top of page

Surveillance-proof multifactor authentication interface 

by Project Stealth

Asset 10.png

If you think changing your password is difficult, try changing your fingerprints.

In today’s world, digitalised identification and authentication has become the main gateway for safeguarding everything from sensitive personal information to critical national infrastructure. Meanwhile, technology is ever getting advanced to defeat the existing identification and authentication process, especially the human link. 


We have a reason to stay alert. Passwords are vulnerable to data breaches and shoulder-surfing by humans, cameras, and other forms of surveillance. They are also hard to manage, leading to a significant number of compromises by careless insiders. That’s why more and more companies are moving towards biometrics. However, people leave traces of biometrics easily and unconsciously everywhere, which makes them less reliable if they are targeted and forged. With a budget of just $2,000, researchers could fool fingerprint scanners 80 per cent of the time. Once biometrics are forged or hacked, we can do nothing to change them.

​

We invented the first-ever surveillance proof multi-factor authentication interface in the form of a mouth wearable.

The mouth has been holding the words of secrets for us since the beginning of history.

 

Yet beyond language, it is now considered a gateway of safeguarding our identity with its unique biological and mobile properties. 

The mouth has multiple biometrics that are by default concealed and cannot be easily collected by others. Stealth, the mouth wearable, scans and stores the user’s palate biometrics for identification purposes.

 

Besides biometrics, a secure identification and authentication system should include a layer of intentionality, or knowledge. That’s why Stealth embodies another magic factor. The mouth is an incredible machine with rich input and output channels. Stealth leverages the tongue’s capability of sensing and performing gestures to facilitate a communication protocol. When authentication is required, the device delivers a code of digital simulated sense. The user should perform pre-defined gestures in response to each sense. The challenge-response pairs are shared knowledge exclusively between the user and their device. In this way, the knowledge-based communication protocol eliminates passwords, avoiding fraud, and making it extremely hard to intercept.

bottom of page