Patent Spotlight - IoT registration,?authentication, and edge security.?

Patent Spotlight - IoT registration,?authentication, and edge security.?

Technology Focus Area:??

Groundbreaking new technology in authentication security systems, particularly focusing on an edge and low resource devices replacing passwords and credentials with transient, one-time-use communication cocoons.?

Brief on challenges it addresses:?

The invention described addresses several challenges present in traditional authentication systems:?

  1. Vulnerability of Stored Credentials: Traditional systems rely on stored usernames, passwords, or tokens on servers, which are vulnerable to breaches and unauthorized access. By eliminating the need for stored credentials, the invention mitigates this risk.?

  1. Predictability and Hacking Attempts: Attackers often attempt to predict or hack passwords or tokens by exploiting patterns or weaknesses. By using dynamic variable values and algorithmic functions on the client device, each authentication request is unique, making it difficult for attackers to predict or hack the system.?

  1. Inadequate Protection from Cybercrime: Conventional authentication systems, including those using biometrics, still rely on the basic principle of matching tokens (passwords or biometric data), which can be compromised. The invention provides a higher level of security by distributing the authentication process to the client device and eliminating stored credentials on the server.?

  1. User Convenience and Usability: Traditional authentication methods sometimes sacrifice user convenience for security, leading to cumbersome processes. By abandoning matching tokens for transient random numbers and math the user experience is vastly eased while simultaneously raising security to a quantum level with new tools and pre-emptive mitigation and response.??

  1. Need for Secure Data Transmission: With this invention, transmitting sensitive credentials is eliminated, reducing the risk of interception and unauthorized access.?

Brief on technology / methodology / approach in patent:?

The patent introduces a novel authentication method devoid of stored usernames, passwords, or tokens. It relies on algorithmic functions and dynamically generated variables from both the server and device during device activity. The process verifies the legitimacy of every individual command before execution. Commands reaching the device that fail are sent to the server for analysis. This ‘failed commands history’ is used in a ML and AI algorithm to identify threat vector seriousness and then automatically initiate mitigation strategies prior to compromise. In simple terms it turns all connected edge devices into nodes of a neural network for system-wide real-time DEFCON status-response.??

What is the Novelty / Uniqueness of this approach:?

What makes this unique is how it uses transient numbers, replacing passwords on edge devices. Without the ability to connect to a device via passwords, bad actors simply can’t compromise a protected device. Additionally, every device reports every communication to the server for validation. Every command is handled as separate, individually unique, and discrete. This granular level security eliminates the vector of predictability or duplication of access credentials.??

The server’s monitoring (recording) of all activity on a device, either executed or failed, generates a huge resource of historical activity for analysis and prediction of attack vectors, while reducing the resources required for security on the device. This method can predict attacks and mitigate threats in real-time!??

What Markets or Industries Could Benefit from the Invention:?

This patent is OS and device agnostic as well as industry or application transparent. Simply stated; any application needing to protect connected devices can use the method. It is completely industry horizontal from the high school science experiment to nuclear power generation. Where there is a need for IoT security, this system will protect it.??

  • Consumer goods: nanny & security cameras, all smart home devices, refrigerators, lights, Echo, Nest, Alexa, entertainment, wearables, garage doors, locks, cars, etc.??
  • Military and Highly Sensitive: Personnel (soldier identity & access), weapons (security activation/deactivation and control), system edge devices (inventory, environmental sensors, and readiness) (facilities management), science and research, drones, battlefield devices and microdevices.??
  • Commercial (facilities management) (power grid security) and transportation, communications, manufacturing, automobile, and healthcare, retail and entertainment (Casino for example).??
  • Business and administration, Education, Federal, State, Local governments from anything from access to a camera or TV in a classroom to managing the snow clearing equipment at a state level. Manufacturing of aircraft, pharmaceuticals, legal and professional all who use edge devices and need security this meets the requirement. Transportation, such as traffic control.??

?About Bable’s Edge Inc.

Babel’s Edge is a patent focused business based on 19+ years of experience delivering information technology services to the US federal Government and Commercial clients. It holds the rights to license / sell this patent. Contact us through https://www.babelsedge.com/contact-us to get an in-depth briefing on this and other patents in our portfolio across domains like AI, Cybersecurity, Data Management and others.

The goal of this initiative is to support inventors monetize their patents by delivering to the industry a unique value proposition that is not readily available in the marketplace today. Our unique value proposition is that we are focused towards developing a “positive” approach towards generating revenue for individual patent holders. Visit us on www.babelsedge.com

要查看或添加评论,请登录

Babel's Edge的更多文章