亚洲知识产权资讯网为知识产权业界提供一个一站式网上交易平台,协助业界发掘知识产权贸易商机,并与环球知识产权业界建立联系。无论你是知识产权拥有者正在出售您的知识产权,或是制造商需要购买技术以提高操作效能,又或是知识产权配套服务供应商,你将会从本网站发掘到有用的知识产权贸易资讯。

A method and device for identity verification in cyberspace (Technion)

总结
Biometrics is the process by which unique traits of an individual are recorded and documented in a data base or a device; these records are used later for identification or verification. Current traits that are used for biometrics are body-parts and behavioral traits. Factors that are considered in the selection of which trait to sample are: universality, uniqueness, permanence, measurability, performance, acceptability, and circumvention. No single known biometrics meets all these requirements. Also, biometrics identifications in cyberspace tend to raise privacy concerns, are not considered reliable, and need a central server to hold the biometrics templates. Furthermore, current methods do not address gender, age, and nationality.The cognitive-behavioral biometry in the form of instruction and reaction we propose, enables verification of an individual's identity by his cognitive-behavioral traits. An individual claims identity with an identification device he carries. Clearly defined and individually designed instructions are given by the verifier, and the individual acts according to what he senses and processes. The verifier observes, measures, and compares the movements with the expected actions that are recorded on the identification device. These instructions-to-reactions traits are unique to an individual, they are repeatable, hard to imitate and impossible to inherit. Using these traits for identity verification meets all the required properties of biometrics while providing accurate, noninvasive identification, even in cyberspace.


技术优势
• Cognitive-behavioral biometrics enables the creation of a multiple biometry template for identity verification which is hard to imitate.

• The set of instructions-to-reactions that are suitable for identification is actually infinite, so the template is adaptable and replaceable if needed.

• The device uses cryptographic tools such that the verification is reliable in the physical space as well as in the cyberspace and does not need a central server.

• The new biometry may be easily applied to electronic devices to prove ownership with no additional hardware
技术应用
• ID

• Credit cards

• Account enrolment and recovery

• Cybernetic passports

• Access control devices and processes

• Voting systems

• Cryptosystems

• Electronic devices such as smart phones, tablets, and wearable devices
ID号码
COM-1508
国家/地区
以色列

欲了解更多信息,请点击 这里
移动设备