Motorola shows off electronic tattoo and authentication pill at D11

Motorola debuted some experimental security technology that would allow users to access their devices via an electronic tattoo.

Google-owned Motorola has some big plans for replacing your online and device passwords that include taking a pill every morning and wearing a tattoo on your arm. The two experimental prototypes were showcased during the D11 technology conference by Motorola's head of advanced technology and projects group, Regina Dugan. Both concepts are meant as alternatives to using passwords, passcodes, picture passwords, and two-factor authentication as a means to access your smartphone, tablet, car, and even your front door.

The first project Dugan displayed was a simple electronic tattoo manufactured by Cambridge, Massachusetts-based company MC10. The small electronic tattoo uses material developed by a University of Illinois research team led by Dr. John A. Rogers. The material can stretch up to 200 percent larger than its original size and features an antenna and a handful of sensors to authenticate with your devices. "It may be true that ten to twenty year-olds don't want to wear a watch on their wrist," Dugan said, taking an obvious dig at the recent rumors surrounding an Apple smart watch. "But you can be sure that they'll be far more interested in wearing an electronic tattoo, if only to piss off their parents."

The second project sounds like something straight out of Minority Report. Instead of entering passwords and secondary codes from a key fob all day, you could just take a vitamin authentication pill every morning. The pill features a small chip with one switch that uses your stomach acids to activate creating an 18-bit ECG-like signal inside your body. Dugan, who came to Google from the U.S. Defense Advanced Research Projects Agency (DARPA), likened taking the pill to having a super power. "My hands are like wires, my arms are like alligator clips," Dugan said. "When I touch my phone, my computer, my door, my car, I'm authenticated." The FDA-approved pill is produced by Proteus and currently used for medical applications such as detecting heart rate, physical activity, and resting state.

Don't be evil... please?

If it makes you queasy to think about wearing the mark of Google on your forearm or gulping down a Google-licious capsule every morning, you're not alone. During his interview with Dugan and Motorola CEO Dennis Woodside, AllThingsD's Walt Mossberg seemed a little taken aback. "Does Google now know everything I do and everywhere I go?" Mossberg said half-jokingly while holding the pill. "Because let's face it, we like you guys, but you're from Google." The search giant has a reputation for collecting too much data and has repeatedly landed in trouble for offenses such as snooping on open Wi-Fi networks and bypassing default privacy settings in browsers.

Qualms over Google's love of TMI aside, wearable technology is quickly becoming a big focus for the coming years. Beyond tattoos and pills, Google is working on its smartphone companion device, Google Glass. In January, Google published a research paper with ideas for using an NFC-enabled ring as an authentication device. In 2012, Nokia patented a magnetic material that could be applied to the skin to receive vibrating alerts for phone calls, text messages, and other smartphone notifications. And we recently took a look at a ton of wearable devices you can purchase right now from smart watches to wristband pedometers, and gaming vests that simulate in-game impacts.

Yep, wearable computers and devices will soon be everywhere. If Motorola has its way that's a future you'll soon have to swallow.

Join the CSO newsletter!

Error: Please check your email address.

Tags MotorolaGooglesecurityAccess control and authenticationUniversity of Illinoissecurity software

More about AppleDefense Advanced Research Projects AgencyGoogleMotorolaNFCNokiaTMI

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Ian Paul

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place