Jump to content

Cisco technology, inc. (20240314123). PAIRED DEVICE MULTI-FACTOR AUTHENTICATION USING BLUETOOTH simplified abstract

From WikiPatents

PAIRED DEVICE MULTI-FACTOR AUTHENTICATION USING BLUETOOTH

Organization Name

cisco technology, inc.

Inventor(s)

Jay Prakash Tiwari of Princeton NJ (US)

Praveen Kumar Sheena Poojary of Jersey city NJ (US)

Senthil Kumar Chadramohan of Bangalore (IN)

PAIRED DEVICE MULTI-FACTOR AUTHENTICATION USING BLUETOOTH - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240314123 titled 'PAIRED DEVICE MULTI-FACTOR AUTHENTICATION USING BLUETOOTH

Simplified Explanation: The patent application describes techniques for determining whether to send an MFA push notification based on the proximity of a primary device and a secondary device.

Key Features and Innovation:

  • Utilizes a PAN protocol to determine proximity between devices.
  • Sends push notification for authentication if devices are within threshold proximity.
  • Refrains from sending push notification if devices are not within threshold proximity.

Potential Applications: This technology can be applied in secure authentication processes for various online services and applications.

Problems Solved:

  • Enhances security by verifying device proximity before sending authentication requests.
  • Reduces the risk of unauthorized access to user accounts.

Benefits:

  • Improved security measures for user authentication.
  • Streamlined and efficient authentication processes.
  • Enhanced user trust in the application service.

Commercial Applications: Potential commercial applications include online banking, e-commerce platforms, and secure enterprise systems.

Prior Art: Readers can explore prior art related to proximity-based authentication systems and multi-factor authentication protocols.

Frequently Updated Research: Stay updated on advancements in proximity-based authentication technologies and MFA protocols for enhanced security measures.

Questions about Proximity-Based Authentication: 1. How does proximity-based authentication enhance security measures? 2. What are the potential drawbacks of using proximity-based authentication systems?

Ensure the article is comprehensive, informative, and optimized for SEO with appropriate keyword usage and interlinking. Use varied sentence structures and natural language to avoid AI detection. Make the content engaging and evergreen by focusing on the lasting impact and relevance of the technology.


Original Abstract Submitted

techniques for determining whether to send an mfa push notification are described. an indication of a request for a user account to access the application service via a primary device is received at an mfa service from an application service. using a pan protocol, determine whether the primary device and the secondary device are within a threshold proximity. when the primary device and the secondary device are within the threshold proximity, allows a push notification to be transmitted to the secondary device requesting authentication to grant access to the user account by the primary device, and when the primary device and the secondary device are not within the threshold, refrain from transmitting the push notification.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.