AsiaIPEX is a one-stop-shop for players in the IP industry, facilitating IP trade and connection to the IP world. Whether you are a patent owner interested in selling your IP, or a manufacturer looking to buy technologies to upgrade your operation, you will find the portal a useful resource.

A method and device for identity verification in cyberspace (Technion)

Biometrics is the process by which unique traits of an individual are recorded and documented in a data base or a device; these records are used later for identification or verification. Current traits that are used for biometrics are body-parts and behavioral traits. Factors that are considered in the selection of which trait to sample are: universality, uniqueness, permanence, measurability, performance, acceptability, and circumvention. No single known biometrics meets all these requirements. Also, biometrics identifications in cyberspace tend to raise privacy concerns, are not considered reliable, and need a central server to hold the biometrics templates. Furthermore, current methods do not address gender, age, and nationality.The cognitive-behavioral biometry in the form of instruction and reaction we propose, enables verification of an individual's identity by his cognitive-behavioral traits. An individual claims identity with an identification device he carries. Clearly defined and individually designed instructions are given by the verifier, and the individual acts according to what he senses and processes. The verifier observes, measures, and compares the movements with the expected actions that are recorded on the identification device. These instructions-to-reactions traits are unique to an individual, they are repeatable, hard to imitate and impossible to inherit. Using these traits for identity verification meets all the required properties of biometrics while providing accurate, noninvasive identification, even in cyberspace.

Technology Benefits
• Cognitive-behavioral biometrics enables the creation of a multiple biometry template for identity verification which is hard to imitate.

• The set of instructions-to-reactions that are suitable for identification is actually infinite, so the template is adaptable and replaceable if needed.

• The device uses cryptographic tools such that the verification is reliable in the physical space as well as in the cyberspace and does not need a central server.

• The new biometry may be easily applied to electronic devices to prove ownership with no additional hardware
Technology Application
• ID

• Credit cards

• Account enrolment and recovery

• Cybernetic passports

• Access control devices and processes

• Voting systems

• Cryptosystems

• Electronic devices such as smart phones, tablets, and wearable devices
ID No.

For more information, please click Here
Mobile Device