18349681. AUTHENTICATION HARDENING WITH PROOF OF PROXIMITY OVER LOCAL CONNECTION simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

AUTHENTICATION HARDENING WITH PROOF OF PROXIMITY OVER LOCAL CONNECTION

Organization Name

Cisco Technology, Inc.

Inventor(s)

Jordan Neidlinger of Saline MI (US)

Benjamin Warren Freiband of Ann Arbor MI (US)

Kyle Mills of Ann Arbor MI (US)

Joshua King of Ann Arbor MI (US)

Marshall Anderson of Chicago IL (US)

Aparna Ashok of Duvall WA (US)

Brendan Lau of Ypsilanti MI (US)

Gursirat Singh of Mississauga (CA)

Dylan Miles Kite of Ann Arbor MI (US)

Robert Small of Ann Arbor MI (US)

Shayne Miel of Durham NC (US)

Richard Harang of Alexandria VA (US)

AUTHENTICATION HARDENING WITH PROOF OF PROXIMITY OVER LOCAL CONNECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18349681 titled 'AUTHENTICATION HARDENING WITH PROOF OF PROXIMITY OVER LOCAL CONNECTION

Simplified Explanation

The patent application describes a system where a user's identity is verified using multi-factor authentication involving a registered mobile device.

Key Features and Innovation

  • Request for two-factor authentication from a computing device.
  • Transmission of multi-factor authentication data from a server to the computing device.
  • Establishment of a short-distance wireless communication link between the computing device and a registered mobile device.
  • Transmission of encrypted data from the computing device to the registered mobile device via the wireless link.
  • Confirmation of correct data decryption at the server from the registered mobile device.
  • Provision of access to a service based on the confirmation.

Potential Applications

This technology can be applied in secure access control systems, online banking, e-commerce platforms, and other services requiring enhanced user authentication.

Problems Solved

This technology addresses the need for secure and reliable user authentication methods to prevent unauthorized access to sensitive information and services.

Benefits

The system provides an additional layer of security by using multi-factor authentication, enhancing user verification processes and reducing the risk of unauthorized access.

Commercial Applications

  • Secure access control systems
  • Online banking platforms
  • E-commerce websites
  • Secure data storage services

Prior Art

Readers can explore prior art related to multi-factor authentication systems, secure communication protocols, and mobile device integration in user verification processes.

Frequently Updated Research

Stay informed about advancements in multi-factor authentication technologies, secure communication protocols, and user authentication methods to enhance security measures in various industries.

Questions about Two-Factor Authentication

How does multi-factor authentication enhance user security?

Multi-factor authentication adds an extra layer of security by requiring multiple forms of verification, making it harder for unauthorized users to access sensitive information.

What are the potential drawbacks of using multi-factor authentication?

While multi-factor authentication enhances security, it can sometimes inconvenience users by requiring additional steps to access services.


Original Abstract Submitted

A device may receive, from a computing device, a request for a two-factor authentication of a user. A device may transmit, from a server to the computing device and based on the request, multi-factor authentication data to the computing device. A device may establish a short-distance wireless communication link between the computing device and a registered mobile device. A device may transmit, from the computing device and via the short-distance wireless communication link, encrypted data which is encrypted based on the multi-factor authentication data, to the registered mobile device. A device may receive, at the server and from the registered mobile device, a confirmation that corrected data was decrypted from the encrypted data. A device may provide, based on the confirmation, the user with access to a service via the computing device.