18511329. AUTHENTICATING A USER DEVICE VIA A MONITORING DEVICE simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

AUTHENTICATING A USER DEVICE VIA A MONITORING DEVICE

Organization Name

Capital One Services, LLC

Inventor(s)

Joshua Edwards of Philadelphia PA (US)

Adam Vukich of Springfield VA (US)

Abdelkadar M’Hamed Benkreira of Washington DC (US)

AUTHENTICATING A USER DEVICE VIA A MONITORING DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18511329 titled 'AUTHENTICATING A USER DEVICE VIA A MONITORING DEVICE

Simplified Explanation

The patent application describes a system where a server device authenticates a user based on the location of their device and a separate monitoring device, creating a session token for access to server resources.

  • Server device receives session initiation request and user device location information
  • Server device receives authentication request and monitoring device location information
  • Server device authenticates user based on device locations
  • Server device creates session token for user device access
  • Session token enables user device to access server resources

Potential Applications

This technology could be applied in various industries such as:

  • Secure access control systems
  • Location-based authentication services
  • Remote monitoring and control systems

Problems Solved

This technology addresses issues such as:

  • Unauthorized access to server resources
  • Ensuring user identity and device proximity
  • Enhancing security measures for sensitive data

Benefits

The benefits of this technology include:

  • Improved user authentication process
  • Enhanced security for server resources
  • Efficient and reliable access control mechanisms

Potential Commercial Applications

A potential commercial application for this technology could be:

  • Secure remote access solutions for businesses

Possible Prior Art

One possible prior art for this technology could be:

  • Location-based authentication systems in the field of cybersecurity

Unanswered Questions

How does this technology handle situations where the user and monitoring devices are not collocated?

The abstract does not provide information on how the system deals with scenarios where the user and monitoring devices are not in the same location. This aspect of the technology's functionality would be important to understand for its practical implementation.

What measures are in place to prevent unauthorized access to the session token by malicious actors?

The abstract does not detail the security measures in place to protect the session token from being intercepted or accessed by unauthorized parties. Understanding the encryption or authentication protocols used to safeguard the token would be crucial for evaluating the system's overall security.


Original Abstract Submitted

A server device receives, from a user device, a session initiation request and information identifying a location of the user device, and receives, from a monitoring device that is separate from the user device, an authentication request and information identifying a location of the monitoring device. The server device processes the session initiation request and the authentication request to authenticate a user of the user device, and determines, based on the location of the user device and the location of the monitoring device, that the user device and the monitoring device are collocated. The server device creates, after authenticating the user of the user device and determining that user device and the monitoring device are collocated, a session token, and sends the session token to the user device to enable the user device to access at least one resource of the server device.