Capital one services, llc (20240349048). USER AUTHENTICATION simplified abstract
Contents
USER AUTHENTICATION
Organization Name
Inventor(s)
Rajko Ilincic of McLean VA (US)
Lin Ni Lisa Cheng of McLean VA (US)
Phoebe Atkins of McLean VA (US)
USER AUTHENTICATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240349048 titled 'USER AUTHENTICATION
The abstract describes methods and systems for secure communication between computing devices, where a mobile device can communicate with an untrusted device to send encrypted information to a server via the untrusted device's internet connection. The mobile device may encrypt information stored on it and transfer it to the untrusted device, which then sends it to the server.
- Mobile device communicates with untrusted device to send encrypted information to server.
- Untrusted device sends information to server using its internet connection.
- Mobile device encrypts information stored on it to prevent security risks.
- Untrusted device transfers encrypted information to server via network connection.
- Secure communication between devices is achieved through this method.
Potential Applications: - Secure data transfer between devices - Secure remote access to servers - Secure communication in public or untrusted environments
Problems Solved: - Preventing security risks associated with using untrusted devices - Ensuring secure communication between devices - Protecting sensitive information stored on mobile devices
Benefits: - Enhanced security for data transfer - Increased privacy protection for users - Secure communication in potentially risky environments
Commercial Applications: Secure communication technologies can be utilized in industries such as finance, healthcare, and government agencies to ensure secure data transfer and communication.
Questions about Secure Communication Between Computing Devices:
1. How does the encryption process work to secure information transfer between devices?
- The encryption process involves encoding the information in a way that only authorized parties can decrypt and access it.
2. What are the potential risks of using untrusted devices for communication?
- Untrusted devices may pose security risks such as data interception, unauthorized access, and malware threats.
Original Abstract Submitted
methods and systems are disclosed herein for secure communication between computing devices. a mobile device may communicate with an untrusted device to cause the untrusted device to send information (e.g., encrypted information that the untrusted device is unable to decrypt) to a server using an internet connection of the untrusted device. the mobile device may have limited or no access to the internet. to prevent potential security risks associated with using a public or untrusted device, the mobile device may encrypt information stored on the mobile device (e.g., stored in a mobile application associated with the server), send it to the untrusted device (e.g., by displaying a qr code to a camera of the untrusted device), and the untrusted device may send the information to the server via a network connection of the untrusted device.