18663844. USER AUTHENTICATION simplified abstract (Capital One Services, LLC)
Contents
- 1 USER AUTHENTICATION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 USER AUTHENTICATION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Secure Communication
- 1.13 Original Abstract Submitted
USER AUTHENTICATION
Organization Name
Inventor(s)
Rajko Ilincic of McLean VA (US)
Lin Ni Lisa Cheng of McLean VA (US)
Phoebe Atkins of McLean VA (US)
USER AUTHENTICATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18663844 titled 'USER AUTHENTICATION
Simplified Explanation
This patent application describes a method for secure communication between computing devices, where a mobile device can send encrypted information to an untrusted device, which then forwards it to a server via an Internet connection.
Key Features and Innovation
- Secure communication between devices
- Use of untrusted devices to relay information securely
- Encryption of information stored on the mobile device
- Utilization of QR codes for transferring encrypted information
Potential Applications
This technology can be applied in various industries such as:
- Banking and finance for secure transactions
- Healthcare for transmitting sensitive patient data
- Government agencies for secure communication
Problems Solved
- Mitigating security risks associated with using untrusted devices
- Ensuring secure transmission of sensitive information
- Providing a solution for devices with limited Internet access
Benefits
- Enhanced security for communication between devices
- Efficient transfer of encrypted information
- Flexibility in using different types of devices for communication
Commercial Applications
The technology can be utilized in industries requiring secure communication, such as:
- Financial institutions for secure transactions
- Healthcare organizations for transmitting patient data securely
- Government agencies for confidential communication
Prior Art
Readers can explore prior art related to secure communication methods and systems in the field of cybersecurity and data encryption.
Frequently Updated Research
Stay informed about the latest advancements in secure communication technologies and encryption methods to enhance data protection.
Questions about Secure Communication
How does this technology ensure the security of transmitted information?
This technology ensures security by encrypting information stored on the mobile device before transferring it to the untrusted device, which then forwards it to the server securely.
What are the potential risks associated with using untrusted devices for communication?
The main risk is the potential exposure of sensitive information to unauthorized parties if the untrusted device is compromised.
Original Abstract Submitted
Methods and systems are disclosed herein for secure communication between computing devices. A mobile device may communicate with an untrusted device to cause the untrusted device to send information (e.g., encrypted information that the untrusted device is unable to decrypt) to a server using an Internet connection of the untrusted device. The mobile device may have limited or no access to the Internet. To prevent potential security risks associated with using a public or untrusted device, the mobile device may encrypt information stored on the mobile device (e.g., stored in a mobile application associated with the server), send it to the untrusted device (e.g., by displaying a QR code to a camera of the untrusted device), and the untrusted device may send the information to the server via a network connection of the untrusted device.