ISU
Home
ISURF/OIPTT
Home
ISURFtech
Home
Advanced
Search
RSS
Feeds
Characterizing and Fingerprinting Digital Communication Devices for Improved Security
Category(s):
For Information, Contact:
Jay Bjerke
Commercialization Manager, Engineering
515-294-4740
licensing@iastate.edu
Web Published:
5/8/2015
ISURF #
3130
Summary:
Researchers at Iowa State University have developed a method for monitoring the communication signature of digital communication devices that can be used for authentication and other security applications.

Development Stage:
The method has been demonstrated experimentally to enable Ethernet devices to be uniquely identified and tracked, and ISU is seeking partners interested in commercializing this technology

Description:
The proliferation of digital communications devices and wireless access points has lead to increasing security concerns; these security concerns generally fall under the areas of digital forensics, intrusion detection, and authentication. However, strategies for mitigating these concerns are often inadequate or create a significant administrative overhead burden, such as managing the use of passwords or private keys that are later verified as part of traditional authentication approaches.  To address these concerns, ISU researchers have developed a method of monitoring the communications signature of digital communications devices. These signatures act like voiceprints of the device, allowing it to be uniquely identified.  In addition, the voiceprints can be stored for either online, in-situ identification or for offline analysis. Online, the voiceprints can be used to detect intruders who are either tapping a digital communication device or changing network hardware so as to gain unauthorized access. Offline, the voiceprints are useful for forensic purposes such as proving that a given digital communication device was used in an attack. This technology also has potential for use in wireless network adapters, smart cards, and RFID tags.

Advantage:
• Versatile (enables physical authentication of a variety of digital communication devices)
• Protective (can be used forensically to track hackers and authorized users through the voiceprints they leave behind)
Application:
Authentication of communications devices on computers on networks; forensic analysis of digital communications devices; authentication of Smart Cards, RFID tags, and wireless network adaptors.

References:
Patent Information:
*To see the full version of the patent(s), follow the link below, then click on "Images" button.
Country Serial No. Patent No. Issued Date
United States 11/087,365 7,639,806* 12/29/2009


Direct Link: