{"id":6762,"date":"2020-10-23T09:57:15","date_gmt":"2020-10-23T12:57:15","guid":{"rendered":"http:\/\/www.fie.undef.edu.ar\/ceptm\/?p=6762"},"modified":"2020-10-23T09:57:15","modified_gmt":"2020-10-23T12:57:15","slug":"nuevo-sistema-de-autenticacion-para-dispositivos-tacticos-basado-en-gafas-de-realidad-aumentada","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=6762","title":{"rendered":"Nuevo sistema de autenticaci\u00f3n para dispositivos t\u00e1cticos basado en gafas de realidad aumentada"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"justify\">El equipo de modernizaci\u00f3n de la red t\u00e1ctica del Ej\u00e9rcito de los EE. UU. busca integrar los dispositivos port\u00e1tiles con las nuevas gafas de combate de realidad aumentada como un medio para reforzar la ciberseguridad. Se busca autenticar usuarios a partir de datos biom\u00e9tricos. Se trata de una tecnolog\u00eda madura y que se podr\u00e1 emplear en los pr\u00f3ximos a\u00f1os.<\/p>\n<hr \/>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">WASHINGTON \u2014 The U.S. Army\u2019s tactical network modernization team wants to integrate wearables with the new augmented reality combat goggles as a means of bolstering cybersecurity.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Donald Coulter, senior science and technology adviser to the Network Cross-Functional Team, said on a Monday webinar hosted by C4ISRNET that one of the team\u2019s priorities for the next year is advancing wearable technology for user authentication.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Under current capabilities, users are authenticated using passwords, common access cards or tokens to verify themselves. But these capabilities aren\u2019t good enough in an operational environment, Coulter said.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cThese can be broken, damaged [or] lost in an operational environment,\u201d he said. \u201cTrying to put in a password with tactical gloves when it\u2019s a tiny keyboard is not an optimal solution.\u201d<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">With the wearables, soldiers&#8217; identities are verified using biometric data such as heartrates, gait, unique skin signatures and physical locations. The benefits of wearable technology is twofold: It makes the Army\u2019s systems increasingly secure, while being more intuitive for the soldier in the field.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">One of the first places the Army plans to \u201cexperiment and prove out\u201d wearables is with the Integrated Visual Augmentation System \u2014 essentially <a href=\"https:\/\/mco.arcpublishing.com\/composer\/defensenews.com\/artificial-intelligence\/2019\/10\/15\/can-the-army-perfect-an-ai-strategy-for-a-fast-and-deadly-future\/\" target=\"_blank\" rel=\"noopener noreferrer\">artificial intelligence-enhanced goggles<\/a> that assist with<a href=\"https:\/\/www.armytimes.com\/news\/your-army\/2019\/04\/08\/soldiers-marines-try-out-new-device-that-puts-mixed-reality-multiple-functions-into-warfighters-hands\/\" target=\"_blank\" rel=\"noopener noreferrer\"> navigation, targeting, and advanced night and thermal vision<\/a>. The IVAS effort is led by the Soldier Lethality Cross-Functional Team.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">The Army finds the technology quite promising, \u201cespecially when you talk about the infusion of more artificial intelligence and machine-learning capacity \u2014 to really study, to capture more data and tag it, and really understand the unique characteristics of each person,\u201d Coulter said. \u201cIt really gives us more confidence and ability to perform that effectively.\u201d<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">He added that the wearable technology is mature, and his team may field it in the coming years.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">Wearable technology is something the Network CFT is closely watching, but it\u2019s also focused on protecting communications for manned-unmanned teaming, cyber situational awareness, the squad area network and <a href=\"https:\/\/www.c4isrnet.com\/battlefield-tech\/it-networks\/2020\/10\/01\/us-army-seeks-market-research-for-radios-to-integrate-with-augmented-reality\/\" target=\"_blank\" rel=\"noopener noreferrer\">IVAS radio<\/a>.<\/p>\n<p class=\"o-articleBody__text a-body1 element element-paragraph\">\u201cOver the next year we\u2019ll continue to see more and more technologies getting out of the S&amp;T domain and getting into the [project managers] for <a href=\"https:\/\/www.c4isrnet.com\/battlefield-tech\/it-networks\/2020\/07\/20\/how-new-prototyping-dollars-will-help-army-network-modernization\/\" target=\"_blank\" rel=\"noopener noreferrer\">final prototyping<\/a>, experimentation, maturation and integration,\u201d Coulter said.<\/p>\n<p style=\"text-align: left;\" align=\"justify\"><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2020\/10\/19\/us-army-looks-to-use-soldiers-biometric-data-to-secure-wearable-tech\/?utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=C4ISRNET%20Daily%2010.20&amp;utm_content=Final&amp;utm_term=Editorial%20-%20Daily%20Brief\" target=\"_blank\" rel=\"noopener noreferrer\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El equipo de modernizaci\u00f3n de la red t\u00e1ctica del Ej\u00e9rcito de los EE. UU. busca integrar los dispositivos port\u00e1tiles con las nuevas gafas de combate&hellip; <\/p>\n","protected":false},"author":1,"featured_media":6763,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6762"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6762"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6762\/revisions"}],"predecessor-version":[{"id":6764,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/6762\/revisions\/6764"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/6763"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}