activates his front porch light and some interior ones as well. Walking up to the front door, a camera snaps an image of Josh’s face, authenticates, and the door automatically unlocks and his alarm deactivates.

Later that evening after eating dinner, Josh settles in to watch some TV before bed. His smartwatch and smart TV communicate with each other as he enters the living room, and the TV switches itself on and changes to his favorite channel for that time and day of the week. Furthermore, this action communicates with his smart hub, and the lights in his living room automatically dim to a comfortable level.

At the end of the day, Josh walks into his bedroom and says “Goodnight” to his smart hub. This triggers a series of nighttime ritual events. His morning alarm switches on, as well as the security system in his house. Any lights left on in other rooms automatically turn off, and his climate control system sets itself to his preferred sleeping temperature. Furthermore, his devices all sync with his automatic backup service, and tomorrow’s schedule and todo list syncs to his phone. Finally, as he’s getting ready to lay down, he hears his phone chime, reminding him that he forgot to plug it in for the night to charge.

The Future is Now

Sound like a futuristic scenario? There are already people testing or using all of these technologies, and it may not be too long before we’re living day-to-day similarly, if not even more advanced, than Josh is here.

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

The Largest Internet Company in Mexico Taps Tec360 and Veridium for Trusted Phishing Resistant Passwordless Authentication and to secure Okta SSO A top provider of


Veridium The True Passwordless Enterprise

Veridium The True Password-less Enterprise In February 2017 when I joined Veridium as CPO, I recognised and appreciated one of the biggest challenges for Enterprise