17933985. USE-BASED SECURITY CHALLENGE AUTHENTICATION simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

USE-BASED SECURITY CHALLENGE AUTHENTICATION

Organization Name

International Business Machines Corporation

Inventor(s)

BRIAN Gillikin of Washington DC (US)

Zachary A. Silverstein of Georgetown TX (US)

Trinette Ann Brownhill of Montgomery TX (US)

Hua Ni of Chantilly VA (US)

USE-BASED SECURITY CHALLENGE AUTHENTICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17933985 titled 'USE-BASED SECURITY CHALLENGE AUTHENTICATION

Simplified Explanation

The present disclosure relates to use-based security challenge authentication for electronic devices. Usage frequency metrics for critical features are collected over time to determine if a condition is met for use-based authentication. If the condition is met, a security challenge is generated based on the usage frequency of a critical feature and presented to the user. Access to the device is authorized based on the sufficiency of the user's response to the security challenge.

  • Collection of usage frequency metrics for critical features of an electronic device
  • Generation of a use-based security challenge based on the usage frequency of a critical feature
  • Authorization of access to the device based on the user's response to the security challenge

Potential Applications

This technology could be applied in various industries such as cybersecurity, mobile device authentication, and access control systems.

Problems Solved

This technology helps enhance the security of electronic devices by implementing use-based authentication, making it more difficult for unauthorized users to gain access.

Benefits

- Improved security for electronic devices - User-friendly authentication process - Enhanced protection against unauthorized access

Potential Commercial Applications

"Enhancing Electronic Device Security with Use-Based Authentication"

Possible Prior Art

One possible prior art for this technology could be traditional password-based authentication systems that are commonly used for device security.

Unanswered Questions

== How does this technology impact user experience compared to traditional authentication methods? This technology could potentially provide a more seamless and user-friendly authentication process, reducing the need for complex passwords and increasing security.

== What are the potential limitations or vulnerabilities of this use-based authentication system? One potential limitation could be the reliance on user behavior patterns, which may not always be consistent or predictable, leading to potential security vulnerabilities.


Original Abstract Submitted

Aspects of the present disclosure relate to use-based security challenge authentication. Usage frequency metrics for features of an electric device can be collected over time. A set of critical features can be determined based on the collected usage frequency metrics, where each critical feature has a usage frequency exceeding a usage frequency threshold. A determination can be made whether a condition is met for use-based authentication. In response to determining that the condition is met for use-based authentication, a use-based security challenge can be generated using a critical feature, the use-based security challenge based on use frequency of the critical feature. The generated use-based security challenge can be presented to the user. A response to the use-based security challenge can be received. A sufficiency of the response to the use-based security challenge can be determined. Access to the electronic device can be authorized based on a sufficiency of the response.