Summary
- Profile Type
- Technology offer
- POD Reference
- TODE20240123026
- Term of Validity
- 23 January 2024 - 22 January 2026
- Company's Country
- Germany
- Type of partnership
- Investment agreement
- Commercial agreement with technical assistance
- Research and development cooperation agreement
- Targeted Countries
- All countries
Contact the EEN partner nearest to you for more information.
Find my local partner
General information
- Short Summary
- The new authentication process describes a principle of communication between man and machine that is based on the cognitive abilities of the user. The authentication process takes place through legitimization and automated generation of temporary authentication data and transmission to the individual system user, whereby the data exchange between the security system and the authentication system takes place through synchronization processes for the exchange of non-public data.
- Full Description
-
The new authentication procedure describes a principle of communication between man and machine that is based on the cognitive abilities of the user, i.e. an individual human being. This is achieved through the implementation of security fragments by an administrator in the form of patterns and/or sets of rules and/or algorithm templates, the management of the security fragments by the administrator, the generation of the administrator, the generation of the algorithm from implemented security fragments and it’s linking with an authentication code.
The task of the technology is therefore to create an authentication system that uses the hardware and software of comprehensive technical security systems to generate, manage and execute an authentication algorithm. The new method can be divided into two phases: the creation of an algorithm (implementation phase) and the execution of authentication (application phase). In both phases, the user does not need any special knowledge of cryptography or computer science. The user defines the rules for human-machine communication and also determines the complexity of the algorithm. The two phases significantly increase the security of the authentication process.
The authentication process takes place through legitimization and automated generation of temporary authentication data and transmission to the individual system user, whereby the data exchange between the security system and the authentication system takes place through synchronization processes for the exchange of non-public data. The code is applied by the system user by converting the temporary authentication data into temporary authentication data in a temporary input code and performing an authentication check by the technical security system.
The new technology offers protection for users and administrations who want to individually control their security requirements in authentication processes. With the new authentication procedure increasing security requirements can be addressed in a targeted manner and protection mechanisms can be set to a desired level. The new authentication procedure is a patented process on a human scale. The individual requirements and capabilities of the user determine the authentication process. - Advantages and Innovations
-
Focus on people - the potential of users to increase security in authentication processes is at the forefront and thus clearly differentiates itself from purely machine-based processes.
Security through user orientation - By incorporating the cognitive capabilities of users, many current security problems in the human-based authentication process can be solved.
Faster authentication processes - several security levels can be combined in one step. This speeds up authentication processes.
Flexibility and openness - the new authentication process can be integrated into existing systems, is cryptographically mature (e.g. by dissolving the 1:1 relationship between input and authentication code) and open to future cryptographic security techniques.
Security through scalability - User capabilities and individual security requirements are the key starting points. Scalability and exploiting the complexity of the algorithm serve to implement individual security requirements.
Protection against spying - The primary goal is to protect user data. The innovative process can make it more difficult to spy out passwords, PINs or codes and help to prevent unauthorized queries and phishing.
No personal data - The authentication process works without disclosing personal data and/or sensitive biometric data (e.g. fingerprint, iris scan).
No new passwords necessary - Users can basically keep their passwords, PINs, codes, etc. when using the new procedure.
Simple - No cryptographic, IT or mechanical skills are required for implementation or use.
The authentication process clearly distinguishes itself from the increasing device dependency in security processes.
The authentication procedure enables the implicit legitimation request for the user: "Is the system even authorized to issue the authentication request to me?" - Stage of Development
- Available for demonstration
- Sustainable Development Goals
- Goal 11: Sustainable Cities and Communities
- Goal 9: Industry, Innovation and Infrastructure
- IPR status
- IPR granted
Partner Sought
- Expected Role of a Partner
- The company is looking for a Licensee, a cooperation or business partners and/or investors to further develop the new technology to pilot or series maturity.
- Type and Size of Partner
- University
- Big company
- SME 11-49
- R&D Institution
- SME 50 - 249
- Type of partnership
- Investment agreement
- Commercial agreement with technical assistance
- Research and development cooperation agreement
Dissemination
- Technology keywords
- 01003009 - Data Protection, Storage, Cryptography, Security
- 01003008 - Data Processing / Data Interchange, Middleware
- 01003018 - User Interfaces, Usability
- 01004012 - Operation Planning and Scheduler System
- Market keywords
- 02007001 - Systems software
- 02007004 - Program development tools/languages
- 02007028 - Other software related
- 02007003 - Operating systems and utilities
- Targeted countries
- All countries