Token Ring – Phishing-Resistant Wearable Auth
?I had the recent pleasure of trying out a new wearable, biometric, FIDO2 MFA solution known as Token Ring (www.tokenring.com). It’s a lightweight ring, that biometrically reads your fingerprint as you put it on, that then communicates wirelessly to your device and applications. Here’s an enlarged image of the device.
What was my verdict?
It’s got me rethinking in a positive way about wearable authentication
Let me say that I started off as a skeptic. My natural inclination is to be wary of new types of authentication, especially ones promising nearly seamlessly auth without a lot of thinking involved. Token Ring has convinced me that the right elegant solution, done the right way, can pick up a lot of advocates.
First, you order a Token Ring to fit the finger your plan to use. Token Ring sends a “sizing-kit” in advance to ensure the proper sizing. The ring arrives along with a wireless charger and Near Field Communication (NFC) reader. I had to first charge the Token Ring an hour to make sure it was charged enough to perform my tests. The ring is very lightweight, yet sturdy. The rim of the ring flashes different colors as does a small circular LED on the side. Different colors mean different things.
You must first train the Token Ring to record and recognize your fingerprint. To do so, you put the Token Ring in biometric record mode
领英推荐
To biometrically authenticate to the Token Ring, you pass the end of your finger in and out of the ring until it indicates biometric success. The ring tells you by displaying a green LED light or a rainbow of colors. A red LED indicates the biometric reading didn’t work. I found in real-world use, that I had to initially briefly play around slipping the ring over my finger a few times to get biometric approval
Like any FIDO2-certified authentication solution
When you come up to a FIDO logon, you “double tap” the ring in the palm of your opposite hand. That wakes up the ring to tell it to authenticate to the site or service you’re trying to login to. You hold the activated ring over the NFC pad (provided by Token Ring). And then because it’s MFA, I had to put in my Windows Hello code as my FIDO2 “gesture”, which then logged me into my test site and applications.
I’ve got to say the experience is pretty cool. And everyone I showed it to wanted to get one. Wearing a ring is easier than hunting around and finding my USB token and plugging it into my laptop. I’ve only got three small caveats. One, I wish my Dell laptop came with a built-in NFC reader. That would make so I didn’t have to plug in Token Ring’s external NFC reader. It would save me step when traveling. Two, it currently doesn’t work with my Windows logon, but this is more due to how Microsoft is implementing FIDO logons. Currently FIDO2 logons are only available on enterprise versions of Windows using Intune. When Microsoft adds FIDO2 logons to all versions of Windows, it will work with mine. Lastly, you’ll have to take off the ring and let it charge every few days to make sure it has enough juice to authenticate. That’s true for many wireless authentication methods
Overall, it was a very cool device to play with. It was fun and did its job. It is solid, phishing-resistant, authentication. It shows what the future of wearable authentication will be like, except it’s available today. Visit www.tokenring.com if interested.
?
Identity, Credentials, Access Management and Zero Trust Engineer
9 个月I lost my wedding band on a canoe trip a couple of years ago so I’ve been wearing my Motiv ring since. It stopped working a few years, and I don’t think they ever deployed FIDO (although that was the plan as I recall) before the got bought. I’m waiting to get another wearable, this might be the one!
Technologist @ KAIMOSER.COM | IT Consultant, Entrepreneur
1 年And here I thought a token ring was what my hippie parents sat around in back in the late 60s… ;)
Cybersecurity & Engineering Leadership @ Gen? | Vice President Core Technology
1 年Feeling old now as my head associates Token Ring with network topology....
"The Mindful Coach?" | Tech Entrepreneur & Mindful Leadership Pioneer | Founder, Mindful Coach Association | Mindful Communications and Professional Presence Expert | Former Microsoft Tech Evangelist | ICF Coach |
1 年Wow. That's a beacon of hope
Experienced in Data Management-Governance, Privacy and Cyber Security Specialist, IT Architecture/Design, Project Execution and Cultural Change
1 年All approaches for human authentication rely on at least one of: What you know… What you have… and Who you are… so, something you have is carrying who you are. Great opportunity to hack ??