Endpoint receives information from devices as uniquely characterized signals that no other devices can replicate. There's nothing for a hacker to "break;" no passwords, no encryption schemes. By measuring signal features that occur naturally, Endpoint can collect “fingerprints” from devices to later authenticate them. This is done through polarization.

Polarization mode dispersion is very important in radio communications and is often considered to be an obstacle to overcome. For instance, when a wireless signal is traveling from a transmitter in a thermostat to a router, as depicted in the drawing, it bounces off of many objects along the way. Each time it bounces, there is a slight twist in polarization, which is what is called polarization mode dispersion. Most commercial communications devices attempt to eliminate polarization mode dispersion, but Endpoint knows how to employ it to the benefit of securing the communications path.

We discovered that the polarization mode dispersion creates a stable fingerprint as multiple signal paths twist the polarization. Signatures are unique to each device and impossible to predict in any way known today. Using this concept, we can build receivers that can uniquely identify signals as belonging to a particular device. This foundational premise allows us to build an efficient and effective layer of security into the hardware of wireless devices.

ftc proceedings 978-3-030-02683-7.jpg

FTC 2018: Proceedings of the Future Technologies Conference (FTC) 2018 pp 904-911

RF Biometric for Wireless Devices

Heller R.P., Pratt T.G., Loof J., Jesse E. (2019) RF Biometric for Wireless Devices. In: Arai K., Bhatia R., Kapoor S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 881. Springer, Cham

  • First Online 20 October 2018

  • DOI

  • Publisher Name Springer, Cham

  • Print ISBN 978-3-030-02682-0

  • Online ISBN 978-3-030-02683-7

  • eBook Packages Intelligent Technologies and Robotics