Secure password authentication schemes
Category |
Homeland Security |
Development Stage |
Prototype protocols are being tested |
Patent Status |
U.S. patent Granted 7174459 |
Market Size |
Authentication, authorization, and administration security software sales more than $2.5 billion |
Highlights
-
New protocol for certification of electronic identity
-
Protects against computer corruption by viruses and hacker activities
-
Successfully demonstrated capability to prevent an impostor being accepted as user
-
Secure certification protocols for authentication, safe for use even over non-secure networks
Our Innovation
System uses pictures, pseudo words, or artificial grammar to establish a secret between the user and the computer. By testing user’s knowledge of the shared secret, program accepts the user only after the chance of imposture goes below a pre-set threshold.
Key Features
-
Protects electronic identity from eavesdropping, theft, and loss
-
Elevates level of secure protection by including additional image presentations in recognition procedure
-
Provides an alternative to users needing multiple passwords in enterprises using several computer systems
Development Milestones
-
Prototype protocols being tested
The Opportunity
-
Attempts to corrupt computers with viruses and other hacker activities cost an estimated $14 billion in damages and lost productivity worldwide in 2003.