17848235. AUTHENTICATION USING MUTABLE DATA simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

AUTHENTICATION USING MUTABLE DATA

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Jonathan J. Caruana of Woodinville WA (US)

Kedar Hirve of Kent WA (US)

Justin David Brown of Seattle WA (US)

AUTHENTICATION USING MUTABLE DATA - A simplified explanation of the abstract

This abstract first appeared for US patent application 17848235 titled 'AUTHENTICATION USING MUTABLE DATA

Simplified Explanation

The abstract of this patent application describes a software-based authentication technique that uses mutable authentication data to prevent counterfeiters from making clones of authentic clients.

  • Software-based authentication technique using mutable authentication data to deter counterfeiters
  • Authentication service issues mutable authentication data to a client and stores it with the client's identifier
  • Client authenticates by presenting the most recently issued mutable authentication data to the authentication service
  • Upon successful authentication, the authentication service issues updated mutable authentication data to the client
  • Clones without the most recent mutable authentication data are rejected by the authentication service
  • Changing the mutable authentication data prevents counterfeiters from creating multiple clones that all work at the same time

Potential Applications

  • Online banking and financial transactions
  • E-commerce platforms
  • Secure access to sensitive information or systems
  • Mobile device authentication

Problems Solved

  • Counterfeiters making clones of authentic clients
  • Unauthorized access to systems or sensitive information
  • Fraudulent transactions or activities

Benefits

  • Enhanced security against counterfeiters and unauthorized access
  • Protection against fraudulent activities and transactions
  • Ability to detect and reject cloned clients
  • Increased trust and confidence in software-based authentication systems


Original Abstract Submitted

Software-based authentication techniques may use mutable authentication data that changes to deter counterfeiters from making clones of authentic clients. An authentication service may issue mutable authentication data to a client and store the mutable authentication data in association with an identifier of the client. The client may authenticate by presenting the most recently issued mutable authentication data to the authentication service. Upon successful authentication, the authentication service may issue updated mutable authentication data to the client. Any clones that cannot present the most recent mutable authentication data may be rejected by the authentication service. By changing the mutable authentication data, counterfeiters cannot make a large number of clones that all work at the same time.