Capital one services, llc (20240114032). SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE simplified abstract
Contents
- 1 SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE
Organization Name
Inventor(s)
David Kelly Wurmfeld of Fairfax VA (US)
SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240114032 titled 'SYSTEMS AND METHODS FOR PROVIDING ACCESS TO A SECURE DEVICE
Simplified Explanation
The patent application describes a system that enhances security by utilizing a two-factor authentication process involving a push notification with an authentication key and a unique beam profile recognition system.
- The system receives first level authentication data from a user and grants first level access to a secure device.
- A push notification with a second factor authentication key is sent to the user's device after successful first level authentication.
- The user's device communicates wirelessly with the system, and the system analyzes the attenuated beam profile to verify the user's identity.
- If the beam profile matches the stored profile, the second factor authentication key is associated with the user's login credentials.
- The user enters the second factor authentication key, granting them second level access to the secure device.
Potential Applications
This technology can be applied in industries requiring high levels of security, such as banking, healthcare, and government agencies.
Problems Solved
This system addresses the issue of unauthorized access to secure devices by implementing a robust two-factor authentication process.
Benefits
The system provides an additional layer of security beyond traditional password-based authentication methods, reducing the risk of unauthorized access and data breaches.
Potential Commercial Applications
Commercial applications include secure access control systems for buildings, data centers, and sensitive equipment, as well as secure login systems for online platforms and applications.
Possible Prior Art
One possible prior art could be the use of biometric authentication methods as a second factor, such as fingerprint or facial recognition, in addition to traditional password-based authentication.
What are the specific technologies used in the beam profile recognition system described in the patent application?
The specific technologies used in the beam profile recognition system are not detailed in the abstract. Further information on the hardware and software components involved in analyzing and matching the attenuated beam profiles would be necessary to fully understand the implementation of this technology.
How does the system handle potential false positives or false negatives in the beam profile recognition process?
The abstract does not mention how the system handles potential false positives or false negatives in the beam profile recognition process. It would be important to know if there are any mechanisms in place to minimize errors in the authentication process and ensure accurate identification of users.
Original Abstract Submitted
a system may receive first level authentication data from a first user, authorize first level access to a secure device, and transmit a push notification including a second factor authentication key to a first user device responsive to first factor authentication data matching stored authentication data for the first user. the system may receive a wireless communication from the first user device attenuated by one or more beam attenuating materials to form a first attenuated beam profile. in response to a match of the first attenuated beam profile to a stored beam profile beyond a predetermined threshold, the system may associate the second factor authentication key as an authorized login credential for the first user. the system may receive the second factor authentication key from the first user and authorize the second factor authentication data to grant the first user second level access to the secure device.