Jump to content

18409143. MULTI-FACTOR AUTHENTICATION USING SYMBOLS simplified abstract (Capital One Services, LLC)

From WikiPatents

MULTI-FACTOR AUTHENTICATION USING SYMBOLS

Organization Name

Capital One Services, LLC

Inventor(s)

Vanck Zhu of New York NY (US)

MULTI-FACTOR AUTHENTICATION USING SYMBOLS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18409143 titled 'MULTI-FACTOR AUTHENTICATION USING SYMBOLS

The abstract of the patent application describes a method where a server device receives a credential and a request to access a resource from a first device. The server device then transmits an image containing a first symbol to a second device associated with the credential. The first device interacts with a user interface to form a second symbol, which is then sent back to the server device. Access to the resource is granted or denied based on the comparison of the first and second symbols.

  • Server device receives credential and access request from first device
  • Transmits image with first symbol to second device
  • First device interacts with user interface to form second symbol
  • Server device compares symbols to grant or deny access to resource

Potential Applications: - Secure access control systems - Two-factor authentication methods - User verification processes

Problems Solved: - Enhancing security measures for accessing resources - Preventing unauthorized access to sensitive information

Benefits: - Improved security for sensitive data - User-friendly authentication process - Enhanced protection against cyber threats

Commercial Applications: Title: Secure Access Control System for Enterprises This technology can be utilized in industries such as banking, healthcare, and government agencies to ensure secure access to confidential information. It can also be integrated into online platforms to enhance user verification processes and prevent unauthorized access.

Questions about the technology: 1. How does this technology improve security measures for accessing resources? 2. What industries can benefit the most from implementing this secure access control system?


Original Abstract Submitted

In some implementations, a server device may receive, from a first device, a credential and a request to access a resource. The server device may transmit, to a second device associated with the credential, an image that includes a first symbol composed of a set of elements. The server device may receive, from the first device, information associated with a second symbol formed via user interaction with a user interface of the first device. The second symbol may be formed by dragging elements, presented via the user interface, to an area of the user interface in which the second symbol is to be formed, or drawing elements in the area of the user interface in which the second symbol is to be formed. The server device may grant or denying access to the resource based on the first symbol and the information associated with the second symbol.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.