Capital one services, llc (20240112178). UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE simplified abstract
Contents
- 1 UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE
Organization Name
Inventor(s)
James Zarakas of Centreville VA (US)
Molly Johnson of Alexandria VA (US)
Robert Perry of Ashburn VA (US)
Adam Koeppel of Washington DC (US)
Tyler Locke of Washington DC (US)
UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240112178 titled 'UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE
Simplified Explanation
The patent application describes a transaction card with NFC, security, and wireless components for secure access to applications.
- NFC component receives signal from user device
- Security component generates encrypted code
- Wireless component sends encrypted code to user device for authentication
Potential Applications
This technology can be applied in various industries such as banking, retail, and healthcare for secure access to sensitive information and transactions.
Problems Solved
This technology addresses the issue of unauthorized access to secure applications and data by providing a secure authentication method using encrypted codes.
Benefits
The benefits of this technology include enhanced security, ease of use for users, and protection against fraud and data breaches.
Potential Commercial Applications
The potential commercial applications of this technology include secure payment systems, access control systems, and identity verification solutions.
Possible Prior Art
One possible prior art for this technology could be existing NFC-based authentication systems used in mobile devices and contactless payment cards.
Unanswered Questions
== How does this technology compare to traditional authentication methods like passwords or biometrics? This article does not provide a direct comparison between this technology and traditional authentication methods.
== What are the potential limitations or vulnerabilities of this technology? This article does not address the potential limitations or vulnerabilities of this technology.
Original Abstract Submitted
a transaction card includes a near-field communication (nfc) component, a security component, a wireless component, one or more memories, and one or more processors communicatively coupled to the one or more memories. the device receives a signal from a user device attempting to access a secure application, and energizes the nfc component based on the signal received from the user device. the device causes the security component to generate an encrypted code based on the nfc component being energized, and provides, via the security component, the encrypted code to the wireless component. the device provides, via the wireless component, the encrypted code to the user device to permit the user device to utilize the encrypted code as authentication for accessing the secure application.