18145058. USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT simplified abstract (Capital One Services, LLC)
Contents
- 1 USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about User Authentication
- 1.13 Original Abstract Submitted
USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT
Organization Name
Inventor(s)
John Fields of Henrico VA (US)
Bharath Bhushan Sreeravindra of Fremont CA (US)
Matthew Michael Burke of McLean VA (US)
USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT - A simplified explanation of the abstract
This abstract first appeared for US patent application 18145058 titled 'USER AUTHENTICATION IN DECENTRALIZED COMPUTING SYSTEM ENVIRONMENT
Simplified Explanation
The patent application describes a computing system that authenticates users before allowing blockchain functions and prevents brute force attacks by increasing network usage costs as authentication attempts fail.
Key Features and Innovation
- Authentication of users before blockchain functions
- Prevention of brute force attacks in decentralized computing systems
- Use of smart contracts for user authentication
- Increase in network usage costs as authentication fails
- Utilization of biometric information for additional verification
Potential Applications
The technology can be applied in various industries such as finance, healthcare, and government for secure user authentication and protection against malicious attacks.
Problems Solved
The technology addresses the issues of unauthorized access, data breaches, and security vulnerabilities in decentralized computing systems.
Benefits
- Enhanced security through cost-prohibitive brute force attacks
- Improved user authentication with biometric verification
- Protection of sensitive data in distributed computing environments
Commercial Applications
The technology can be utilized by banks, hospitals, and government agencies to secure user data, prevent unauthorized access, and ensure compliance with data protection regulations.
Prior Art
Readers can explore prior art related to user authentication, blockchain security, and decentralized computing systems to understand the evolution of similar technologies.
Frequently Updated Research
Stay updated on the latest advancements in user authentication, blockchain security, and decentralized computing systems to enhance the effectiveness of the technology.
Questions about User Authentication
How does the technology prevent brute force attacks?
The technology increases network usage costs as authentication attempts fail, making it cost-prohibitive for malicious actors to perform brute force attacks.
What are the potential applications of biometric information in user authentication?
Biometric information such as fingerprints, facial recognition, and voice recognition can provide additional verification and security when authentication is performed.
Original Abstract Submitted
In some aspects, a computing system may authenticate a user before blockchain functions may be performed and provide obstacles to prevent brute force attacks in decentralized computing systems or other distributed computing system environments. The computing system may use a smart contract to assist with authenticating a user. As authentication attempts fail, the computing system may increase a network usage cost associated with authentication. By doing so, the security of a computing system may be improved by making it cost-prohibitive for malicious actors to perform brute force attacks. Further, a computing system may use a variety of biometric information that may provide additional verification and security when authentication is performed.