120

Certifying Electronic Identity

Weinshall Daphna, HUJI, School of Computer Science and Engineering, Computer Science
Kirkpatrick Scott, HUJI, School of Computer Science and Engineering, Computer Science

tamir_huberman_-_daphna_weinshall1.jpg

Secure password authentication schemes

Category

Homeland Security

Development Stage

Development completed; seeking for implementation and commercialization

Highlights

  • New protocol for certification of electronic identity
  • Protects against computer corruption by viruses and hacker activities
  • Successfully demonstrated capability to prevent  an impostor being accepted as user
  • Secure certification protocols for authentication, safe for use even over non-secure networks

Our Innovation

System uses pictures, pseudo words, or artificial grammar to establish a secret between the user and the computer.  By testing user’s knowledge of the shared secret, program accepts the user only after the chance of imposture goes below a pre-set threshold.

Key Features

  • Protects electronic identity from eavesdropping, theft, and loss
  • Elevates level of secure protection by including additional image presentations in recognition procedure
  • Provides an alternative to users needing multiple passwords in enterprises using several computer systems

The Opportunity

  • Attempts to corrupt computers with viruses and other hacker activities cost an estimated $14 billion in damages and lost productivity worldwide in 2003.

Contact for more information:

Aviv Shoher
SVP BUSINESS DEVELOPMENT
+972-2-6586635