17455027. AUDITING OF MULTI-FACTOR AUTHENTICATION simplified abstract (International Business Machines Corporation)
AUDITING OF MULTI-FACTOR AUTHENTICATION
Organization Name
International Business Machines Corporation
Inventor(s)
SARITHA Arunkumar of Basingstoke (GB)
CHENG-TA Lee of Chamblee GA (US)
AUDITING OF MULTI-FACTOR AUTHENTICATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 17455027 titled 'AUDITING OF MULTI-FACTOR AUTHENTICATION
Simplified Explanation
Abstract Explanation
The patent application describes a method for auditing multi-factor authentication. This involves receiving a request for multi-factor authentication from a user's device, retrieving information about the device, logging the request and device information, calculating the strength of the authentication based on the request and device information, and logging an audit trail of the authentication process.
Bullet Points
- Method for auditing multi-factor authentication
- Request for authentication received from user's device
- Information about the device is retrieved
- Request and device information are logged
- Strength of authentication is calculated
- Audit trail of authentication process is logged
Potential Applications
- Online banking and financial services
- E-commerce platforms
- Government and military systems
- Cloud computing services
- Social media platforms
Problems Solved
- Lack of transparency in multi-factor authentication process
- Difficulty in tracking and auditing authentication requests
- Inability to assess the strength of authentication methods
- Limited visibility into the devices used for authentication
Benefits
- Enhanced security through auditing of authentication process
- Improved transparency and accountability
- Ability to track and analyze authentication requests
- Better understanding of the strength of authentication methods
- Increased visibility into the devices used for authentication
Original Abstract Submitted
In an approach to auditing of multi-factor authentication, one or more computer processors receive a request for a multi-factor authentication for a service from at least one device associated with a user. One or more computer processors retrieve information associated with the at least one device. One or more computer processors log the request and the information associated with the at least one device. One or more computer processors calculate a strength of the multi-factor authentication based on the request and the information associated with the at least one device. One or more computer processors log a multi-factor authentication audit trail.