亞洲知識產權資訊網為知識產權業界提供一個一站式網上交易平台,協助業界發掘知識產權貿易商機,並與環球知識產權業界建立聯繫。無論你是知識產權擁有者正在出售您的知識產權,或是製造商需要購買技術以提高操作效能,又或是知識產權配套服務供應商,你將會從本網站發掘到有用的知識產權貿易資訊。

A method and device for identity verification in cyberspace (Technion)

總結
Biometrics is the process by which unique traits of an individual are recorded and documented in a data base or a device; these records are used later for identification or verification. Current traits that are used for biometrics are body-parts and behavioral traits. Factors that are considered in the selection of which trait to sample are: universality, uniqueness, permanence, measurability, performance, acceptability, and circumvention. No single known biometrics meets all these requirements. Also, biometrics identifications in cyberspace tend to raise privacy concerns, are not considered reliable, and need a central server to hold the biometrics templates. Furthermore, current methods do not address gender, age, and nationality.The cognitive-behavioral biometry in the form of instruction and reaction we propose, enables verification of an individual's identity by his cognitive-behavioral traits. An individual claims identity with an identification device he carries. Clearly defined and individually designed instructions are given by the verifier, and the individual acts according to what he senses and processes. The verifier observes, measures, and compares the movements with the expected actions that are recorded on the identification device. These instructions-to-reactions traits are unique to an individual, they are repeatable, hard to imitate and impossible to inherit. Using these traits for identity verification meets all the required properties of biometrics while providing accurate, noninvasive identification, even in cyberspace.


技術優勢
• Cognitive-behavioral biometrics enables the creation of a multiple biometry template for identity verification which is hard to imitate.

• The set of instructions-to-reactions that are suitable for identification is actually infinite, so the template is adaptable and replaceable if needed.

• The device uses cryptographic tools such that the verification is reliable in the physical space as well as in the cyberspace and does not need a central server.

• The new biometry may be easily applied to electronic devices to prove ownership with no additional hardware
技術應用
• ID

• Credit cards

• Account enrolment and recovery

• Cybernetic passports

• Access control devices and processes

• Voting systems

• Cryptosystems

• Electronic devices such as smart phones, tablets, and wearable devices
ID號碼
COM-1508
國家/地區
以色列

欲了解更多信息,請點擊 這裡
移動設備