International business machines corporation (20240095319). USE-BASED SECURITY CHALLENGE AUTHENTICATION simplified abstract
Contents
- 1 USE-BASED SECURITY CHALLENGE AUTHENTICATION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 USE-BASED SECURITY CHALLENGE AUTHENTICATION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
USE-BASED SECURITY CHALLENGE AUTHENTICATION
Organization Name
international business machines corporation
Inventor(s)
BRIAN Gillikin of Washington DC (US)
Zachary A. Silverstein of Georgetown TX (US)
Trinette Ann Brownhill of Montgomery TX (US)
USE-BASED SECURITY CHALLENGE AUTHENTICATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240095319 titled 'USE-BASED SECURITY CHALLENGE AUTHENTICATION
Simplified Explanation
The present disclosure relates to use-based security challenge authentication for electronic devices.
- Collection of usage frequency metrics for features of an electric device over time
- Determination of critical features based on collected usage frequency metrics
- Use-based authentication condition determination
- Generation of use-based security challenge using critical feature
- Presentation of generated security challenge to user
- Receipt and evaluation of user response to security challenge
- Authorization of access to the electronic device based on response sufficiency
Potential Applications
This technology can be applied in various industries such as:
- Cybersecurity
- IoT devices
- Mobile devices
Problems Solved
This technology helps in solving the following problems:
- Unauthorized access to electronic devices
- Weak authentication methods
- Security breaches
Benefits
The benefits of this technology include:
- Enhanced security for electronic devices
- Improved user authentication process
- Prevention of unauthorized access
Potential Commercial Applications
Potential commercial applications of this technology include:
- Security software development
- Electronic device manufacturing
Possible Prior Art
One possible prior art for this technology could be traditional password-based authentication methods used in electronic devices.
What are the potential limitations of this technology?
One potential limitation of this technology could be the reliance on user interaction for security challenges, which may not always be foolproof.
How does this technology compare to existing authentication methods?
This technology offers a more dynamic and personalized approach to authentication compared to traditional password-based methods.
Original Abstract Submitted
aspects of the present disclosure relate to use-based security challenge authentication. usage frequency metrics for features of an electric device can be collected over time. a set of critical features can be determined based on the collected usage frequency metrics, where each critical feature has a usage frequency exceeding a usage frequency threshold. a determination can be made whether a condition is met for use-based authentication. in response to determining that the condition is met for use-based authentication, a use-based security challenge can be generated using a critical feature, the use-based security challenge based on use frequency of the critical feature. the generated use-based security challenge can be presented to the user. a response to the use-based security challenge can be received. a sufficiency of the response to the use-based security challenge can be determined. access to the electronic device can be authorized based on a sufficiency of the response.