17942401. COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF

Organization Name

Capital One Services, LLC

Inventor(s)

Kevin Osborn of Newton Highlands MA (US)

Brian Mcclanahan of Hyattsville MD (US)

COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 17942401 titled 'COMPUTER-BASED SYSTEMS APPLYING TEXTUAL EMBEDDING SPACE SOFTWARE ENGINES TO AUTHENTICATION QUESTION AND ANSWERS FOR IDENTIFYING A USER AND METHODS OF USE THEREOF

Simplified Explanation

The patent application describes a method and system for identity authentication using authentication answer embedding vectors in a textual embedding space.

  • Receiving authentication answers from verified users
  • Generating authentication answer embedding vectors using an embedding engine
  • Receiving authentication answers from unverified users
  • Generating unverified-user authentication answer embedding vectors
  • Computing embedding space distance between vectors
  • Computing similarity score based on distance
  • Identifying unverified user as verified user if similarity score is above threshold

Potential Applications

This technology could be applied in various industries such as banking, e-commerce, and cybersecurity for secure identity authentication processes.

Problems Solved

This technology solves the problem of unauthorized access to sensitive information by accurately verifying the identity of users through authentication answers.

Benefits

The benefits of this technology include enhanced security, reduced risk of identity theft, and improved user verification processes.

Potential Commercial Applications

"Enhancing Identity Authentication Processes in Banking and E-commerce"

Possible Prior Art

There may be prior art related to identity authentication systems using embedding vectors for verification purposes.

Unanswered Questions

How does this technology handle cases of multiple users sharing similar authentication answers?

The technology uses advanced algorithms to analyze various factors in addition to the authentication answers to accurately verify the identity of users.

What measures are in place to prevent spoofing or manipulation of the authentication answers?

The system may incorporate additional security measures such as multi-factor authentication or biometric verification to prevent spoofing or manipulation of authentication answers.


Original Abstract Submitted

A method and system performed by a processor includes receiving from a verified user, an authentication answer for identity-authentication questions. An authentication answer embedding vector in a textual embedding space is generated by inputting each authentication answer into an embedding engine and stored. An unverified-user authentication answer is received, in response to posing to the unverified user, a specific identity-authentication question of the verified user. An unverified-user authentication answer embedding vector is generated using the embedding engine. An embedding space distance is computed between the unverified-user authentication answer embedding vector and the authentication answer embedding vector for the specific identity-authentication question of the verified user posed to the unverified user. A similarity score based on the embedding space distance is computed. The unverified user is identified as the verified user when the similarity score is higher than a predefined threshold score.