Capital one services, llc (20240114032). SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE

Organization Name

capital one services, llc

Inventor(s)

David Kelly Wurmfeld of Fairfax VA (US)

SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240114032 titled 'SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE

Simplified Explanation

The patent application describes a system that enhances security by utilizing a two-factor authentication process involving a push notification with an authentication key and a unique beam profile recognition system.

  • The system receives first level authentication data from a user and grants first level access to a secure device.
  • A push notification with a second factor authentication key is sent to the user's device after successful first level authentication.
  • The user's device communicates wirelessly with the system, and the system analyzes the attenuated beam profile to verify the user's identity.
  • If the beam profile matches the stored profile, the second factor authentication key is associated with the user's login credentials.
  • The user enters the second factor authentication key, granting them second level access to the secure device.

Potential Applications

This technology can be applied in industries requiring high levels of security, such as banking, healthcare, and government agencies.

Problems Solved

This system addresses the issue of unauthorized access to secure devices by implementing a robust two-factor authentication process.

Benefits

The system provides an additional layer of security beyond traditional password-based authentication methods, reducing the risk of unauthorized access and data breaches.

Potential Commercial Applications

Commercial applications include secure access control systems for buildings, data centers, and sensitive equipment, as well as secure login systems for online platforms and applications.

Possible Prior Art

One possible prior art could be the use of biometric authentication methods as a second factor, such as fingerprint or facial recognition, in addition to traditional password-based authentication.

What are the specific technologies used in the beam profile recognition system described in the patent application?

The specific technologies used in the beam profile recognition system are not detailed in the abstract. Further information on the hardware and software components involved in analyzing and matching the attenuated beam profiles would be necessary to fully understand the implementation of this technology.

How does the system handle potential false positives or false negatives in the beam profile recognition process?

The abstract does not mention how the system handles potential false positives or false negatives in the beam profile recognition process. It would be important to know if there are any mechanisms in place to minimize errors in the authentication process and ensure accurate identification of users.


Original Abstract Submitted

a system may receive first level authentication data from a first user, authorize first level access to a secure device, and transmit a push notification including a second factor authentication key to a first user device responsive to first factor authentication data matching stored authentication data for the first user. the system may receive a wireless communication from the first user device attenuated by one or more beam attenuating materials to form a first attenuated beam profile. in response to a match of the first attenuated beam profile to a stored beam profile beyond a predetermined threshold, the system may associate the second factor authentication key as an authorized login credential for the first user. the system may receive the second factor authentication key from the first user and authorize the second factor authentication data to grant the first user second level access to the secure device.