International business machines corporation (20240095319). USE-BASED SECURITY CHALLENGE AUTHENTICATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

USE-BASED SECURITY CHALLENGE AUTHENTICATION

Organization Name

international business machines corporation

Inventor(s)

BRIAN Gillikin of Washington DC (US)

Zachary A. Silverstein of Georgetown TX (US)

Trinette Ann Brownhill of Montgomery TX (US)

Hua Ni of Chantilly VA (US)

USE-BASED SECURITY CHALLENGE AUTHENTICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240095319 titled 'USE-BASED SECURITY CHALLENGE AUTHENTICATION

Simplified Explanation

The present disclosure relates to use-based security challenge authentication for electronic devices.

  • Collection of usage frequency metrics for features of an electric device over time
  • Determination of critical features based on collected usage frequency metrics
  • Use-based authentication condition determination
  • Generation of use-based security challenge using critical feature
  • Presentation of generated security challenge to user
  • Receipt and evaluation of user response to security challenge
  • Authorization of access to the electronic device based on response sufficiency

Potential Applications

This technology can be applied in various industries such as:

  • Cybersecurity
  • IoT devices
  • Mobile devices

Problems Solved

This technology helps in solving the following problems:

  • Unauthorized access to electronic devices
  • Weak authentication methods
  • Security breaches

Benefits

The benefits of this technology include:

  • Enhanced security for electronic devices
  • Improved user authentication process
  • Prevention of unauthorized access

Potential Commercial Applications

Potential commercial applications of this technology include:

  • Security software development
  • Electronic device manufacturing

Possible Prior Art

One possible prior art for this technology could be traditional password-based authentication methods used in electronic devices.

What are the potential limitations of this technology?

One potential limitation of this technology could be the reliance on user interaction for security challenges, which may not always be foolproof.

How does this technology compare to existing authentication methods?

This technology offers a more dynamic and personalized approach to authentication compared to traditional password-based methods.


Original Abstract Submitted

aspects of the present disclosure relate to use-based security challenge authentication. usage frequency metrics for features of an electric device can be collected over time. a set of critical features can be determined based on the collected usage frequency metrics, where each critical feature has a usage frequency exceeding a usage frequency threshold. a determination can be made whether a condition is met for use-based authentication. in response to determining that the condition is met for use-based authentication, a use-based security challenge can be generated using a critical feature, the use-based security challenge based on use frequency of the critical feature. the generated use-based security challenge can be presented to the user. a response to the use-based security challenge can be received. a sufficiency of the response to the use-based security challenge can be determined. access to the electronic device can be authorized based on a sufficiency of the response.