PatentAuction.com lists patented inventions available for sale or licensing. Inventors can list their patented inventions (or patent pending) for sale. New inventions for sale are added on a daily basis !
Home    List your patent    My account     Help     Support us    

New identification system. USA paytech Book (2020)

[Category : - Indentification and payment methods]
[Viewed 1498 times]

This is a logical encryption.The new system, new answer in to risky technologies! Link
See page 233 for Vilmos Orvifalvi Link
She's my partner. Hanor 3D System Ltd. Owner Dr. Fáy Péter. We are proud to be a co-author of the US Paytech book.
Sensitive personal data can be copied or stolen even from our pockets because of the way conventional systems work, like RFID or NFC.
Link

Servers storing biometric identification data are trying to fight hackers by improving on encryption algorithms which gives a little advantage, but it also makes it merely a question of time and resources to break in. Some recent identity theft incidents warrant new ways to protect our passwords and data

(Link).

ALL of today’s technologies fail miserably at this challenge. It also means that we need a new way of logic in encryption to combat the problem.

We have a solution. Our systems avoids the pitfalls of the capacity war and circumvents it with a This system is based on randomly re-assignable ID containers distributed in 3D space.

Example: let’s imagine a chest of drawers. Each drawer has a colored knob with 8 different colors. These drawers are placed in a 3D space and the user has the freedom to re-shuffle them if need be. We place our references of identity into these drawers. We can certainly change the location of the items in the movable drawers. Hence, we can create a cascaded encryption in the app of our phones. A few strokes of the finger and the code is totally changed.

For the sake of argument, you assign your photo to the drawer with the red knob. Your fingerprint in the green one, your cat’s photo in the blue, your grandmother’s photo in the yellow one, my retina scan in the brown one…etc.

You send the data package to your bank for authentication. Like these: green, blue, brown, yellow. The server of the bank can only access these items. Upon my entering the bank the CCTV recognizes me in front of the ATM. The system selects the blue color and displays it on the screen. I show my cat’s photo (above, for blue). Should the system not be certain, it can challenge me with another question, like green. Then, I scan my fingerprint and I can gain access to my funds.

Same method works for a shop check-out. The NFC of the phone makes a handshake with the system, then the color blue appears on my screen, waiting for the response in the blue drawer of my own system.

This system works with locks, building entry systems, travel vouchers and smart cities alike.

If a hacker breaks into the bank and steals our data, like a fingerprint or password, they would not be able to use it to assume control over our accounts.

Attacks usually commence for two reasons:

They already possess biometric data that they want to use to access accounts

They want to obtain new personal and password data for future thefts or to sell them our system is prone to those thefts. Once we learn about the threat, we should only rearrange the drawers and their contents or even replace them with new pieces of information as we see fit. The real source of controlling access to our accounts would not be the biometric data but the location of those items in the 3-dimensional space. If they catch the colors, they will be different the following time. If they copy the fingerprint data, we just move it from red to blue and we are ready to use that item again. We always have the advantage over the attackers.

We even have a 3D physical key and lock system that can be linked to the phone application. It will be able to uniquely identify over 17.000.000 different persons through a personally created spatial algorithm. It can is also work with the IoT application of the above system. In this, biometric data can also be linked to the use of the locks too. We are looking for partners.
New lock technolog.

Link

Link

Link

Link

We offer this to you for use!
It is a non-contact and hygienics technology that is perfectly protected against theft.








[ Home | List a patent | Manage your account | F.A.Q.|Terms of use | Contact us]

Copyright PatentAuction.com 2004-2017
Page created at 2024-11-25 9:56:28, Patent Auction Time.