Taking photos with a wink, checking one's calendar with a glance of the right eye, reading text messages — the multinational cooperation Google wants to make it possible with Google Glass.
But what IT experts celebrate as a new milestone makes privacy groups skeptical. So far, few people have access to the prototype to test how it can be used in daily life. "Thanks to the Max Planck Institute for Informatics we are one of the few universities in Germany that can do research with Google Glass", says Dominique Schröder, assistant professor of Cryptographic Algorithms at Saarland University.
Mark Simkin wants to use "Google Glass" to withdraw money at a cash machine in such a secure way that no spying is possible.
Credit: Oliver Dietze
The futuristic-looking device consists of a glasses frame on which a camera and a mini computer are installed. It depicts information in the user's field of vision via a glass prism that is installed at the front end of the right temple. According to the German computer magazine "c't", this causes an effect "as if the user were looking at a 24 inch screen from a distance of two and a half meters". Schröder, who also does research at the Center for IT-Security, Privacy and Accountability (CISPA), located only a few yards away, is aware of the data security concerns with Google Glass:
"We know that you can use it to abuse data. But it can also be used to protect data." To prove this, Schröder and his group combine "Google Glass" with cryptographic methods and techniques from automated image analysis to create the software system "Ubic". By using Ubic, withdrawing money at a cash machine would change as follows: The customer identifies himself to the cash machine.
This requests from a reliable instance the public key of the customer. It uses the key to encrypt the one-way personal identification number (PIN) and seals it additionally with a "digital signature", the digital counterpart of the conventional signature. The result shows up on the screen as a black-and-white pattern, a so-called QR code. The PIN that is hidden below is only visible for the identified wearer of the glasses. Google Glass decrypts it and shows it in the wearer's field of vision."
Although the process occurs in public, nobody is able to spy on the PIN", explains Schröder. This is not the case if PINs are sent to a smart phone. To spy on the PIN while it is being entered would also be useless, since the PIN is re-generated each time the customer uses the cash machine. An attacker also wearing a Google Glass is not able to spy on the process, either. The digital signature guarantees that no assailant is able to intrude between the customer and the cash machine as during the so-called "skimming", where the assailant can impersonate the customer.
Only the customer is able to decrypt the encryption by the public key with his secret key. As long as this is safely stored on the Google Glass, his money is also safe. At the computer expo Cebit, the researchers will also present how Google Glass can be used to hide information. Several persons all wearing Google Glass can read the same document with encrypted text at the same time, but in their fields of vision they can only see the text passages that are intended for them.
"This could be interesting, for example, for large companies or agencies that are collecting information in one document, but do not want to show all parts to everybody", explains Mark Simkin, who was one of the developers of Ubic. A large electric company has already sent a request to the computer scientists in Saarbrücken. Google Glass is expected to enter the American market this year.
Background information about computer science research at Saarland University in Germany
The Department of Computer Science represents the center of computer science research in Saarbrücken. Seven other worldwide renowned research institutes are close by the department: The Max Planck Institutes for Informatics and for Software Systems, the German Research Center for Artificial Intelligence (DFKI), the Center for Bioinformatics, the Intel Visual Computing Institute, the Center for IT Security, Privacy and Accountability (CISPA) and the Cluster of Excellence "Multimodal Computing and Interaction".
Project video: http://goo.gl/4mS0Jq
Phone: +49 681 302-71922
Competence Center of Informatics
Phone: +49 (0)681 302-70741
Dominique Schroeder | EurekAlert!
'Magic' sphere for information transfer
24.08.2015 | Lomonosov Moscow State University
Fraunhofer IPA develops prototype of intelligent care cart
20.08.2015 | Fraunhofer-Institut für Produktionstechnik und Automatisierung IPA
A University of Oklahoma astrophysicist and his Chinese collaborator have found two supermassive black holes in Markarian 231, the nearest quasar to Earth, using observations from NASA's Hubble Space Telescope.
The discovery of two supermassive black holes--one larger one and a second, smaller one--are evidence of a binary black hole and suggests that supermassive...
A team of European researchers have developed a model to simulate the impact of tsunamis generated by earthquakes and applied it to the Eastern Mediterranean. The results show how tsunami waves could hit and inundate coastal areas in southern Italy and Greece. The study is published today (27 August) in Ocean Science, an open access journal of the European Geosciences Union (EGU).
Though not as frequent as in the Pacific and Indian oceans, tsunamis also occur in the Mediterranean, mainly due to earthquakes generated when the African...
In mountainous regions earthquakes often cause strong landslides, which can be exacerbated by heavy rain. However, after an initial increase, the frequency of these mass wasting events, often enormous and dangerous, declines, in fact independently of meteorological events and aftershocks.
These new findings are presented by a German-Franco-Japanese team of geoscientists in the current issue of the journal Geology, under the lead of the GFZ...
Bacteria do not cease to amaze us with their survival strategies. A research team from the University of Basel's Biozentrum has now discovered how bacteria enter a sleep mode using a so-called FIC toxin. In the current issue of “Cell Reports”, the scientists describe the mechanism of action and also explain why their discovery provides new insights into the evolution of pathogens.
For many poisons there are antidotes which neutralize their toxic effect. Toxin-antitoxin systems in bacteria work in a similar manner: As long as a cell...
It comes when called, bringing care utensils with it and recording how they are used: Fraunhofer IPA is developing an intelligent care cart that provides care staff with physical and informational support in their day-to-day work. The scientists at Fraunhofer IPA have now completed a first prototype. In doing so, they are continuing in their efforts to improve working conditions in the care sector and are developing solutions designed to address the challenges of demographic change.
Technical assistance systems can improve the difficult working conditions in residential nursing homes and hospitals by helping the staff in their work and...
20.08.2015 | Event News
20.08.2015 | Event News
19.08.2015 | Event News
28.08.2015 | Physics and Astronomy
28.08.2015 | Health and Medicine
28.08.2015 | Life Sciences