17942401. COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF simplified abstract (Capital One Services, LLC)
Contents
- 1 COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF
Organization Name
Inventor(s)
Kevin Osborn of Newton Highlands MA (US)
Brian Mcclanahan of Hyattsville MD (US)
COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF - A simplified explanation of the abstract
This abstract first appeared for US patent application 17942401 titled 'COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF
Simplified Explanation
The patent application describes a method and system for identity authentication using authentication answer embedding vectors in a textual embedding space.
- Receiving authentication answers from verified users
- Generating authentication answer embedding vectors using an embedding engine
- Receiving authentication answers from unverified users
- Generating unverified-user authentication answer embedding vectors
- Computing embedding space distance between vectors
- Computing similarity score based on distance
- Identifying unverified user as verified user if similarity score is above threshold
Potential Applications
This technology could be applied in various industries such as banking, e-commerce, and cybersecurity for secure identity authentication processes.
Problems Solved
This technology solves the problem of unauthorized access to sensitive information by accurately verifying the identity of users through authentication answers.
Benefits
The benefits of this technology include enhanced security, reduced risk of identity theft, and improved user verification processes.
Potential Commercial Applications
"Enhancing Identity Authentication Processes in Banking and E-commerce"
Possible Prior Art
There may be prior art related to identity authentication systems using embedding vectors for verification purposes.
Unanswered Questions
How does this technology handle cases of multiple users sharing similar authentication answers?
The technology uses advanced algorithms to analyze various factors in addition to the authentication answers to accurately verify the identity of users.
What measures are in place to prevent spoofing or manipulation of the authentication answers?
The system may incorporate additional security measures such as multi-factor authentication or biometric verification to prevent spoofing or manipulation of authentication answers.
Original Abstract Submitted
A method and system performed by a processor includes receiving from a verified user, an authentication answer for identity-authentication questions. An authentication answer embedding vector in a textual embedding space is generated by inputting each authentication answer into an embedding engine and stored. An unverified-user authentication answer is received, in response to posing to the unverified user, a specific identity-authentication question of the verified user. An unverified-user authentication answer embedding vector is generated using the embedding engine. An embedding space distance is computed between the unverified-user authentication answer embedding vector and the authentication answer embedding vector for the specific identity-authentication question of the verified user posed to the unverified user. A similarity score based on the embedding space distance is computed. The unverified user is identified as the verified user when the similarity score is higher than a predefined threshold score.