TECHNOLOGY OVERVIEW
In the online world, efforts have been made to increase security, and logins and payments are made based on relatively secure personal authentication. These logins and payments can be performed in a very short time, about one second. On the other hand, in the real world, there are no alternatives to seals and signatures, which are more secure and convenient, and authentication of individuals is very time-consuming. For this reason, it is not uncommon for people to take an hour or more to purchase a ticket or enter Disneyland, for example. This challenge is not only for users, but also for operators. There are labor training costs to manage the queues and other issues that arise, and this can result in lost opportunities. If a system like the ETC system, which recognizes the car and completes the payment, can be implemented by humans, it will simplify authentication and payment in a variety of situations.
However, the reason why it is difficult for a person to complete authentication and payment offline in an instant is because of the time and effort required for personal authentication. It takes time to check your passport and ask for your signature. So, why does it take so long to authenticate individuals offline? The reason is that offline personal authentication requires not only "who" but also "which person" is in the system at the same time. There has been no technology that can instantly and simultaneously tell "who" and "where" they are.
TECHNOLOGY FEATURES & SPECIFICATIONS
In order to achieve these technologies, we possess "high-speed and accurate position measurement technology" and "high-speed authentication protocol technology that allows authentication without user operation". The combination of these technologies is called a location authentication system.
Location measurement technology that is 10 times faster and 10 times more accurate than conventional smartphones and other conventional devices, and payment-level secure, single-sided authentication technology that can authenticate even a smartphone in sleep mode using Bluetooth.
These two technologies allow for low consumption and versatility by using Bluetooth beacon technology, which can be used with any current smartphone, and can accurately measure the position of the user who should pass through and authenticate the person who holds the smartphone, so that unauthorized users can be passed through. It is now possible to accurately identify the user in question while allowing him/her to pass through. The accuracy of the authentication process is more than 99.9%, and the false positive identification rate of 10^-16. In addition, the new system uses only conventional Bluetooth beacons and is very inexpensive.
POTENTIAL APPLICATIONS
Using these technologies, a wide range of certifications such as "locking and unlocking the car, the key of house and office just by holding a smartphone", “payment just by leaving the parking”, "purchase completed just by leaving the store with a product with an electronic tag", and "entering an exhibition and stadium with walk-through", and it is possible to realize settlement involving them.
Benefits
The cost of labor training to manage the queues and other issues that arise, and the opportunities lost as a result of this. With the percentage of the productive population declining worldwide, eliminating the hassle of personal authentication can improve productivity.