18409143. MULTI-FACTOR AUTHENTICATION USING SYMBOLS simplified abstract (Capital One Services, LLC)
MULTI-FACTOR AUTHENTICATION USING SYMBOLS
Organization Name
Inventor(s)
MULTI-FACTOR AUTHENTICATION USING SYMBOLS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18409143 titled 'MULTI-FACTOR AUTHENTICATION USING SYMBOLS
The abstract of the patent application describes a method where a server device receives a credential and a request to access a resource from a first device. The server device then transmits an image containing a first symbol to a second device associated with the credential. The first device interacts with a user interface to form a second symbol, which is then sent back to the server device. Access to the resource is granted or denied based on the comparison of the first and second symbols.
- Server device receives credential and access request from first device
- Transmits image with first symbol to second device
- First device interacts with user interface to form second symbol
- Server device compares symbols to grant or deny access to resource
Potential Applications: - Secure access control systems - Two-factor authentication methods - User verification processes
Problems Solved: - Enhancing security measures for accessing resources - Preventing unauthorized access to sensitive information
Benefits: - Improved security for sensitive data - User-friendly authentication process - Enhanced protection against cyber threats
Commercial Applications: Title: Secure Access Control System for Enterprises This technology can be utilized in industries such as banking, healthcare, and government agencies to ensure secure access to confidential information. It can also be integrated into online platforms to enhance user verification processes and prevent unauthorized access.
Questions about the technology: 1. How does this technology improve security measures for accessing resources? 2. What industries can benefit the most from implementing this secure access control system?
Original Abstract Submitted
In some implementations, a server device may receive, from a first device, a credential and a request to access a resource. The server device may transmit, to a second device associated with the credential, an image that includes a first symbol composed of a set of elements. The server device may receive, from the first device, information associated with a second symbol formed via user interaction with a user interface of the first device. The second symbol may be formed by dragging elements, presented via the user interface, to an area of the user interface in which the second symbol is to be formed, or drawing elements in the area of the user interface in which the second symbol is to be formed. The server device may grant or denying access to the resource based on the first symbol and the information associated with the second symbol.