Skip to main content

[Giveaway] KeyLemon: Use Your Face as Your Password

Facial recognition software has been around for quite some time. Google's Picasa image organizer has a built in face recognition system that can associate faces with persons. Apple’s photo organizer iPhoto has a similar feature. Facebook also included face recognition technology and the latest version of Windows Live Photo Gallery also included one. So far facial recognition has been used only for convenience purposes, as a mean to automate jobs such as image sorting and identification, but never as a security solution.

Industry leaders are now starting to see biometrics as a viable alternative to passwords. Android 4.0 Ice Cream Sandwich has an optional Face Unlock feature that employs facial recognition software to unlock their phones instead of hassling with the traditional pin codes or pattern unlocks. Apple is also rumored to be working on facial recognition for their Mac operating system. Windows is not likely to have native biometric authentication any time soon; Windows 8 does include a pattern password feature though.

But Switzerland based software company KeyLemon has been offering affordable (and free) biometrics security software for personal computers for the last 5 years. KeyLemon offer a simple and convenient solution for users to login to their Windows computer and other web services using their face instead of a password.

keylemon-login

KeyLemon replaces the standard Windows logon screen with a KeyLemon login screen that connects to the computer’s webcam. Users can automatically login to their Windows computer by simply positioning their face in front of their webcam. If the computer has multiple users the software automatically logs the user into the right Windows account. When the user leaves the computer, KeyLemon automatically locks it and then unlock it when the user is back. When an unauthorized user attempts to login to the computer, their mug shots are recorded and saved for the owner to review.

Under good lighting condition, authentication takes barely a second allowing for quick logins that isn’t possible with tradition password based login. If due to bad lighting or some other reasons, KeyLemon fails to identify the user, the program allows the user to fallback to the default Windows password based login.

KeyLemon has been reported to be easily fooled by a smartphone recording of the face of the user. This is true, but the success or failure of this depends on the trade-off the user made between convenience and security when configuring KeyLemon. The program offers three security level – High, Medium and Low.

keylemon-profile

High security offers maximum security with accurate facial recognition. A high level of correlation is required for authentication which demands adequate lighting. KeyLemon cannot be fooled by a video recording of the user’s face at this security setting. In the Medium security setting, a compromise is made between ease of use and authentication. At this setting, KeyLemon tends to get duped when a video recording of the user’s face is held in front of the webcam. The Low security setting offers the lowest security and should be avoided. At the lowest setting, even a still picture of the user can unlock the computer.

However, to prevent spoofing KeyLemon includes an anti-spoofing technology. When this is enabled, the user is required to blink his or her eyes to unlock the computer. The blinking action also needs to be made at a certain moment when the anti-spoofing icon lights up. This makes spoofing nearly impossible since not only the intruder will need to acquire a video of the user blinking but he or she needs to make sure the whole thing is accurately timed when played back in front of the webcam.

With anti-spoofing enabled, even the Low security level can provide adequate protection that cannot be easily bypassed.

keylemon-plugins

KeyLemon includes several plug-ins that enhances the program features, but unlike traditional plug-ins, they come preinstalled with the software. Currently four such plug-ins are available and they offer a range of interesting features.

The LemonDay plug-in allows one to archive every picture of himself or herself the webcam takes at logon and then stich them together to create a glorious time-lapse video. This is a fun way to track the evolution of one’s face with time.

The LemonLogin plug-in allows one to use themes on the logon screen and personalize it with their own background pictures.

The LemonLock plug-in automatically locks the computer when the owner is not in front of the computer. If an unauthorized person tries to use the computer there is an option to take a picture of them.

LemonFox is another plug-in that installs an add-on in Firefox that enables users to log in to three social-networking services using their Webcam. The supported websites are currently Facebook, Twitter and Linked In.

keylemon-facebook

To login into the social-networking simply open the supported website and KeyLemon will launch authentication. If facial authentication is successful, your login credentials are searched in the login manager of Firefox. If they are not already stored, a window asks you the credentials. Once you’ve entered your login username and password, these are stored in Firefox’s password manager. The next time you open the website, your face will be scanned and only when the authentication succeeds, you will be logged into the website.

KeyLemon comes in three flavors – Basic, Bronze and Gold. Basic is free to use but contains only Windows login with majority of features locked. Bronze contains more features than Basic but still lacks Hijackers Tracking, Security Levels, Anti-spoofing and LemonFox. Bronze is priced at around $20. The Gold version is the complete product and costs twice that of Bronze.

Thanks to KeyLemon, we have 5 Gold licenses to giveaway to our readers. If you are interested in entering this giveaway contest, simply leave your real name and email ID in the form below. Winners will be selected by a random draw. The contest closes on 22 July, 2012.

Comments

  1. thanks for sharing such a nice software information, i was waiting for one like te above since last few months

    ReplyDelete
  2. Thanks for news. Just count me in, please..

    ReplyDelete

Post a Comment

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: