Authenticating an optical "PUF" (Physical Unclonable Function)
Our technology also enables authenticating PUF authentication devices that can absolutely not be reproduced or falsified.
Imagine an ID card that would allow you to identify yourself by showing it to the camera of a Smartphone. A card absolutely impossible to reproduce, which may be authenticated according to a scenario that cannot be replayed, even by a spy installed on the Smartphone itself.
Imagine that this card that costs only a few cents is compatible with any type of Smartphone and that you may also identify yourself and pay or vote by borrowing the Smartphone from an unknown third party, without any risk.
Everyone will be able to issue cards, public authorities, banks, businesses and even individuals. Their value is that given to them by the issuer. If it's the state, it can be an ID card, and if it's a business, it can be an access card or an invitation.
It's just a key, nothing more, and it opens only the locks to which it corresponds, that of your identity details or of your medical file, that of your social sites, or that of your car or home for example. The only difference with the keys we know is that it is digital and that it is read by the camera of a smartphone.
The big difference with everything that exists is that everyone will be able to check an identity and offer digital services, and that no one will need to read an RFID chip or to plug a USB stick into a computer, while these two operations carry serious dangers of confidentiality or virus transmission.
The technology will also become rapidly the global standard for authentifying products and documents, because it will be the most simple and efficient available on the market.
It is protected by our main patent that is already issued in the United States of America and in Europe, and by a bunch of international patent applications.
The level of security is very high:
- There is no known technique enabling the duplication of an optical PUF.
- It cannot be the vector of a computer infection.
- It can only be seen if the holder wants it and presents it to the camera of a Smartphone.
- The dialogue between the card and the smartphone that authenticates it cannot be heard.
- The authentication scenario cannot be replayed.
- It does not include encryption that can be decoded even with future quantum computers.
- It can be combined with all other authentication factors.
|