17455027. AUDITING OF MULTI-FACTOR AUTHENTICATION simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

AUDITING OF MULTI-FACTOR AUTHENTICATION

Organization Name

International Business Machines Corporation

Inventor(s)

SARITHA Arunkumar of Basingstoke (GB)

CHENG-TA Lee of Chamblee GA (US)

AUDITING OF MULTI-FACTOR AUTHENTICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17455027 titled 'AUDITING OF MULTI-FACTOR AUTHENTICATION

Simplified Explanation

Abstract Explanation

The patent application describes a method for auditing multi-factor authentication. This involves receiving a request for multi-factor authentication from a user's device, retrieving information about the device, logging the request and device information, calculating the strength of the authentication based on the request and device information, and logging an audit trail of the authentication process.

Bullet Points

  • Method for auditing multi-factor authentication
  • Request for authentication received from user's device
  • Information about the device is retrieved
  • Request and device information are logged
  • Strength of authentication is calculated
  • Audit trail of authentication process is logged

Potential Applications

  • Online banking and financial services
  • E-commerce platforms
  • Government and military systems
  • Cloud computing services
  • Social media platforms

Problems Solved

  • Lack of transparency in multi-factor authentication process
  • Difficulty in tracking and auditing authentication requests
  • Inability to assess the strength of authentication methods
  • Limited visibility into the devices used for authentication

Benefits

  • Enhanced security through auditing of authentication process
  • Improved transparency and accountability
  • Ability to track and analyze authentication requests
  • Better understanding of the strength of authentication methods
  • Increased visibility into the devices used for authentication


Original Abstract Submitted

In an approach to auditing of multi-factor authentication, one or more computer processors receive a request for a multi-factor authentication for a service from at least one device associated with a user. One or more computer processors retrieve information associated with the at least one device. One or more computer processors log the request and the information associated with the at least one device. One or more computer processors calculate a strength of the multi-factor authentication based on the request and the information associated with the at least one device. One or more computer processors log a multi-factor authentication audit trail.