18145058. USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT

Organization Name

Capital One Services, LLC

Inventor(s)

John Fields of Henrico VA (US)

Bharath Bhushan Sreeravindra of Fremont CA (US)

Matthew Michael Burke of McLean VA (US)

USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 18145058 titled 'USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT

Simplified Explanation

The patent application describes a computing system that authenticates users before allowing blockchain functions and prevents brute force attacks by increasing network usage costs as authentication attempts fail.

Key Features and Innovation

  • Authentication of users before blockchain functions
  • Prevention of brute force attacks in decentralized computing systems
  • Use of smart contracts for user authentication
  • Increase in network usage costs as authentication fails
  • Utilization of biometric information for additional verification

Potential Applications

The technology can be applied in various industries such as finance, healthcare, and government for secure user authentication and protection against malicious attacks.

Problems Solved

The technology addresses the issues of unauthorized access, data breaches, and security vulnerabilities in decentralized computing systems.

Benefits

  • Enhanced security through cost-prohibitive brute force attacks
  • Improved user authentication with biometric verification
  • Protection of sensitive data in distributed computing environments

Commercial Applications

The technology can be utilized by banks, hospitals, and government agencies to secure user data, prevent unauthorized access, and ensure compliance with data protection regulations.

Prior Art

Readers can explore prior art related to user authentication, blockchain security, and decentralized computing systems to understand the evolution of similar technologies.

Frequently Updated Research

Stay updated on the latest advancements in user authentication, blockchain security, and decentralized computing systems to enhance the effectiveness of the technology.

Questions about User Authentication

How does the technology prevent brute force attacks?

The technology increases network usage costs as authentication attempts fail, making it cost-prohibitive for malicious actors to perform brute force attacks.

What are the potential applications of biometric information in user authentication?

Biometric information such as fingerprints, facial recognition, and voice recognition can provide additional verification and security when authentication is performed.


Original Abstract Submitted

In some aspects, a computing system may authenticate a user before blockchain functions may be performed and provide obstacles to prevent brute force attacks in decentralized computing systems or other distributed computing system environments. The computing system may use a smart contract to assist with authenticating a user. As authentication attempts fail, the computing system may increase a network usage cost associated with authentication. By doing so, the security of a computing system may be improved by making it cost-prohibitive for malicious actors to perform brute force attacks. Further, a computing system may use a variety of biometric information that may provide additional verification and security when authentication is performed.