SlideShare ist ein Scribd-Unternehmen logo
1 von 27
“NYMI”
WEARABLE IDENTITY
A NEXT GEN TECHNOLOGY
1
PRESENTED BY:
DHEERAJ UPADHYAY
+91-9716611024
dheeraj053@gmail.com
 INTRODUCTION TO BIONYM
 COMPOSITION OF NYMI
 APPLICATIONS
 WORKING (ENROLLMENT AND AUTHENTICATION)
 SECURITY
 LIMITATIONS
 RECENT MARKET ACTIVITIES
 FUTURE SCOPE
 CONCLUSION
BIONYM TECHNOLOGY 2
CONTENTS
Nymi is a lightweight wristband that acts as the central point
of identity authentication. It incorporates various security
features, including the use of cardiac rhythm
(electrocardiogram ECG) as a factor of seamless biometric
authentication.
BIONYM TECHNOLOGY
3
NYMI
A TINY DEVICE WITH A HUGE IDEA
BIONYM TECHNOLOGY
4
Bluetooth Low Energy
Electro-cardiogram
Sensor
5 Notification LEDSecure Element
Clasp Monitor
6 Axis Inertial
Measurement Unit
3 Axis
Gyroscope
3 Axis
Accelerometer
BLE RADIO
 The BLE chip is operating in the peripheral mode and serves as the
primary communication interface between the Nymi and other
devices.
 The BLE radio has a maximum line of sight range of 5m (16.4ft).It
works on the Handshaking protocol.
ECG SENSOR
 The ECG sensor allows the Nymi to collect ECG pattern, which is
used for biometric enrollment and authentication,ECG sensor with
two electrodes located on the top and bottom of the module.
 One electrode touches the wrist and one is exposed on the dorsal
side.ECG data can be captured when the user touches the top‐side
electrode with the opposite hand 5
COMPOSITION OF NYMI
 SECURE ELEMENT
The secure element is a dedicated integrated circuit that implements an
elliptic curve cryptography digital signature algorithm (ECDSA) to sign data
and securely store private keys.
 CLASP MONITOR
A monitoring system used to detect when the wristband has been
removed. When the Nymi is removed it automatically powers down.
 LEDS
5 LEDs are available along the front side of the Nymi to provide a visual
user interface.
BIONYM TECHNOLOGY 6
COMPOSITION OF NYMI CONTINUE…
 An inertial measurement unit, or IMU, is an
electronic device that measures and
reports on a craft's velocity, orientation,
and gravitational forces, using a
combination of accelerometers and
gyroscopes, sometimes also
magnetometers.
 The IMU sensor is a 6-axis sensor that
provides 3-axis accelerometer (i.e. x, y, z)
and 3-axis gyroscope measurement data
(i.e. roll, pitch, yaw).
 This information can be used for tap
detection and gesture recognition.
BIONYM TECHNOLOGY
7
IMU SENSOR
COMPOSITION OF NYMI CONTINUE…
BIONYM TECHNOLOGY 8
Nymi Enabled Device
 Once in an authenticated state, the
Nymi can communicate the user’s
identity credentials to other devices
and systems, termed Nymi Enabled
Devices (NEDs).
AAD AND NED
Authorized Authentication
Device
 A smartphone, tablet, or computer that
is compatible with Bionym companion
app. The companion app is developed for
Android, IOS and PC; the user will need
one of these devices to authenticate
their Nymi wristband.
BIONYM TECHNOLOGY 9
TOUCHING THE
UPPER ELECTRODE
ECG SAMPLE
COLLECTION
BIOMETIC TEMPLATE TRANSFER
AUTHENTICATION IN AAD
DIGITAL TEMPLATE
TRANSFER
NED2
NED1
NED3
NYMI
ENROLLMENT AND AUTHENTICATION
 Enrollment is the process of capturing
and processing a sample of the user’s
ECG in order to turn it into a biometric
template.
 The enrollment process is initiated and
performed from the AAD, the users ECG
is captured from the Nymi and
transmitted wirelessly to their AAD over
a secure channel.
 Their biometric template is stored on
the AAD in an encrypted form so that it
cannot be compromised even if the AAD
is compromised.
BIONYM TECHNOLOGY
10
CONT…..
 Authentication is the process of assessing the user’s identity against the
previously created biometric template.
 The live ECG sample is matched in real-time against the biometric template.
 If a confident match is achieved within the maximum allowed wait period,
then the user is authenticated and the Nymi becomes activated.
 Once in an authenticated state, the Nymi can communicate the user’s identity
credentials to other devices and systems, termed Nymi Enabled Devices
(NEDs). Some examples of NEDs are payment systems, smartphones, tablets,
Bluetooth locks.
 It should be noted that the Nymi does not communicate biometric data to
NEDs – it only communicates a digital credential which represents the user’s
identity.
BIONYM TECHNOLOGY 11
BIONYM TECHNOLOGY 12
ECG VERIFICATION AND
PATTERN RECOGNITION
 Figure shows the different pattern of
the recorded ECG of different user .
 Small differences in the overall shape
of their waves reveal significant
distinctions between individuals.
 During authentication, the Nymi is able
to ignore noise from recording artifacts
that result from breathing, body
movement.
 It focus on pattern recognition to
either accept or reject the user.
 During enrollment, the Nymi extracts
features which are persistent in an
individual’s ECG and at the same time
distinguishable amongst a population.
BIONYM TECHNOLOGY 13
Reliability of Authentication
 Generally, the accuracy of authentication improves with longer
authentications times
BIONYM TECHNOLOGY 15
AUTOMATIC DEVICE
UNLOCK
INITIAL
AUTHENTICATION BY AAD
UNLOCK YOUR CAR BY
GESTURES
FEATURES OF NYMI
BIONYM TECHNOLOGY 16
MAKE YOUR PAYMENT
USING NYMI
CONTROL YOUR DEVICE
BY HAND MOVEMENTS
•Is your NYMI Secure???
The nymi is inherently a 3‐factor
authentication system, each
factor the nymi employs adds a
deeper layer of protection against
impostors.
I. Biometric authentication
II. Possession of the nymi
wristband
III. Possession of the authorized
authentication device
(android or iOS)
BIONYM TECHNOLOGY 19
THREE FACTOR AUTHENTICATION
 SECURE PAIRING AND COMMUNICATION
When the Nymi is introduced to a new Nymi Enabled Device (NED), a secure
pairing protocol is performed. All communication is encrypted and
authenticated using the long-term key from that point forward.
 OWNER IDENTITY CONFIRMATION AND DIGITAL SIGNING
The Nymi has the capability of using a built-in
hardware based elliptic curve Digital Signature Algorithm (ECDSA), to securely
generate pairs of public and private keys.
 TRACKING PREVENTION AND BROADCASTING
As a connected and transmitting device that is constantly worn by its owner, the
Nymi was designed for privacy and to prevent any type of tracking or unwanted
Identification.
BIONYM TECHNOLOGY 20
Cont….
BIONYM TECHNOLOGY 21
LIMITATIONS OF NYMI
NYMI CAN NOT BE USED AS A
HEART MONITORING DEVICE
 The first generation Nymi is not a continuous heart monitoring or medical
device, and cannot be used to diagnose medical conditions.
 The wristband does not continuously monitor the user’s ECG;
 ECG is only captured while the user is touching the top electrode with their
opposite hand.
 Furthermore, the Nymi hardware and form factor do not fall into medically
approved ECG technology.
 Google recently purchased the company Slick Login (on 18th Feb) to
provide the key less passwords to the user as it is very annoying to
remember and type the password every time for authentication.
 Bionym Company is inviting the developers to make some innovative
apps for the NYMI for android and IOS platform.
 Approximate cost of the NYMI Device as decided by BIONYM is about
79$. (about Rs.5000)
BIONYM TECHNOLOGY 22
Recent Market Effects
 Making the Banking System and ATM
Transaction’s authentication using
NYMI will resolve many security issues.
 Customized Room controller using the
smart home appliances like coffee
maker.
 NYMI as a Secure Bit coin Wallet.
 The next release of NYMI may include
the feature of Heart monitoring for
medical purposes.
 Google will very soon going to release
this technology in the form of wearable
password ring.
BIONYM TECHNOLOGY 23
FUTURE SCOPE
 The Nymi was developed to improve the wearer’s daily
experience. Its underlying technology, security and privacy have
been designed specifically to provide the end-user with an
empowering, easy to use solution to manage their identity.
 It simplifies the user’s life by removing complications associated
with identity and security.
 Protected from monitoring and third-party tracking, the Nymi will
provide individuals, organizations and groups with secure and
seamless interactions for a variety of applications and devices.
BIONYM TECHNOLOGY 24
CONCLUSIONS
[1.] Jain, A. K., Bolle, R., Pankanti, S. “Biometrics: personal
identification in networked society”. Kluwer Academic Publications.
1999.
[2.] Wang, Y., Agrafioti, F., Hatzinakos, D., Plataniotis, K. N.
“Analysis of human electrocardiogram for biometric recognition”.
In EURASIP Journal on Advances in Signal Processing. 2008.
[3.] Agrafioti, F., Hatzinakos, D. “Fusion of ECG sources for human
identification”. In International Symposium on Communications,
Control and Signal Processing: ISCCSP. 2008.
[4.] www.bionym.com
[5.] http://www.getnymi.com/
BIONYM TECHNOLOGY 25
REFERENCES
BIONYM TECHNOLOGY 26
THANK YOU
BIONYM TECHNOLOGY 27

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
Bm 06 FINGER PRINT BASED SECURITY SYSTEM
Bm 06 FINGER PRINT BASED SECURITY SYSTEMBm 06 FINGER PRINT BASED SECURITY SYSTEM
Bm 06 FINGER PRINT BASED SECURITY SYSTEM1000kv technologies
 
Near field communication
Near field communicationNear field communication
Near field communicationBindu U
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
Detecting Alive Human Using Robot for Rescue Operation
Detecting Alive Human Using Robot for Rescue OperationDetecting Alive Human Using Robot for Rescue Operation
Detecting Alive Human Using Robot for Rescue Operationvivatechijri
 
Intelligent Controlled Residence and Face Recognition Technology
Intelligent Controlled Residence and Face Recognition TechnologyIntelligent Controlled Residence and Face Recognition Technology
Intelligent Controlled Residence and Face Recognition TechnologyAssociate Professor in VSB Coimbatore
 
IRJET- Speaking Microcontroller for Deaf and Dumb People
IRJET- Speaking Microcontroller for Deaf and Dumb PeopleIRJET- Speaking Microcontroller for Deaf and Dumb People
IRJET- Speaking Microcontroller for Deaf and Dumb PeopleIRJET Journal
 
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEMBm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM1000kv technologies
 
Ecc08 malta
Ecc08 maltaEcc08 malta
Ecc08 maltaSummerman80
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint RecognitionSecurity Session
 
Internet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender SystemInternet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender Systemrahulmonikasharma
 
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEMBm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM1000kv technologies
 
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER ...
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER         ...Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER         ...
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER ...1000kv technologies
 
Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTDr. Amarjeet Singh
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking Systemrahulmonikasharma
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
 

Was ist angesagt? (20)

IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Bm 06 FINGER PRINT BASED SECURITY SYSTEM
Bm 06 FINGER PRINT BASED SECURITY SYSTEMBm 06 FINGER PRINT BASED SECURITY SYSTEM
Bm 06 FINGER PRINT BASED SECURITY SYSTEM
 
Near field communication
Near field communicationNear field communication
Near field communication
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
Literature survey
Literature surveyLiterature survey
Literature survey
 
Detecting Alive Human Using Robot for Rescue Operation
Detecting Alive Human Using Robot for Rescue OperationDetecting Alive Human Using Robot for Rescue Operation
Detecting Alive Human Using Robot for Rescue Operation
 
Intelligent Controlled Residence and Face Recognition Technology
Intelligent Controlled Residence and Face Recognition TechnologyIntelligent Controlled Residence and Face Recognition Technology
Intelligent Controlled Residence and Face Recognition Technology
 
IRJET- Speaking Microcontroller for Deaf and Dumb People
IRJET- Speaking Microcontroller for Deaf and Dumb PeopleIRJET- Speaking Microcontroller for Deaf and Dumb People
IRJET- Speaking Microcontroller for Deaf and Dumb People
 
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEMBm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
 
Ecc08 malta
Ecc08 maltaEcc08 malta
Ecc08 malta
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
 
Internet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender SystemInternet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender System
 
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEMBm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
 
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER ...
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER         ...Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER         ...
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER ...
 
Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOT
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
 
Ppt1
Ppt1Ppt1
Ppt1
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
SIM Card Overview
SIM Card OverviewSIM Card Overview
SIM Card Overview
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 

Andere mochten auch

Google glass, A new innovation leading to new technology
Google glass, A new innovation leading to new technology Google glass, A new innovation leading to new technology
Google glass, A new innovation leading to new technology Ekta Agrawal
 
Skinput latest technology
Skinput latest technologySkinput latest technology
Skinput latest technologyTaimoor Ali Khan
 
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl MartinCIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl MartinCloudIDSummit
 
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CloudIDSummit
 
College+Prep+Seminar+Ppt.
College+Prep+Seminar+Ppt.College+Prep+Seminar+Ppt.
College+Prep+Seminar+Ppt.learningexposures
 
Bjoern Eskofier: Keynote at DSAI & TISHW 2016 Conference
Bjoern Eskofier: Keynote at DSAI & TISHW 2016 ConferenceBjoern Eskofier: Keynote at DSAI & TISHW 2016 Conference
Bjoern Eskofier: Keynote at DSAI & TISHW 2016 ConferenceBjoern Eskofier
 
The Yubikey
The YubikeyThe Yubikey
The YubikeyDavid Page
 
Samsung Developer Conference 2016
Samsung Developer Conference 2016Samsung Developer Conference 2016
Samsung Developer Conference 2016Mihai Pohontu
 
Presentation to the UN in Sarajevo
Presentation to the UN in SarajevoPresentation to the UN in Sarajevo
Presentation to the UN in SarajevoMarc Wright
 
Antroplogi agama kel 6
Antroplogi agama kel 6Antroplogi agama kel 6
Antroplogi agama kel 6Husain Rahim
 
The Latest Communication Technology
The Latest Communication TechnologyThe Latest Communication Technology
The Latest Communication Technologynorielr
 
Skinput by Shridhar Sharma
Skinput by Shridhar SharmaSkinput by Shridhar Sharma
Skinput by Shridhar SharmaShridhar
 
4 G mobile technology
4 G mobile technology4 G mobile technology
4 G mobile technologyAman Jain
 
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...ST_World
 
Firefox operating system
Firefox operating systemFirefox operating system
Firefox operating systemNishant Mehare
 
Single_Electron_Transistor_Aneesh_Raveendran
Single_Electron_Transistor_Aneesh_RaveendranSingle_Electron_Transistor_Aneesh_Raveendran
Single_Electron_Transistor_Aneesh_RaveendranAneesh Raveendran
 
The Halo Network
The Halo NetworkThe Halo Network
The Halo Networksree1000
 
study paper on Li-Fi technology
study paper on Li-Fi technologystudy paper on Li-Fi technology
study paper on Li-Fi technologyShowrav Mazumder
 

Andere mochten auch (20)

Google glass, A new innovation leading to new technology
Google glass, A new innovation leading to new technology Google glass, A new innovation leading to new technology
Google glass, A new innovation leading to new technology
 
Skinput latest technology
Skinput latest technologySkinput latest technology
Skinput latest technology
 
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl MartinCIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
 
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
 
College+Prep+Seminar+Ppt.
College+Prep+Seminar+Ppt.College+Prep+Seminar+Ppt.
College+Prep+Seminar+Ppt.
 
Bjoern Eskofier: Keynote at DSAI & TISHW 2016 Conference
Bjoern Eskofier: Keynote at DSAI & TISHW 2016 ConferenceBjoern Eskofier: Keynote at DSAI & TISHW 2016 Conference
Bjoern Eskofier: Keynote at DSAI & TISHW 2016 Conference
 
The Yubikey
The YubikeyThe Yubikey
The Yubikey
 
Samsung Developer Conference 2016
Samsung Developer Conference 2016Samsung Developer Conference 2016
Samsung Developer Conference 2016
 
Presentation to the UN in Sarajevo
Presentation to the UN in SarajevoPresentation to the UN in Sarajevo
Presentation to the UN in Sarajevo
 
Antroplogi agama kel 6
Antroplogi agama kel 6Antroplogi agama kel 6
Antroplogi agama kel 6
 
The Latest Communication Technology
The Latest Communication TechnologyThe Latest Communication Technology
The Latest Communication Technology
 
Skinput by Shridhar Sharma
Skinput by Shridhar SharmaSkinput by Shridhar Sharma
Skinput by Shridhar Sharma
 
4 G mobile technology
4 G mobile technology4 G mobile technology
4 G mobile technology
 
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...
 
Firefox operating system
Firefox operating systemFirefox operating system
Firefox operating system
 
Single_Electron_Transistor_Aneesh_Raveendran
Single_Electron_Transistor_Aneesh_RaveendranSingle_Electron_Transistor_Aneesh_Raveendran
Single_Electron_Transistor_Aneesh_Raveendran
 
Smartthings
SmartthingsSmartthings
Smartthings
 
Oculus Rift
Oculus RiftOculus Rift
Oculus Rift
 
The Halo Network
The Halo NetworkThe Halo Network
The Halo Network
 
study paper on Li-Fi technology
study paper on Li-Fi technologystudy paper on Li-Fi technology
study paper on Li-Fi technology
 

Ähnlich wie Nymi- Latest Technology : Wear your Password on your Wrist (authentication using your Heartbeat) College Seminar ppt.

Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Fingerprint Based Security System
Fingerprint Based Security SystemFingerprint Based Security System
Fingerprint Based Security SystemTrijendra Singh
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIIRJET Journal
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
Biomatrics
BiomatricsBiomatrics
BiomatricsAmit Pandey
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyAshwani Kumar
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligenceNikhil Patteri
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide infoKalyanam Kiran
 
Blue eyes paper
Blue eyes paperBlue eyes paper
Blue eyes paperSuchen Oguri
 
best pharma journals
best pharma journals best pharma journals
best pharma journals chaitanya451336
 

Ähnlich wie Nymi- Latest Technology : Wear your Password on your Wrist (authentication using your Heartbeat) College Seminar ppt. (20)

Embedded system
Embedded systemEmbedded system
Embedded system
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Fingerprint Based Security System
Fingerprint Based Security SystemFingerprint Based Security System
Fingerprint Based Security System
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
N044057478
N044057478N044057478
N044057478
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Smart Home - ieee format
Smart Home - ieee formatSmart Home - ieee format
Smart Home - ieee format
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Blue eyes paper
Blue eyes paperBlue eyes paper
Blue eyes paper
 
best pharma journals
best pharma journals best pharma journals
best pharma journals
 
IJISET_V2_I6_90
IJISET_V2_I6_90IJISET_V2_I6_90
IJISET_V2_I6_90
 

KĂźrzlich hochgeladen

FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsArindam Chakraborty, Ph.D., P.E. (CA, TX)
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 

KĂźrzlich hochgeladen (20)

FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 

Nymi- Latest Technology : Wear your Password on your Wrist (authentication using your Heartbeat) College Seminar ppt.

  • 1. “NYMI” WEARABLE IDENTITY A NEXT GEN TECHNOLOGY 1 PRESENTED BY: DHEERAJ UPADHYAY +91-9716611024 dheeraj053@gmail.com
  • 2.  INTRODUCTION TO BIONYM  COMPOSITION OF NYMI  APPLICATIONS  WORKING (ENROLLMENT AND AUTHENTICATION)  SECURITY  LIMITATIONS  RECENT MARKET ACTIVITIES  FUTURE SCOPE  CONCLUSION BIONYM TECHNOLOGY 2 CONTENTS
  • 3. Nymi is a lightweight wristband that acts as the central point of identity authentication. It incorporates various security features, including the use of cardiac rhythm (electrocardiogram ECG) as a factor of seamless biometric authentication. BIONYM TECHNOLOGY 3 NYMI A TINY DEVICE WITH A HUGE IDEA
  • 4. BIONYM TECHNOLOGY 4 Bluetooth Low Energy Electro-cardiogram Sensor 5 Notification LEDSecure Element Clasp Monitor 6 Axis Inertial Measurement Unit 3 Axis Gyroscope 3 Axis Accelerometer
  • 5. BLE RADIO  The BLE chip is operating in the peripheral mode and serves as the primary communication interface between the Nymi and other devices.  The BLE radio has a maximum line of sight range of 5m (16.4ft).It works on the Handshaking protocol. ECG SENSOR  The ECG sensor allows the Nymi to collect ECG pattern, which is used for biometric enrollment and authentication,ECG sensor with two electrodes located on the top and bottom of the module.  One electrode touches the wrist and one is exposed on the dorsal side.ECG data can be captured when the user touches the top‐side electrode with the opposite hand 5 COMPOSITION OF NYMI
  • 6.  SECURE ELEMENT The secure element is a dedicated integrated circuit that implements an elliptic curve cryptography digital signature algorithm (ECDSA) to sign data and securely store private keys.  CLASP MONITOR A monitoring system used to detect when the wristband has been removed. When the Nymi is removed it automatically powers down.  LEDS 5 LEDs are available along the front side of the Nymi to provide a visual user interface. BIONYM TECHNOLOGY 6 COMPOSITION OF NYMI CONTINUE…
  • 7.  An inertial measurement unit, or IMU, is an electronic device that measures and reports on a craft's velocity, orientation, and gravitational forces, using a combination of accelerometers and gyroscopes, sometimes also magnetometers.  The IMU sensor is a 6-axis sensor that provides 3-axis accelerometer (i.e. x, y, z) and 3-axis gyroscope measurement data (i.e. roll, pitch, yaw).  This information can be used for tap detection and gesture recognition. BIONYM TECHNOLOGY 7 IMU SENSOR COMPOSITION OF NYMI CONTINUE…
  • 8. BIONYM TECHNOLOGY 8 Nymi Enabled Device  Once in an authenticated state, the Nymi can communicate the user’s identity credentials to other devices and systems, termed Nymi Enabled Devices (NEDs). AAD AND NED Authorized Authentication Device  A smartphone, tablet, or computer that is compatible with Bionym companion app. The companion app is developed for Android, IOS and PC; the user will need one of these devices to authenticate their Nymi wristband.
  • 9. BIONYM TECHNOLOGY 9 TOUCHING THE UPPER ELECTRODE ECG SAMPLE COLLECTION BIOMETIC TEMPLATE TRANSFER AUTHENTICATION IN AAD DIGITAL TEMPLATE TRANSFER NED2 NED1 NED3 NYMI
  • 10. ENROLLMENT AND AUTHENTICATION  Enrollment is the process of capturing and processing a sample of the user’s ECG in order to turn it into a biometric template.  The enrollment process is initiated and performed from the AAD, the users ECG is captured from the Nymi and transmitted wirelessly to their AAD over a secure channel.  Their biometric template is stored on the AAD in an encrypted form so that it cannot be compromised even if the AAD is compromised. BIONYM TECHNOLOGY 10
  • 11. CONT…..  Authentication is the process of assessing the user’s identity against the previously created biometric template.  The live ECG sample is matched in real-time against the biometric template.  If a confident match is achieved within the maximum allowed wait period, then the user is authenticated and the Nymi becomes activated.  Once in an authenticated state, the Nymi can communicate the user’s identity credentials to other devices and systems, termed Nymi Enabled Devices (NEDs). Some examples of NEDs are payment systems, smartphones, tablets, Bluetooth locks.  It should be noted that the Nymi does not communicate biometric data to NEDs – it only communicates a digital credential which represents the user’s identity. BIONYM TECHNOLOGY 11
  • 12. BIONYM TECHNOLOGY 12 ECG VERIFICATION AND PATTERN RECOGNITION  Figure shows the different pattern of the recorded ECG of different user .  Small differences in the overall shape of their waves reveal significant distinctions between individuals.  During authentication, the Nymi is able to ignore noise from recording artifacts that result from breathing, body movement.  It focus on pattern recognition to either accept or reject the user.  During enrollment, the Nymi extracts features which are persistent in an individual’s ECG and at the same time distinguishable amongst a population.
  • 13. BIONYM TECHNOLOGY 13 Reliability of Authentication  Generally, the accuracy of authentication improves with longer authentications times
  • 14.
  • 15. BIONYM TECHNOLOGY 15 AUTOMATIC DEVICE UNLOCK INITIAL AUTHENTICATION BY AAD UNLOCK YOUR CAR BY GESTURES FEATURES OF NYMI
  • 16. BIONYM TECHNOLOGY 16 MAKE YOUR PAYMENT USING NYMI CONTROL YOUR DEVICE BY HAND MOVEMENTS
  • 17.
  • 18. •Is your NYMI Secure???
  • 19. The nymi is inherently a 3‐factor authentication system, each factor the nymi employs adds a deeper layer of protection against impostors. I. Biometric authentication II. Possession of the nymi wristband III. Possession of the authorized authentication device (android or iOS) BIONYM TECHNOLOGY 19 THREE FACTOR AUTHENTICATION
  • 20.  SECURE PAIRING AND COMMUNICATION When the Nymi is introduced to a new Nymi Enabled Device (NED), a secure pairing protocol is performed. All communication is encrypted and authenticated using the long-term key from that point forward.  OWNER IDENTITY CONFIRMATION AND DIGITAL SIGNING The Nymi has the capability of using a built-in hardware based elliptic curve Digital Signature Algorithm (ECDSA), to securely generate pairs of public and private keys.  TRACKING PREVENTION AND BROADCASTING As a connected and transmitting device that is constantly worn by its owner, the Nymi was designed for privacy and to prevent any type of tracking or unwanted Identification. BIONYM TECHNOLOGY 20 Cont….
  • 21. BIONYM TECHNOLOGY 21 LIMITATIONS OF NYMI NYMI CAN NOT BE USED AS A HEART MONITORING DEVICE  The first generation Nymi is not a continuous heart monitoring or medical device, and cannot be used to diagnose medical conditions.  The wristband does not continuously monitor the user’s ECG;  ECG is only captured while the user is touching the top electrode with their opposite hand.  Furthermore, the Nymi hardware and form factor do not fall into medically approved ECG technology.
  • 22.  Google recently purchased the company Slick Login (on 18th Feb) to provide the key less passwords to the user as it is very annoying to remember and type the password every time for authentication.  Bionym Company is inviting the developers to make some innovative apps for the NYMI for android and IOS platform.  Approximate cost of the NYMI Device as decided by BIONYM is about 79$. (about Rs.5000) BIONYM TECHNOLOGY 22 Recent Market Effects
  • 23.  Making the Banking System and ATM Transaction’s authentication using NYMI will resolve many security issues.  Customized Room controller using the smart home appliances like coffee maker.  NYMI as a Secure Bit coin Wallet.  The next release of NYMI may include the feature of Heart monitoring for medical purposes.  Google will very soon going to release this technology in the form of wearable password ring. BIONYM TECHNOLOGY 23 FUTURE SCOPE
  • 24.  The Nymi was developed to improve the wearer’s daily experience. Its underlying technology, security and privacy have been designed specifically to provide the end-user with an empowering, easy to use solution to manage their identity.  It simplifies the user’s life by removing complications associated with identity and security.  Protected from monitoring and third-party tracking, the Nymi will provide individuals, organizations and groups with secure and seamless interactions for a variety of applications and devices. BIONYM TECHNOLOGY 24 CONCLUSIONS
  • 25. [1.] Jain, A. K., Bolle, R., Pankanti, S. “Biometrics: personal identification in networked society”. Kluwer Academic Publications. 1999. [2.] Wang, Y., Agrafioti, F., Hatzinakos, D., Plataniotis, K. N. “Analysis of human electrocardiogram for biometric recognition”. In EURASIP Journal on Advances in Signal Processing. 2008. [3.] Agrafioti, F., Hatzinakos, D. “Fusion of ECG sources for human identification”. In International Symposium on Communications, Control and Signal Processing: ISCCSP. 2008. [4.] www.bionym.com [5.] http://www.getnymi.com/ BIONYM TECHNOLOGY 25 REFERENCES