Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Multi-factor authentication techniques

A technology for verifying information and verifying components, which is applied in the field of multi-factor verification technology and can solve problems such as theft of user names, passwords and mobile IDs

Active Publication Date: 2016-01-20
BOOKIT OY
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another problem is that the combination of username, password and mobile ID can be stolen from a legitimate user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-factor authentication techniques
  • Multi-factor authentication techniques
  • Multi-factor authentication techniques

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] 1. Typical scenarios that can be verified

[0034] figure 1 , Figure 2A with Figure 2B Shows how embodiments of the invention can be configured to cooperate with other legal entities to form a composite framework that facilitates provision of services and payments. The following description of this composite framework will illustrate various perspectives on validation. One point of view is that modern e-commerce involves multiple cooperative entities, and naturally involves many mutual verification issues. Another point to make is that there are many different situations that have different requirements for the verification process, especially with regard to security and convenience, which should be properly balanced. Another point to make is that although a large number of entities are involved, it is still possible for a centralized authentication server to perform authentication for many or all of these entities.

[0035] in particular, figure 1 , Figure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication technique with a teaching phase and authentication phase. In the teaching phase, authentication information is collected for a user in at least two categories, wherein one category relates to measurable physical characteristics of the user, another category relates to communication resources available to the user; and a third category relates to knowledge possessed by the user. In the authentication phase (7-10, and the like, 7-44), some of the collected authentication information is used to formulate challenge(s) (7-10, and the like,7-24; 7-62) for presentation to the user. Response(s) to the formulated challenge(s) is / are received from the user and correctness of the received response is determined based at least partially on comparison (7-44, 7-66) with at least a portion of the collected authentication information. A correctness metric is calculated for the response(s). The user is authenticated if the correctness metric meets or exceeds a first threshold value.

Description

[0001] Patent case information [0002] This application claims priority to US Patent Application Serial No. 13 / 800,641, filed March 13, 2013, entitled "Multi-Factor Authentication Technology." The contents of the above-identified parent application are hereby incorporated by reference. technical field [0003] The invention relates to authentication in telecommunication systems. Authentication can be performed to verify the identity of the user, and optionally other parameters such as address. Background technique [0004] Several authentication schemes have been developed to authenticate users of data processing devices or communication terminals. One known authentication scheme involves a teach-in phase in which setting up of a new user account involves teaching the authentication element a username (login name) and password. The subsequent authentication phase consists of requesting the user to enter a username-password combination. If the entered username-password ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/40G06Q20/40
CPCH04L63/0861H04L2463/082
Inventor 尤卡·萨洛宁
Owner BOOKIT OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products