17930498. AUTHENTICATION USING TEMPORAL CHARACTERS simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)
AUTHENTICATION USING TEMPORAL CHARACTERS
Organization Name
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor(s)
Uri Kartoun of Cambridge MA (US)
Sophie Batchelder of Cambridge MA (US)
Hannah Justine Mascioli of Pittsburgh PA (US)
AUTHENTICATION USING TEMPORAL CHARACTERS - A simplified explanation of the abstract
This abstract first appeared for US patent application 17930498 titled 'AUTHENTICATION USING TEMPORAL CHARACTERS
Simplified Explanation
The abstract describes a method, computer system, and computer program product for authenticating a user by selecting a username, creating a password based on typing styles, storing the username and password in a database, and authenticating the user based on matching information.
- Method for authenticating a user through a unique password creation process
- Password includes typing styles for added security
- User accesses resources by providing username and password with typing styles
- Stored information is checked against user-provided information for authentication
Potential Applications
This technology could be applied in various industries such as:
- Cybersecurity
- Online banking
- E-commerce platforms
Problems Solved
- Enhances user authentication security
- Reduces the risk of unauthorized access
- Provides a unique and personalized authentication method
Benefits
- Improved user data protection
- Enhanced security measures
- User-friendly authentication process
Potential Commercial Applications
Enhancing User Authentication Security in E-commerce Platforms
Original Abstract Submitted
A method, computer system, and a computer program product is provided for authenticating a user. In one embodiment, a method that selects a selecting a username associated with a user. A plurality of characters are provided to be selected and a set of typing styles relating to at least one of these characters are selected to create a password for the user. Subsequently, the username and the password are stored in a database. The password includes the typing styles. The user can then access a resource through authentication by providing a username and password that includes the selected typing styles. The stored username and password is retrieved from the database and checked against user provided information and the user is authenticated when the user provided information and retrieved information are a match.