17933985. USE-BASED SECURITY CHALLENGE AUTHENTICATION simplified abstract (International Business Machines Corporation)
Contents
- 1 USE-BASED SECURITY CHALLENGE AUTHENTICATION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 USE-BASED SECURITY CHALLENGE AUTHENTICATION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
USE-BASED SECURITY CHALLENGE AUTHENTICATION
Organization Name
International Business Machines Corporation
Inventor(s)
BRIAN Gillikin of Washington DC (US)
Zachary A. Silverstein of Georgetown TX (US)
Trinette Ann Brownhill of Montgomery TX (US)
USE-BASED SECURITY CHALLENGE AUTHENTICATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 17933985 titled 'USE-BASED SECURITY CHALLENGE AUTHENTICATION
Simplified Explanation
The present disclosure relates to use-based security challenge authentication for electronic devices. Usage frequency metrics for critical features are collected over time to determine if a condition is met for use-based authentication. If the condition is met, a security challenge is generated based on the usage frequency of a critical feature and presented to the user. Access to the device is authorized based on the sufficiency of the user's response to the security challenge.
- Collection of usage frequency metrics for critical features of an electronic device
- Generation of a use-based security challenge based on the usage frequency of a critical feature
- Authorization of access to the device based on the user's response to the security challenge
Potential Applications
This technology could be applied in various industries such as cybersecurity, mobile device authentication, and access control systems.
Problems Solved
This technology helps enhance the security of electronic devices by implementing use-based authentication, making it more difficult for unauthorized users to gain access.
Benefits
- Improved security for electronic devices - User-friendly authentication process - Enhanced protection against unauthorized access
Potential Commercial Applications
"Enhancing Electronic Device Security with Use-Based Authentication"
Possible Prior Art
One possible prior art for this technology could be traditional password-based authentication systems that are commonly used for device security.
Unanswered Questions
== How does this technology impact user experience compared to traditional authentication methods? This technology could potentially provide a more seamless and user-friendly authentication process, reducing the need for complex passwords and increasing security.
== What are the potential limitations or vulnerabilities of this use-based authentication system? One potential limitation could be the reliance on user behavior patterns, which may not always be consistent or predictable, leading to potential security vulnerabilities.
Original Abstract Submitted
Aspects of the present disclosure relate to use-based security challenge authentication. Usage frequency metrics for features of an electric device can be collected over time. A set of critical features can be determined based on the collected usage frequency metrics, where each critical feature has a usage frequency exceeding a usage frequency threshold. A determination can be made whether a condition is met for use-based authentication. In response to determining that the condition is met for use-based authentication, a use-based security challenge can be generated using a critical feature, the use-based security challenge based on use frequency of the critical feature. The generated use-based security challenge can be presented to the user. A response to the use-based security challenge can be received. A sufficiency of the response to the use-based security challenge can be determined. Access to the electronic device can be authorized based on a sufficiency of the response.