{"id":5916,"date":"2015-06-23T09:08:50","date_gmt":"2015-06-23T13:08:50","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5916"},"modified":"2017-11-08T07:39:12","modified_gmt":"2017-11-08T07:39:12","slug":"google-projects-soli-jacquard-vault-abacus","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/google-projects-soli-jacquard-vault-abacus\/5916\/","title":{"rendered":"4 new Google projects: a couple of words about Soli, Jacquard, Vault and Abacus"},"content":{"rendered":"<p>At the recent <a href=\"https:\/\/www.kaspersky.com\/blog\/google-io2015-news\/\" target=\"_blank\" rel=\"noopener nofollow\">Google I\/O conference<\/a>, the \u2018corporation of good\u2019 announced (besides new Android versions, new services and other predictable things), four new projects: Soli, Jacquard, Vault and Abacus. Let\u2019s see what those curios techs are about and how they can make our world a better place.<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Google's latest Android update brings some much needed privacy strengthening <a href=\"https:\/\/twitter.com\/hashtag\/io15?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#io15<\/a> \u2013 <a href=\"http:\/\/t.co\/XPdvEUioPP\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/XPdvEUioPP<\/a> <a href=\"http:\/\/t.co\/aWcCY8Ncjw\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/aWcCY8Ncjw<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/605304070480502784?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 1, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>Project Soli<\/strong> is a tiny sensor designed for smart watches or fitness bands to more accurate-ly track hand movements and enable better control by gestures. The gestures would be used both for device control (a way more convenient option than trying to manipulate tiny objects on an equally tiny screen) and ecosystem control using a wireless connection as Bluetooth to transmit commands.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Google's Project Soli to bring gesture control to wearables <a href=\"http:\/\/t.co\/49CxKuThu0\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/49CxKuThu0<\/a> <a href=\"http:\/\/t.co\/6C3X0EDPAV\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/6C3X0EDPAV<\/a><\/p>\n<p>\u2014 Engadget (@engadget) <a href=\"https:\/\/twitter.com\/engadget\/status\/604345730883547136?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 29, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As we know, today\u2019s gesture recognition technologies employ, mostly, the principle of analysing an image recorded by one or more cameras. But, first of all, it is a costly system as it requires a number of components, and, secondly, it is too demanding in terms of computing power and energy consumption.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/mpbWQbkl8_g?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;start=626&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>The Soli sensor is, in essence, a minuscule radar operating on the 60 GHz frequency using just two antennas. The sensor scans 10 \u2018frames\u2019 per second, and the reaction is practically instantaneous (which is a priority in any similar interface).<\/p>\n<p>And, besides that, you don\u2019t need to wave your hands like mad as with Kinect: Soli is capable of detecting mi-cro-gestures like rubbing your fingers, or snapping.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/0QNiZfSsPc0?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>It\u2019s not really clear how \u2018fast-learning\u2019 this interface would be: it is quite obvious that, for instance, multi-touch gestures, excluding the most basic ones, are used by, literally, no one. The most critical task would be then to ensure finger gestures are extremely intuitive and predictable and not require a user to sustain long drills learning and exercising the gestures.<\/p>\n<p><strong>Project Jacquard<\/strong> (the noun means a certain type of cloth, so that you know) is designed to dramatically transform the fashion industry. The idea is based on integrating multi-touch sensors into the cloth, so we could use a spot on our sleeve or lap instead of a smartphone screen.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Google is stepping into the world of smart fabrics: <a href=\"http:\/\/t.co\/CetZGrdF54\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/CetZGrdF54<\/a> <a href=\"http:\/\/t.co\/AYmBQ9DNlX\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/AYmBQ9DNlX<\/a><\/p>\n<p>\u2014 Forbes Tech (@ForbesTech) <a href=\"https:\/\/twitter.com\/ForbesTech\/status\/610879517780000768?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 16, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Besides the sensor surfaces themselves, the developers of the project Jacquard took care of special coloured conducting threads to connect sensors to controllers. That means, the threads would be clandestine and would not screw up the outfit design. Or, if you wish, they would be, quite on the contrary, visible to let the people around know you are wearing something unconventional, trendy and hi-techy.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/qObSFfdfe7I?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>It also is critical to mention that, from the technology perspective, the principle of integrating sensors into cloths has been already elaborated in a fashion that it does not raise the costs of producing such cutting-edge outfits. All you need is the conductive threads. So, it is not a nerdy concept bound to come true in 146 years from now: Google has already boasted its agreement with Levi\u2019s, so the cybernetic jeans are expected to ar-rive really soon.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/mpbWQbkl8_g?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;start=1386&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>The use cases for them which immediately spring to mind are, of course, an ability to input data without tak-ing out any gadget with a touch screen (for instance, to dial a phone number) and to serve the substitution of gaming controllers and other conventional means of input.<\/p>\n<p><strong>Project Vault<\/strong> is a brand new technology of protecting data against unsolicited access, which is forecasted to be even more secure that a fingerprint scan. It meta-objective is to finally get rid of passwords. Easy passwords which are easily memorized due to their simplicity and sensibility are easily cracked by today\u2019s computers in bare minutes. Complex passwords (the likes of <strong>Xj$7f(sQp]1v^4<\/strong>), on the other side, cannot be memorized by anyone, so it ends up being written on a post-it note which is nowhere close to being secure.<\/p>\n<p>Vault is a very compact device with a form factor of a microSD card. \u201cReal\u2019 computer or smartphone, regard-less of the OS it operates, detects the card as a detachable storage device containing two files: one to write into and one to read from.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Google\u2019s Project Vault is a secure computing environment on a micro SD card, for any platform <a href=\"http:\/\/t.co\/oTwxmcj06i\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/oTwxmcj06i<\/a> <a href=\"http:\/\/t.co\/IwL1fVga8j\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/IwL1fVga8j<\/a><\/p>\n<p>\u2014 TechCrunch (@TechCrunch) <a href=\"https:\/\/twitter.com\/TechCrunch\/status\/604456035873619968?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 30, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In fact, it is not a simple memory card. With all hardcore tech jibbering aside, it is a virtual computer, which is completely autonomous and has a job of encrypting and decrypting data, whereas external software, which-ever OS it is made for, performs a checksum to make sure the file read matched the file written and the key is accepted.<\/p>\n<p>You can gain access to important data from any device, but only if you happen to possess this \u2018wonderflash-drive\u2019 containing, besides non-volatile memory, an ARM processor, an NFC module, and an antenna, all wrapped in a single solutions managed by the Linux-based RTOS operational system.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/mpbWQbkl8_g?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;start=2851&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>That means, for the anywhere any time authorization purposes, one would require to just plug in the storage and not put in a password. The whole idea, by the way, is not revolutionary: all in all, it is just the same old USB token or its predecessor, an LPT key, which are used by many in online banking applications. The draw-back of those traditional solutions is the impossibility to get access from other devices: a user has to use previously prepared settings and install drivers to make both work on a PC.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>4 new @Google projects from #IO15: a couple of words about #Soli, #Jacquard, #Vault and #Abacus<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F69T4&amp;text=4+new+%40Google+projects+from+%23IO15%3A+a+couple+of+words+about+%23Soli%2C+%23Jacquard%2C+%23Vault+and+%23Abacus\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>During the demo, the Vault project was showcased at the secure messaging demonstration. An outbound message in encrypted on one smartphone, the is transmitted over open-protocol networks and is decrypted on the destination device. No keys are passed and thus they cannot be intercepted.<\/p>\n<p><strong>Project Abacus<\/strong> is a completely new approach to user authentication. Instead of using a password, or two-factor model, which relies, again, on password and some other authentication method, Google\u2019s researchers propose real multi-factor authentication, based on your location patterns, on how you talk, how you type and so on, and so forth. All these factors combined allow to identify a concrete person much more reliably than password.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/mpbWQbkl8_g?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;start=2478&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>The most amazing news here is that this technology doesn\u2019t require any specific hardware, everything project Abacus needs to operate already exists in every modern smartphone. It\u2019s just about adding some software. On the other side, this approach requires to gather a lot of information about user\u2019s behaviour. And it\u2019s quite uncomfortable, taking into account how much our data Google already has.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the recent Google I\/O conference, the \u2018corporation of good\u2019 announced (besides new Android versions, new services and other predictable things), four new projects: Soli, Jacquard, Vault and Abacus. Let\u2019s<\/p>\n","protected":false},"author":540,"featured_media":5918,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1623,2026],"tags":[1111,261,22,1052,434,1050,1048,1047,1049,97],"class_list":{"0":"post-5916","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-technology","9":"category-threats","10":"tag-2fa","11":"tag-encryption","12":"tag-google","13":"tag-io15","14":"tag-mobile-devices","15":"tag-project-abacus","16":"tag-project-jacquard","17":"tag-project-soli","18":"tag-project-vault","19":"tag-security-2"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/google-projects-soli-jacquard-vault-abacus\/5916\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/google-projects-soli-jacquard-vault-abacus\/4937\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/google-projects-soli-jacquard-vault-abacus\/5515\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/google-projects-soli-jacquard-vault-abacus\/6307\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/google-projects-soli-jacquard-vault-abacus\/9135\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/google-projects-soli-jacquard-vault-abacus\/4614\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/google-projects-soli-jacquard-vault-abacus\/5461\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/google-projects-soli-jacquard-vault-abacus\/5684\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/google-projects-soli-jacquard-vault-abacus\/7995\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/google-projects-soli-jacquard-vault-abacus\/9135\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/google-projects-soli-jacquard-vault-abacus\/9135\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/encryption\/","name":"encryption"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/540"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5916"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5916\/revisions"}],"predecessor-version":[{"id":11913,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5916\/revisions\/11913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5918"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}