Select

Electronic Devices Identification Using Hardware Characteristics

Technology Overview

We have developed a technology to uniquely identify electronic devices using hardware characteristics through a manufacturing agnostic methodology. We measure various interesting electronic signals to achieve that. We provide security to prevent unauthorized transactions for players who experience unauthorized transaction-based fraud. Using our technology, we can uniquely identify individual smartphone handset, individual IoT devices and other electronic components including Integrated Circuit (IC) chips based on immutable physical differences in their silicon circuits to an accurate of one-in-a-trillion or greater, depending on the device. All of this can be done without changing anything in the manufacturing process or the hardware circuitry – manufacturing agnostic process.

Furthermore, using our technology we can complement human biometrics with silicon biometrics for on-line security applications, or provide standalone solution, ensure electronic identity stored in smartphone applications is linked to the physical smartphone hardware, track individual electronic devices through complex manufacturing and supply chains, and allow individuals to create online trust with their smartphone and without revealing their personal identity. 

Different from general security vendors who identify attempts at illegitimate access and give users alert fatigue with limited tools to mitigate, our technology not only detects the illegitimate transaction with the highest industry levels of accuracy, it stops identity spoofing and prevents unauthorized access.

Our technology helps to eliminate online fraud, identify theft and supply chain counterfeiting. 

Technology Features & Specifications

At a hardware level, all electronic devices are much more unique than humans. In the same way that biometrics can be used to build trust between humans, we use the unique manufacturing agnostic algorithm to build trust between machines.

The technology is

(a) Accurate: 10 million times more accurate than Iris Scan
(b) Scalable: Identifies 1 in a trillion devices
(c) Cheap: Does not require changes to the manufacturing process and can be deployed through software
(d) Extensible: Compatible with most existing technologies.

We present a solution that can either stand-alone or add millions of times more security to almost any existing technology, 20 - 25x less expensive.

The competitive advantages are

(a) Secure: Significantly superior to hardware / software tokens, authenticator apps or short message service (SMS) codes.
(b) Cheap: Leverages hardware devices already paid for by end-users like smart phones.
(c) Easy: Delivered by software.
(d) Extensible: Complimentary to most existing solutions to add even greater assurance.
(e) Compliant: Complies with all privacy legislations worldwide including Personal Data Protection Act (PDPA ,Singapore), Notifiable Data Breaches (NDB, Australia), General Data Protection Regulation (GDPR, Europe) and California Consumer Privacy Act (CCPA, United States).

Potential Applications

Following are some of the applications of our technology till date:

  • Secure against Subscriber Identification Module (SIM) swapping fraud and phone hijacking attacks
  • Augmenting and Strengthening current Two-Factor Authentication (2FA)
  • Operating vehicles using mobile phone based digital keys and prevent digital keys stealing from mobile phone
  • Protecting Internet of Things (IoT) networks against unauthorized admin access
  • Prevent unauthorized joining in a IoT network by a rogue IoT device
  • Detect fraudulent devices performing online transactions

Other than the above there is possible application in aviation sector to track supply chain elements for their origins, identifying counterfeit Integrated Circuit (IC) chips for chip manufacturers and smart remote locks for valuable assets, could be other applications.

Market Trends and Opportunities

Online fraud is worth at least $USD 50 Bn a year.  New fraud opportunities are opening every day.  For example, SIM swapping, where an attacker takes control of a user’s phone account in order to perform financial and other fraud, is in its infancy but growing rapidly. 

Our technology can be used in many applications. We have considered the Total addressable market (TAM) from five use cases, such as 

(a) 2FA (TAM - USD 5.68B), 
(b) IoT Security (TAM - USD 19B), 
(c) Chip Counterfeiting (TAM - USD 7.5B only in US), 
(d) Smart Lock (TAM - USD 5.8B) and 
(e) SIM Swapping (TAM - USD 5.6B)

in 2021. 

Our Serviceable Available Market (SAM) totals to about USD 24B from these use cases with average Compound Annual Growth Rate (CAGR) of 33.4%. 

We provide solutions to

  • The 2FA problem and reduce IoT attacks significantly. 
  • Car part manufacturer to operate vehicles using mobile phone based digital keys and prevent digital keys stealing from mobile phones. 
  • Telecom provider to secure against SIM swapping fraud and phone hijacking attacks while also augmenting and strengthening current 2FA. 
  • Banking, retailing and avionics industries.

Customer Benefits

There are many providers and vendors in the identity and 2FA industry. Despite these many players there remains significant untapped opportunity, as demonstrated by the massive amount of fraud committed each year.

Our technology can complement most of the existing solutions, essentially making existing solutions even more secure. Our technology can also standalone if required. The cost of implementing our technology, in most instances, is significantly cheaper than the current solution.

Existing solutions do not survive events such as
(a) Device refresh,
(b) SIM card swapping, and
(c) changing device.

Our other differentiators are
(a) Secure: Significantly superior to hardware / software tokens, authenticator apps or SMS codes.
(b) Cheap: Leverages hardware devices already paid for by end-users.
(c) Easy: Delivered by software.
(d) Extensible: Complimentary to most existing solutions to add even greater assurance.
(e) Compliant: Complies with all privacy legislations worldwide including PDPA (Singapore), NDB(Australia), GDPR and CCPA.

Make an Enquiry