17949463. SECURITY MECHANISMS FOR SKILL SQUATTING simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

SECURITY MECHANISMS FOR SKILL SQUATTING

Organization Name

Capital One Services, LLC

Inventor(s)

Joshua Edwards of Philadelphia PA (US)

Andrea Montealegre of Arlington VA (US)

Salik Shah of Washington DC (US)

SECURITY MECHANISMS FOR SKILL SQUATTING - A simplified explanation of the abstract

This abstract first appeared for US patent application 17949463 titled 'SECURITY MECHANISMS FOR SKILL SQUATTING

Simplified Explanation

The patent application abstract describes a system, method, and computer program product for protecting a device from skill squatting by verifying the legitimacy of a skill to a user before operating the skill based on user instructions. The skill retrieves unique and non-confidential information related to the user or the device, presents it to the user for verification, and allows the user to operate the skill by voice or audio instructions upon successful verification.

  • Verification of skill legitimacy before operation
  • Retrieval of unique and non-confidential information for verification
  • User interaction through voice or audio instructions

Potential Applications

This technology could be applied in:

  • Smart home devices
  • Virtual assistants
  • IoT devices

Problems Solved

This technology solves the following problems:

  • Unauthorized access to devices
  • Protecting user privacy
  • Preventing skill squatting

Benefits

The benefits of this technology include:

  • Enhanced security for devices
  • User verification for skill operation
  • Improved user experience

Potential Commercial Applications

The potential commercial applications of this technology include:

  • Security software companies
  • Smart device manufacturers
  • Virtual assistant providers

Possible Prior Art

One possible prior art for this technology could be:

  • Voice recognition systems
  • Two-factor authentication methods

Unanswered Questions

How does the system handle multiple users accessing the same device?

The system may need to have mechanisms in place to distinguish between different users and their unique information for verification purposes.

What happens if the unique information for verification is compromised?

In the event of a data breach or compromise, the system may need to have protocols for updating and changing the verification process to maintain security.


Original Abstract Submitted

Disclosed herein are system, method, and computer program product embodiments for protecting a device from skill squatting by verifying the legitimacy of a skill to a user before operating the skill based on user instructions. Upon receiving an audio signal from a user to operate a skill on a device, the skill can retrieve unique and non-confidential information related to the user or the device, and further present the unique and non-confidential information to the user such that the information is used to verify the legitimacy of the skill. Upon a verification of the legitimacy of the skill, the user can operate the skill by voice or audio instructions.