Skip to main content
European Commission logo
Enterprise Europe Network

Method for carrying out a human-machine authentication process by an individual system user

Summary

Profile Type
  • Technology offer
POD Reference
TODE20240123026
Term of Validity
23 January 2024 - 22 January 2026
Company's Country
  • Germany
Type of partnership
  • Investment agreement
  • Commercial agreement with technical assistance
  • Research and development cooperation agreement
Targeted Countries
  • All countries
Contact the EEN partner nearest to you for more information.
Find my local partner

General information

Short Summary
The new authentication process describes a principle of communication between man and machine that is based on the cognitive abilities of the user. The authentication process takes place through legitimization and automated generation of temporary authentication data and transmission to the individual system user, whereby the data exchange between the security system and the authentication system takes place through synchronization processes for the exchange of non-public data.
Full Description
The new authentication procedure describes a principle of communication between man and machine that is based on the cognitive abilities of the user, i.e. an individual human being. This is achieved through the implementation of security fragments by an administrator in the form of patterns and/or sets of rules and/or algorithm templates, the management of the security fragments by the administrator, the generation of the administrator, the generation of the algorithm from implemented security fragments and it’s linking with an authentication code.

The task of the technology is therefore to create an authentication system that uses the hardware and software of comprehensive technical security systems to generate, manage and execute an authentication algorithm. The new method can be divided into two phases: the creation of an algorithm (implementation phase) and the execution of authentication (application phase). In both phases, the user does not need any special knowledge of cryptography or computer science. The user defines the rules for human-machine communication and also determines the complexity of the algorithm. The two phases significantly increase the security of the authentication process.

The authentication process takes place through legitimization and automated generation of temporary authentication data and transmission to the individual system user, whereby the data exchange between the security system and the authentication system takes place through synchronization processes for the exchange of non-public data. The code is applied by the system user by converting the temporary authentication data into temporary authentication data in a temporary input code and performing an authentication check by the technical security system.

The new technology offers protection for users and administrations who want to individually control their security requirements in authentication processes. With the new authentication procedure increasing security requirements can be addressed in a targeted manner and protection mechanisms can be set to a desired level. The new authentication procedure is a patented process on a human scale. The individual requirements and capabilities of the user determine the authentication process.
Advantages and Innovations
Focus on people - the potential of users to increase security in authentication processes is at the forefront and thus clearly differentiates itself from purely machine-based processes.

Security through user orientation - By incorporating the cognitive capabilities of users, many current security problems in the human-based authentication process can be solved.

Faster authentication processes - several security levels can be combined in one step. This speeds up authentication processes.

Flexibility and openness - the new authentication process can be integrated into existing systems, is cryptographically mature (e.g. by dissolving the 1:1 relationship between input and authentication code) and open to future cryptographic security techniques.

Security through scalability - User capabilities and individual security requirements are the key starting points. Scalability and exploiting the complexity of the algorithm serve to implement individual security requirements.

Protection against spying - The primary goal is to protect user data. The innovative process can make it more difficult to spy out passwords, PINs or codes and help to prevent unauthorized queries and phishing.

No personal data - The authentication process works without disclosing personal data and/or sensitive biometric data (e.g. fingerprint, iris scan).

No new passwords necessary - Users can basically keep their passwords, PINs, codes, etc. when using the new procedure.

Simple - No cryptographic, IT or mechanical skills are required for implementation or use.

The authentication process clearly distinguishes itself from the increasing device dependency in security processes.

The authentication procedure enables the implicit legitimation request for the user: "Is the system even authorized to issue the authentication request to me?"
Stage of Development
  • Available for demonstration
Sustainable Development Goals
  • Goal 11: Sustainable Cities and Communities
  • Goal 9: Industry, Innovation and Infrastructure
IPR status
  • IPR granted

Partner Sought

Expected Role of a Partner
The company is looking for a Licensee, a cooperation or business partners and/or investors to further develop the new technology to pilot or series maturity.
Type and Size of Partner
  • University
  • Big company
  • SME 11-49
  • R&D Institution
  • SME 50 - 249
Type of partnership
  • Investment agreement
  • Commercial agreement with technical assistance
  • Research and development cooperation agreement

Dissemination

Technology keywords
  • 01003009 - Data Protection, Storage, Cryptography, Security
  • 01003008 - Data Processing / Data Interchange, Middleware
  • 01003018 - User Interfaces, Usability
  • 01004012 - Operation Planning and Scheduler System
Market keywords
  • 02007001 - Systems software
  • 02007004 - Program development tools/languages
  • 02007028 - Other software related
  • 02007003 - Operating systems and utilities
Targeted countries
  • All countries