Capital one services, llc (20240112178). UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE simplified abstract

From WikiPatents
Jump to navigation Jump to search

UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE

Organization Name

capital one services, llc

Inventor(s)

James Zarakas of Centreville VA (US)

Molly Johnson of Alexandria VA (US)

Robert Perry of Ashburn VA (US)

Adam Koeppel of Washington DC (US)

Tyler Locke of Washington DC (US)

UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240112178 titled 'UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE

Simplified Explanation

The patent application describes a transaction card with NFC, security, and wireless components for secure access to applications.

  • NFC component receives signal from user device
  • Security component generates encrypted code
  • Wireless component sends encrypted code to user device for authentication

Potential Applications

This technology can be applied in various industries such as banking, retail, and healthcare for secure access to sensitive information and transactions.

Problems Solved

This technology addresses the issue of unauthorized access to secure applications and data by providing a secure authentication method using encrypted codes.

Benefits

The benefits of this technology include enhanced security, ease of use for users, and protection against fraud and data breaches.

Potential Commercial Applications

The potential commercial applications of this technology include secure payment systems, access control systems, and identity verification solutions.

Possible Prior Art

One possible prior art for this technology could be existing NFC-based authentication systems used in mobile devices and contactless payment cards.

Unanswered Questions

== How does this technology compare to traditional authentication methods like passwords or biometrics? This article does not provide a direct comparison between this technology and traditional authentication methods.

== What are the potential limitations or vulnerabilities of this technology? This article does not address the potential limitations or vulnerabilities of this technology.


Original Abstract Submitted

a transaction card includes a near-field communication (nfc) component, a security component, a wireless component, one or more memories, and one or more processors communicatively coupled to the one or more memories. the device receives a signal from a user device attempting to access a secure application, and energizes the nfc component based on the signal received from the user device. the device causes the security component to generate an encrypted code based on the nfc component being energized, and provides, via the security component, the encrypted code to the wireless component. the device provides, via the wireless component, the encrypted code to the user device to permit the user device to utilize the encrypted code as authentication for accessing the secure application.