Certifying Electronic Identity

Weinshall Daphna, HUJI, School of Computer Science and Engineering, Computer Science
Kirkpatrick Scott, HUJI, School of Computer Science and Engineering, Computer Science


Secure password authentication schemes


Homeland Security

Development Stage

Development completed; seeking for implementation and commercialization


  • New protocol for certification of electronic identity
  • Protects against computer corruption by viruses and hacker activities
  • Successfully demonstrated capability to prevent  an impostor being accepted as user
  • Secure certification protocols for authentication, safe for use even over non-secure networks

Our Innovation

System uses pictures, pseudo words, or artificial grammar to establish a secret between the user and the computer.  By testing user’s knowledge of the shared secret, program accepts the user only after the chance of imposture goes below a pre-set threshold.

Key Features

  • Protects electronic identity from eavesdropping, theft, and loss
  • Elevates level of secure protection by including additional image presentations in recognition procedure
  • Provides an alternative to users needing multiple passwords in enterprises using several computer systems

The Opportunity

  • Attempts to corrupt computers with viruses and other hacker activities cost an estimated $14 billion in damages and lost productivity worldwide in 2003.

Contact for more information:

Aviv Shoher