Yu Feng · Apr 13, 2023

In partnership with i-Patrol Technology Limited, Hong Kong (CN)


Table of Contents

Abstract


I-Patrol - a group of intellectual properties in the U.S. and China regarding the technology stack of binding biometrics and hardware allows personalized yet enterprise-grade data encryption and user authentication. This also enables hardware-based higher protection for digital assets and network communications. This paper will elaborate the technical details of each of these four dimensions.

The aforementioned intellectual property is comprised of these following patents: Method, Apparatus and System for Improving Device Security by Binding Hardware (CN103886233); Methods and Apparatuses for Encryption and Decryption (US10169615 & US20190156067); Digital Resource Protection Method and Apparatus, and Digital Resource Using Method and Apparatus (US10102353); Method and Apparatus for Information Interaction (US10256976).

1. Introduction


Username and password combination, as the most traditional and commonly used method of logging in one’s account, has been widely considered vulnerable and exposed to identity theft. While Single Sign-on (SSO) and Two-Factor Authentication (2FA) add extra layers to the authenticity of user identification, they rely heavily on one-time generated tokens or cookies, which are often stored insecurely on users’ personal devices for convenience purposes.

Due to higher security demands, there have been Security Elements (SE) embedded external devices like security keys, authenticators, and cold crypto wallets, which often requires an additional PIN or single fingerprint set up by users to avoid unauthorized use. Although standalone secure hardware is seemingly immune to a breached runtime environment, it is exposed to the potential leak of biological features, PINs, and hardware theft.

I-Patrol’s secure system solves the problems above. With the binding of users’ biological features and hardware’s unique identifiers, both of which become undecipherable and therefore cannot be used for authorization separately. This is designed to allow authentication only when the original device is in the possession of the user themself, in order to avoid the risk of impersonation or hardware duplication. It also facilitates personalization through various binding modes between different biological features and hardware. The system does not only enable safer user authentication, but also protects digital assets and network communications.

2. Encryption and Decryption Solution