17822558. CONTINUOUS AUTHENTICATION FOR A REAL TIME HOLOGRAM simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

CONTINUOUS AUTHENTICATION FOR A REAL TIME HOLOGRAM

Organization Name

International Business Machines Corporation

Inventor(s)

Paul Llamas Virgen of Guadalajara (MX)

Priyansh Jaiswal of Boca Raton FL (US)

Peeyush Jaiswal of Boca Raton FL (US)

CONTINUOUS AUTHENTICATION FOR A REAL TIME HOLOGRAM - A simplified explanation of the abstract

This abstract first appeared for US patent application 17822558 titled 'CONTINUOUS AUTHENTICATION FOR A REAL TIME HOLOGRAM

Simplified Explanation

    • Explanation:**

- Techniques for continuous authentication for a real-time hologram are provided. - A hologram embedded with a key phrase is received, along with a first seed and a second seed. - A second key phrase is generated using the first seed, and a second sequence is generated using the second seed. - It is determined whether portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence. - If the portions are embedded correctly, the hologram is displayed and the request is processed; otherwise, the request is rejected.

    • Potential Applications:**

- Secure access control systems - Anti-counterfeiting measures for products - Enhanced security for sensitive information

    • Problems Solved:**

- Unauthorized access to systems or information - Counterfeiting of products - Ensuring the authenticity of holograms

    • Benefits:**

- Continuous authentication for enhanced security - Real-time verification of holograms - Improved protection against unauthorized access or counterfeiting


Original Abstract Submitted

Provided are techniques for continuous authentication for a real time hologram. A request and a hologram are received, where the hologram is embedded with a first key phrase in accordance with a first sequence, and where the first sequence indicates which portions of the first key phrase are embedded in specific locations of the hologram. A first seed and a second seed are retrieved. A second key phrase is generated using the first seed. A second sequence is generated using the second seed. It is determined whether portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence. In response to determining that the portions of the second key phrase are embedded in specific locations of the hologram in accordance with the second sequence, the hologram is displayed, and the request is processed. Otherwise, the request is rejected.