2. Verification / identification methods
Confidential
Access to services Proof of title to property
Access to the premises
ID confirmation
Verification / Identification
Physical items Knowledge of information Personality traits (biometrics)
• Key
• Access card
• Smart card
• Document
• Password
• Pin-code
• Fingerprint
• Voice
• Face
• Iris
No personal attachment, easy to lose
and counterfeit
Slightly more attachment to
personality (to knowledge of
personality)
Attachment to personality, always
with you
3. Accuracy of verification / identification by bio
parameters
Confidential
False acsess
False rejection
0,1%
2,5%
0,001%
0,9%
0,00001%
0,1%
4. Iris verification device:
Confidential
Key features:
▪ Encryption of all incoming and outgoing information;
▪ Session encryption keys;
▪ Storing asymmetric keys in non-retrievable memory;
▪ Storing the biometric reference in immutable
memory;
▪ Using an OS that does not allow you to run
extraneous programs;
▪ Iris user verification for key applications (transaction
confirmation, identity verification when checking
documents, etc.)
Like a smartphone or mini tablet
Main processor and
cryptoprocessor
PIN code and iris
Touch screen
Wi-Fi & Bluetooth
Form factor
Contains
Verifications
Entering information
Communications
5. Application:
(replacement of both personal and government identification and
authentication tools)
Confidential
▪ End-to-end encryption
using unique session
keys
▪ The impossibility of
substituting information
on the way from its
source to the crypto
processor
▪ Protection even from
programs like
keyloggers
Communication-
chat, file transfer
▪ The ability to use
different User masks
even on the same
service
Password
manager
▪ ID confirmation User on
every transaction
▪ Can be used even when
there is no Internet
Replacement of
credit cards
▪ Confirmation of the
User's identity at each
document check
▪ There are no requests
to the central database -
therefore, you can
check the User's
documents anywhere,
including in the absence
of the Internet
Single electronic
document
6. Project stages
Confidential
A device mockup / board on which two processors are assembled, one of
which simulates the device processor, and the other simulates a
cryptoprocessor. Camera and touch screen connected to the board
Building a peer-to-peer chat network
Password manager algorithms
Certification center issuing certificates to devices
Generation of public and private keys by a crypto processor
Encryption of chats, voice traffic and files with a crypto processor
Database for storing User masks
Algorithms for processing iris images
Pre-production sample, i.e. A complete device, possibly with some flaws and
shortcomings
Design documentation for a prototype device chip
Chip prototyping
Assembling prototypes of the device
Device testing
Finalization of the device OS
Design documentation for serial production of devices
Design documentation for a prototype device
Research work Development work
7. Project economics
Confidential
Research work Development work
1.5-2 years 3-5 Million USD 2-2.5 years 6-10 Million USD
The cost of the device - (150 - 200 USD)
Sales price -(250 - 330 USD)
Sales volume - 1 million pieces
Income - (50 - 100 million USD)