Here there are some of the innovative key points of this invention.
NO CRYPTOGRAPHIC TECHNOLOGY
IST Model does not uses any cryptographic techniques to build his strong safe identification model
FAST AND WELL SUITED FOR SMALL DEVICES
No cryptographic techniques has two main outcomes: the IST Client is very fast and it can be implemented in any device, even the smallest one with limited computation bandwidth (for example smartphone, smart card, RFID tag ecc. ecc.)
BIDIRECTIONAL IDENTIFICATION
IST Model implements a strong identification engine able to identify every transaction partner (for example both the Client and the Server in 2 partner scenario)
"N" PARTNER SCENARIO TRANSACTIONS
IST Model can be naturally extended to build a scenario composed by 'N' partners all involved in the exectution of a single electronic transaction
OPEN PROTOCOL
IST MODEL has no special needs, just a TCP/IP connection. It is an open protocol that can be adoped with minimum costs over an existing infrastructure
GENERALIZED TRANSACTION
Every kind of syncronous transaction can be defined inside the model
IDENTIFICATION DATA NEVER SHARED
There is only one "certification authority" who is enabled to identify transaction partners. Security data are never shared among partners
NO DETERMINISTIC ALGORITHMS
The model is not using any deterministic algorithm, making it inherently secure
MINIMIZE HUMAN INTERVENTION
The IST model is designed to minimize human intervention
INTRINSIC PROTECTION
The identification engine inside IST Model is inherently secure by design. Its innovative features make invulnerable by many computer-related fraud among those currently most popular (phishing, pharming, arp poisoning, sniffing just to name some of them)
NO CRYPTOGRAPHIC TECHNOLOGY
IST Model does not uses any cryptographic techniques to build his strong safe identification model
FAST AND WELL SUITED FOR SMALL DEVICES
No cryptographic techniques has two main outcomes: the IST Client is very fast and it can be implemented in any device, even the smallest one with limited computation bandwidth (for example smartphone, smart card, RFID tag ecc. ecc.)
BIDIRECTIONAL IDENTIFICATION
IST Model implements a strong identification engine able to identify every transaction partner (for example both the Client and the Server in 2 partner scenario)
"N" PARTNER SCENARIO TRANSACTIONS
IST Model can be naturally extended to build a scenario composed by 'N' partners all involved in the exectution of a single electronic transaction
OPEN PROTOCOL
IST MODEL has no special needs, just a TCP/IP connection. It is an open protocol that can be adoped with minimum costs over an existing infrastructure
GENERALIZED TRANSACTION
Every kind of syncronous transaction can be defined inside the model
IDENTIFICATION DATA NEVER SHARED
There is only one "certification authority" who is enabled to identify transaction partners. Security data are never shared among partners
NO DETERMINISTIC ALGORITHMS
The model is not using any deterministic algorithm, making it inherently secure
MINIMIZE HUMAN INTERVENTION
The IST model is designed to minimize human intervention
INTRINSIC PROTECTION
The identification engine inside IST Model is inherently secure by design. Its innovative features make invulnerable by many computer-related fraud among those currently most popular (phishing, pharming, arp poisoning, sniffing just to name some of them)