120

Certifying Electronic Identity

Weinshall Daphna, HUJI, School of Computer Science and Engineering, CS
Kirkpatrick Scott, HUJI, School of Computer Science and Engineering, CS - Machine Learning

tamir_huberman_-_daphna_weinshall1.jpg

Secure password authentication schemes

Category

Homeland Security

Development Stage

Prototype protocols are being tested

Patent Status

U.S. patent Granted 7174459

Market Size

Authentication, authorization, and administration security software sales more than $2.5 billion

Highlights

  • New protocol for certification of electronic identity
  • Protects against computer corruption by viruses and hacker activities
  • Successfully demonstrated capability to prevent  an impostor being accepted as user
  • Secure certification protocols for authentication, safe for use even over non-secure networks

Our Innovation

System uses pictures, pseudo words, or artificial grammar to establish a secret between the user and the computer.  By testing user’s knowledge of the shared secret, program accepts the user only after the chance of imposture goes below a pre-set threshold.

Key Features

  • Protects electronic identity from eavesdropping, theft, and loss
  • Elevates level of secure protection by including additional image presentations in recognition procedure
  • Provides an alternative to users needing multiple passwords in enterprises using several computer systems

Development Milestones

  • Prototype protocols being tested

The Opportunity

  • Attempts to corrupt computers with viruses and other hacker activities cost an estimated $14 billion in damages and lost productivity worldwide in 2003.

Patent Status

Granted US 7,174,459

Contact for more information:

Aviv Shoher
SVP BUSINESS DEVELOPMENT
+972-2-6586635