17791475. INTEGRATED IDENTITY MANAGEMENT AND MONITORING SYSTEM, APPARATUS, AND STORAGE MEDIUM simplified abstract (RAKUTEN MOBILE, INC.)

From WikiPatents
Jump to navigation Jump to search

INTEGRATED IDENTITY MANAGEMENT AND MONITORING SYSTEM, APPARATUS, AND STORAGE MEDIUM

Organization Name

RAKUTEN MOBILE, INC.

Inventor(s)

Jatin Wadhwa of Tokyo (JP)

Anshul Bhatt of Tokyo (JP)

Shiv Chandra Pathak of Tokyo (JP)

Sahitya Jain of Tokyo (JP)

INTEGRATED IDENTITY MANAGEMENT AND MONITORING SYSTEM, APPARATUS, AND STORAGE MEDIUM - A simplified explanation of the abstract

This abstract first appeared for US patent application 17791475 titled 'INTEGRATED IDENTITY MANAGEMENT AND MONITORING SYSTEM, APPARATUS, AND STORAGE MEDIUM

Simplified Explanation

The abstract describes a method for integrated authentication and monitoring using an electronic device. The method involves authenticating user credentials through an identity broker, generating detailed logs of authentication events, analyzing the logs, and generating alarms based on the analysis.

  • Integrated authentication and monitoring method:
   * Authenticate user credentials using an identity broker.
   * Identify an identity provider associated with the user credentials.
   * Generate detailed logs of authentication events.
   * Analyze the generated logs.
   * Generate alarms based on the analysis of the logs.

Potential Applications

The technology can be applied in various industries such as cybersecurity, financial services, healthcare, and government agencies to enhance security measures and monitor user activities effectively.

Problems Solved

1. Improved authentication process: By using an identity broker, the method ensures secure authentication of user credentials. 2. Enhanced monitoring capabilities: The detailed logs and alarms generated help in detecting and responding to security threats promptly.

Benefits

1. Increased security: By authenticating user credentials and monitoring events, the method enhances overall security measures. 2. Real-time alerts: The generation of alarms based on log analysis enables quick responses to potential security incidents.

Potential Commercial Applications

Enhanced authentication and monitoring technology for cybersecurity solutions: Optimizing Security Measures for Enhanced Protection.

Possible Prior Art

One possible prior art could be the use of identity brokers and detailed log analysis for authentication and monitoring purposes in various electronic devices and systems.

Unanswered Questions

How does this method compare to traditional authentication and monitoring systems?

The article does not provide a direct comparison between this method and traditional systems in terms of efficiency, effectiveness, and security measures.

What are the specific criteria for generating alarms based on log analysis?

The article does not specify the exact criteria or thresholds used for generating alarms based on the analysis of the generated logs.


Original Abstract Submitted

A method for integrated authentication and monitoring, executed by an electronic device, the method comprising: authenticating user credentials of a user using an identity broker, wherein the identity broker identifies an identity provider associated with the user credentials; generating detailed logs related to events associated with the authenticating; analyzing the generated logs; and generating an alarm based on the analyzing of the generated logs.