European Commission logo
English English
CORDIS - EU research results
Content archived on 2024-05-27

Secure Authentication by a Biometric Rationale and Integration into Network Applications


A new on biometrical authentication methodology is proposed which provides much higher security levels as all comparable technologies known today. The methodology is suitable for mass production at very low price. The SABRINA project will develop the first production samples of the sensor unit along with a generic application platform for various test scenarios. The first pilots within this project will address both off-line and on-line authentication.

This project aims at the development and integration of a new methodology framework for secure authentication based on ultra-sonic scans of parts of the human skin. The general methodology consists of the so-called Chip Original Method (COM) and the Touch Echo Method (TEM) and has already been proved under laboratory conditions to deliver the highest level of security known today. It is even able to distinguish between persons of the same genetic code as it is the case for identical twins. The project will establish a full methodology framework based on TEM/COM. This includes all issues associated with its use as an user identification and authentication method within networks, namely security verification, practicability and other quality aspects. The whole approach will be evaluated by integration into ongoing developments of an e-Commerce technology provider and a large network provider.

The workplan is structured into the following workpackages: Workpackage 1: Project management, including progress reporting towards the Commission. Workpackage 2: Specification and design of the biometrical sensor component including sensor evaluation and user verification, - the embedding into the prototype application, the necessary software components. Workpackage 3: Implementation of the biometrical sensor component (production sample), the embedding into the prototype application (production sample), the necessary software components. Workpackage 4: Verification of both hardware and software architecture. Workpackage 5: Evaluation of the developed approach in an network and eCommerce scenario. Workpackage 6: Dissemination. Workpackage 7: Exploitation.


Data not available

Call for proposal

Data not available


EU contribution
No data

See on map

Total cost
No data

Participants (5)