About Revirtual

There is only one real you on this planet

Revirtual uses the individual characteristic of your "unique presence" to control and manage the process of personal authentication (including the use of systems and services) in locations where a particular individual is not present.

Revirtual is a concept that makes it possible to unite all personal authentication technologies.

The physical presence of an individual is perceived as a single unit of data, the personal authentication information of a certain individual, information about the location of the device and the time at which the personal information was obtained, allowing the system to recognize this presence by comparing data chronologically.


For example, it is possible to determine whether a person is at home based on data generated by fingerprint authentication system at a front door, facial recognition systems on a smartphone or other electronic data processing, such as logging onto a personal computer.



Revirtual is a system where device and system control is determined through a combination of a variety of everyday authentication processes and presence recognition, based on "the most up-to-data location of an individual and the time that data was recorded" all while an individual is on the move.

The following would be impossible when she is at home

When she is at home;

 ・ Using her credit card at a shopping mall.

 ・ Using her password to log in to her computer at work.

 ・ Using her health insurance card at a medical clinic.

There are all cases of unauthorized personal authentication and amount to "identity theft".


Being able to control such unauthorized personal authentication in locations where the authorized individual is not present is the very concept behind Revirtual.

Target locations change in line with your movements

Revirtual determines whether the presence of an individual in particular location is consistent based on the consistency of location and time that is contained within the individual units of data collected.


Once the system recognizes the most up-to-data location (real presence) of an individual, it automatically targets the locations that must be controlled (control information sent to the system). In other words, location where that particular individual is not present.


For example, when going on holiday, the moment the system recognizes you have left home, the home becomes a target location or is controlled by the system.

As you make your way to the airport and board the plane, information concerning target locations is updated until ultimately, every location except your holiday destination becomes a target location under control of the system.

The range of a location can be set at random

There are no restrictions to the range or extent of a particular location.

For example, you could set your location to be any chair in a cafe, in front of the clock tower in St. Mark's Square, Venezia city or Italy.