{"id":3017,"date":"2023-09-11T20:59:07","date_gmt":"2023-09-11T18:59:07","guid":{"rendered":"https:\/\/www.cyberagentur.de\/projects\/digital-authentication-using-novel-biometric-methods-aubi\/"},"modified":"2026-04-28T11:07:20","modified_gmt":"2026-04-28T09:07:20","slug":"aubi","status":"publish","type":"project","link":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/","title":{"rendered":"Digital authentication using new biometric methods (AuBi)"},"content":{"rendered":"  <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n<h3 class=\"wp-block-heading has-text-align-left\">Background<\/h3>\n\n<p>Digital identities are indispensable: whether for online banking or for digital federal applications. Secure authentication is also necessary to make various types of applications secure for users. In this call for proposals, three new forms of biometric authentication are to be researched and the requirements for their encryption developed.  <\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Aim<\/h3>\n\n<p class=\"has-text-align-left\"><br\/><strong>Biometrics<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Behavioral Biometrics<\/li>\n<\/ul>\n\n<p>This method records data that can be clearly assigned to a person by their behavior (e.g. gait, keyboard\/mouse\/touchpad operating patterns or even brain activity). We are particularly interested in the technical implementation of a new type of continuous authentication.   <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Stimulus-Induced Biometrics<\/li>\n<\/ul>\n\n<p>We use this term to describe a form of biometric authentication in which a specific variable stimulus (e.g. image or sound) is paired with the body&#8217;s own reaction to this stimulus (e.g. eye movement, brain activity or bone resonance). The resulting stimulus\/response relationship serves as an authentication key.   <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Universal Patterns<\/li>\n<\/ul>\n\n<p>This refers to biometric procedures in which the body&#8217;s own reaction is the same across test subjects (e.g. EKP, eye movements). Combined with a specific personal trigger, this creates a universal pattern that can be used for authentication. <\/p>\n\n<p>Here, the <em>Self-ID<\/em> research project aims to implement measurable cognitive reactions to individual self-recognition &#8211; i.e. the recognition of one&#8217;s own face &#8211; as a new biometric authentication feature. The 36-month project is being carried out by Bundesdruckerei, the software company neXenio and the University of Potsdam<a href=\"https:\/\/deu01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.bundesdruckerei.de%2Fde%2Finnovation-hub%2Fprojekt-visuelle-authentifizierung-durch-eigenerkennung-aubi&amp;data=05%7C02%7Cpresse%40cyberagentur.de%7C76a673bfd54d4f39e82d08de120d77c7%7C5af5addd67a84166a44ea46bb97cdde2%7C0%7C0%7C638968046220479563%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=LvRKnOtl6otiapGX%2BHcbikHXjOzqy81pXFzBt6DmtZk%3D&amp;reserved=0\">(Authentifizierung durch Eigenerkennung <\/a><a href=\"https:\/\/deu01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.bundesdruckerei.de%2Fde%2Finnovation-hub%2Fprojekt-visuelle-authentifizierung-durch-eigenerkennung-aubi&amp;data=05%7C02%7Cpresse%40cyberagentur.de%7C76a673bfd54d4f39e82d08de120d77c7%7C5af5addd67a84166a44ea46bb97cdde2%7C0%7C0%7C638968046220499956%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=ADRF1MyMME%2Bzc32wE3JflVgMk9Rj%2FKQHCEq31hodQyk%3D&amp;reserved=0\">\u25ba<\/a><a href=\"https:\/\/deu01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.bundesdruckerei.de%2Fde%2Finnovation-hub%2Fprojekt-visuelle-authentifizierung-durch-eigenerkennung-aubi&amp;data=05%7C02%7Cpresse%40cyberagentur.de%7C76a673bfd54d4f39e82d08de120d77c7%7C5af5addd67a84166a44ea46bb97cdde2%7C0%7C0%7C638968046220522308%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=mh%2F5AipCyyNRpqtnjmqNf5EruBXUfBXPctEm7zlUrqg%3D&amp;reserved=0\"> Projekt mit der Bundesdruckerei Gruppe<\/a>). <\/p>\n\n<p class=\"has-text-align-left\"><strong>Usability &amp; Social Embedding <\/strong><\/p>\n\n<p>In the field of behavioural biometrics, we focus on usability and the social acceptance of authentication procedures, too.<\/p>\n\n<p>When using continuous biometric procedures, additional methods should be developed to ensure that the population gains confidence in the technology and any existing fears can be reduced.<\/p>\n\n<p>At the same time, the process must be simple and intuitive to use. User interfaces and design principles should therefore be used and developed to promote usability. <\/p>\n\n<p class=\"has-text-align-left\"><strong>Cryptography<\/strong><\/p>\n\n<p>Cryptographic protection must also be provided for each of the three biometric procedures. The biometric procedures for behavioral and stimulus-induced biometrics should be secured in such a way that they meet all requirements for <em>biometric template protection<\/em>. In the area of universal patterns, we call for the development and investigation of specific requirements and attack scenarios. All developments must also be secure with regard to the migration to post-quantum cryptography.   <\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Disruptive Risk Research<\/h3>\n\n<p>Digital identity affects us all. The task of making authentication not only faster and more intuitive, but also more secure, is highly relevant in social, economic and also in constitutional areas. This development will not only have a noticeable impact in the context of the federal government (e.g. in public authorities), but also in the personal lives of citizens, who will be able to authenticate themselves more quickly and securely when shopping online, for example.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background Digital identities are indispensable: whether for online banking or for digital federal applications. Secure authentication is also necessary to make various types of applications secure for users. In this call for proposals, three new forms of biometric authentication are to be researched and the requirements for their encryption developed. Aim Biometrics This method records [&hellip;]<\/p>\n","protected":false},"featured_media":2975,"template":"","class_list":["post-3017","project","type-project","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital authentication using new biometric methods (AuBi) - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital authentication using new biometric methods (AuBi) - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Background Digital identities are indispensable: whether for online banking or for digital federal applications. Secure authentication is also necessary to make various types of applications secure for users. In this call for proposals, three new forms of biometric authentication are to be researched and the requirements for their encryption developed. Aim Biometrics This method records [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T09:07:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/AuBi_2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2304\" \/>\n\t<meta property=\"og:image:height\" content=\"1792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aubi\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aubi\\\/\",\"name\":\"Digital authentication using new biometric methods (AuBi) - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aubi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aubi\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AuBi_2.jpg\",\"datePublished\":\"2023-09-11T18:59:07+00:00\",\"dateModified\":\"2026-04-28T09:07:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aubi\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aubi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aubi\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AuBi_2.jpg\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/AuBi_2.jpg\",\"width\":2304,\"height\":1792,\"caption\":\"AuBi_2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/aubi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital authentication using new biometric methods (AuBi)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital authentication using new biometric methods (AuBi) - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/","og_locale":"en_GB","og_type":"article","og_title":"Digital authentication using new biometric methods (AuBi) - Cyberagentur","og_description":"Background Digital identities are indispensable: whether for online banking or for digital federal applications. Secure authentication is also necessary to make various types of applications secure for users. In this call for proposals, three new forms of biometric authentication are to be researched and the requirements for their encryption developed. Aim Biometrics This method records [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/","og_site_name":"Cyberagentur","article_modified_time":"2026-04-28T09:07:20+00:00","og_image":[{"width":2304,"height":1792,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/AuBi_2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/","url":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/","name":"Digital authentication using new biometric methods (AuBi) - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/08\/AuBi_2.jpg","datePublished":"2023-09-11T18:59:07+00:00","dateModified":"2026-04-28T09:07:20+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/#primaryimage","url":"\/wp-content\/uploads\/2024\/08\/AuBi_2.jpg","contentUrl":"\/wp-content\/uploads\/2024\/08\/AuBi_2.jpg","width":2304,"height":1792,"caption":"AuBi_2"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/aubi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Digital authentication using new biometric methods (AuBi)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/project"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3017\/revisions"}],"predecessor-version":[{"id":6504,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3017\/revisions\/6504"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/2975"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=3017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}