Credential validation using multiple computing devices

Inactive Publication Date: 2016-04-14
KYNDRYL INC
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the use of common security questions and answers are for the convenience of the users, and not for the security of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credential validation using multiple computing devices
  • Credential validation using multiple computing devices
  • Credential validation using multiple computing devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0007]Embodiments of the present invention recognize that hackers are using publically available information to reset user passwords to gain access to accounts. Embodiments of the present invention further recognize that exposing a challenge question to the public provides a hacker with an opportunity to spoof a system by finding personal or publically available information to overcome the challenge question.

[0008]Embodiments of the present invention provide the capability to utilize multiple user owned devices, linking them in an ordered method, to bolster security through additional scrutiny in credential validation. Embodiments of the present invention further provide the capability to present challenge questions to specific user owned devices, and receive responses from the specific user owned devices in a predetermined order. Embodiments of the present invention further provide the capability to authenticate a user's credentials based, at least in part, on the response, the dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A tool for credential validation using multiple computing devices. The tool selects at least one challenge question. The tool selects one or more user owned devices, wherein selecting the one or more user owned devices includes querying a database for each user owned device associated with a user account. The tool selects at least one device order, based, at least in part, on a level of security desired in credential validation. The tool presents the at least one challenge question to the one or more user owned devices, wherein the at least one challenge question includes the at least one device order for returning at least one response. The tools determines whether the at least one response received from the one or more user owned devices is a correct response relative to the at least one challenge question and the at least one device order.

Description

BACKGROUND OF THE INVENTION[0001]The present invention relates generally to cyber security, and more particularly to credential validation across multiple computing devices.[0002]Some computing systems that utilize a password to authenticate a user provide the capability to reset a forgotten password if the user can correctly answer one or more private security questions, such as “What is your mother's maiden name”. While this security feature provides a way to verify the identity of the user, the security questions asked are often answered by information that is publicly available, and as such, are easily circumvented. Additionally, harvesting programs designed to gather this information from various public sources are often employed by computer hackers to obtain answers to commonly asked security questions. Therefore, the use of common security questions and answers are for the convenience of the users, and not for the security of the system.SUMMARY[0003]Aspects of an embodiment o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/31H04L29/06
CPCH04L63/105G06F21/316H04L63/083G06F21/31G06F2221/2103H04L63/08
Inventor BOSS, GREGORY J.JONES, ANDREW R.LINGAFELT, CHARLES S.MCCONNELL, KEVIN C.MOORE, JR., JOHN E.
Owner KYNDRYL INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products