Browse Prior Art Database

A method to enhance authentication by leveraging wearable device as secondary input device

IP.com Disclosure Number: IPCOM000242977D
Publication Date: 2015-Sep-04
Document File: 4 page(s) / 60K

Publishing Venue

The IP.com Prior Art Database

Abstract

The disclosure leverages wearable device as secondary input device to setup some behavior feature as secondary authentication credential.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 4

A method to enhance authentication by leveraging wearable device as secondary input device

Sometimes, the account of some communication tool will be stolen by some hacker. And then the hacker will often use the account to do fraud to the friends of the real owner of the communication tool.

It is a generally existing problem that how to clearly and conveniently identify if the real owner of the communication tool is using current tool.

This disclosure gives a innovative method to resolve above problem.

This disclosure leverages wearable device as secondary input device to setup some behavior feature as secondary authentication credential . For example, for wristband , user can set up wrist band clicking action pattern as a kind of authentication measure to enhance authentication ability.

Currently, wrist band has been already commonly used. Setting up clicking action as a kind of authentication measure is very simply and will not add user's cost. Meanwhile, this method can better protect user's privacy and property.

Claimed point : leveraging wearable device as secondary input device to enhance user's authentication reliability and identification reliability.

Currently, though most of communication tools have login password protection ability, they commonly do not have secondary authentication enhanced ability.

This disclosure leverage wearable device as secondary input device to setup some behavior feature as secondary authentication credential , below is a example of setting up wrist band clicking action as secondary authentication credential.

This example contains two parts:


1. user registers secondary authentication using pattern

1) user connect wrist band with a communication tool

2) enable secondary authentication in communication tool

3) user clicks wrist band, and communication tool record wrist band...