120

Certifying Electronic Identity

Weinshall Daphna, HUJI, School of Computer Science and Engineering, Computer Science
Kirkpatrick Scott, HUJI, School of Computer Science and Engineering, Computer Science

Highlights

  • New protocol for certification of electronic identity
  • Protects against computer corruption by viruses and hacker activities
  • Successfully demonstrated capability to prevent  an impostor being accepted as user
  • Secure certification protocols for authentication, safe for use even over non-secure networks

Our Innovation

System uses pictures, pseudo words, or artificial grammar to establish a secret between the user and the computer.  By testing user’s knowledge of the shared secret, program accepts the user only after the chance of imposture goes below a pre-set threshold.

Key Features

  • Protects electronic identity from eavesdropping, theft, and loss
  • Elevates level of secure protection by including additional image presentations in recognition procedure
  • Provides an alternative to users needing multiple passwords in enterprises using several computer systems

Contact for more information:

Anna Pellivert
Manager BD
+972-2-6586697