18662556. SECURE AUTHENTICATION simplified abstract (Capital One Services, LLC)
SECURE AUTHENTICATION
Organization Name
Inventor(s)
Emily Smith of Washington DC (US)
Erik Neighbour of Arlington VA (US)
SECURE AUTHENTICATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18662556 titled 'SECURE AUTHENTICATION
Simplified Explanation: This patent application describes a method for authenticating a user using an object associated with the user and a trusted device, instead of entering a password.
- The security device authenticates the user by using an object, such as a card, inserted into the device.
- The user can choose to authenticate via a trusted device, eliminating the need to enter a password.
- This method provides an alternative way for users to access secure systems without relying on passwords.
Key Features and Innovation:
- Authentication using an object associated with the user.
- Option to authenticate via a trusted device.
- Elimination of the need to enter a password for authentication.
Potential Applications: This technology can be applied in various industries such as banking, healthcare, and government agencies where secure access is crucial.
Problems Solved:
- Eliminates the need for users to remember complex passwords.
- Provides a more secure and convenient authentication method.
Benefits:
- Enhanced security for user authentication.
- Simplified user experience by eliminating the need for passwords.
- Increased user trust in secure systems.
Commercial Applications: This technology can be used in industries that require secure access control systems, such as financial institutions, healthcare facilities, and government organizations.
Prior Art: Prior art related to this technology may include research on alternative authentication methods and secure access control systems.
Frequently Updated Research: Stay informed about the latest advancements in user authentication technologies and secure access control systems to enhance the effectiveness of this innovation.
Questions about User Authentication: 1. How does this technology improve user experience compared to traditional password-based authentication methods? 2. What are the potential security risks associated with using objects for user authentication?
Original Abstract Submitted
Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.