18156974. Risk-Based Factor Selection simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

Risk-Based Factor Selection

Organization Name

Cisco Technology, Inc.

Inventor(s)

Shayne Miel of Durham NC (US)

Joshua Terry of Round Rock TX (US)

Richard Harang of Alexandria VA (US)

Kevin Tyler Burchfield of Ypsilanti MI (US)

Gillian Gacusan of Austin TX (US)

Patrick Mcmahon of Dexter MI (US)

Robert Small of Ann Arbor MI (US)

Jake Ingman of Saint Paul MI (US)

Risk-Based Factor Selection - A simplified explanation of the abstract

This abstract first appeared for US patent application 18156974 titled 'Risk-Based Factor Selection

The present technology involves adapting an authentication method in response to a potential attack on the system.

  • Authentication provider can detect ongoing attacks on authentication requests.
  • Contextual information from the access device is used to identify potential attacks.
  • An alternative authentication technique is implemented to counter the ongoing attack.
  • Users are required to authenticate using the less vulnerable alternative method.
  • This innovation enhances security by dynamically adjusting authentication methods.

Potential Applications: - Cybersecurity systems - Online banking platforms - E-commerce websites - Government agencies - Healthcare systems

Problems Solved: - Mitigating ongoing attacks on authentication systems - Enhancing overall security measures - Protecting user data and sensitive information

Benefits: - Improved security against potential attacks - Dynamic adaptation to evolving threats - Enhanced user trust and confidence in the system

Commercial Applications: Title: "Dynamic Authentication System for Enhanced Security" This technology can be utilized by cybersecurity firms to offer advanced authentication solutions to clients in various industries. It can also be integrated into existing security systems to bolster protection against cyber threats.

Questions about Dynamic Authentication Systems: 1. How does this technology differ from traditional authentication methods? This technology differs by dynamically adjusting authentication techniques based on ongoing attack detection, providing enhanced security measures.

2. What are the key benefits of implementing this dynamic authentication system? The key benefits include improved security against potential attacks, dynamic adaptation to evolving threats, and enhanced user trust in the system.


Original Abstract Submitted

The present technology provides for altering an authentication technique in response to a detection of a possible attack to which the authentication technique is vulnerable. An authentication provider can receive an authentication request to authenticate to a first resource, where the authentication to the first resource is permitted using a particular authentication technique, includes contextual information associated with the first access device and information identifying the first resource. Based on the contextual information, the authentication provider can determine that the authentication request is subject to an ongoing attack, and determine, an alternative authentication technique that is less vulnerable to the ongoing attack than the particular authentication technique. The authentication provider can require the first user account to authenticate with the first resource using the alternative authentication technique that is less vulnerable to the ongoing attack than the particular authentication technique.