Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
INTEGRATING MULTIFACTOR AUTHENTICATION FOR SUSTAINABLE CYBERSECURITY IN CLOUD SOLUTIONS FOR SMALL AND MEDIUM INDUSTRIES (SMIS)
Extensive patent search conducted by a registered patent agent
Patent search done by experts in under 48hrs
₹999
₹399
Abstract
Information
Inventors
Applicants
Specification
Documents
ORDINARY APPLICATION
Published
Filed on 6 November 2024
Abstract
This invention provides a cloud-based, AI-driven multifactor authentication framework specifically designed for SMIs. By combining password, biometric, and token-based authentication methods, the system offers adaptive security that adjusts to real-time risks. Scalable and affordable, this framework delivers robust cybersecurity tailored for small and medium industries, enhancing protection in cloud environments without significant financial or operational overhead.
Patent Information
Application ID | 202411085237 |
Invention Field | COMMUNICATION |
Date of Application | 06/11/2024 |
Publication Number | 47/2024 |
Inventors
Name | Address | Country | Nationality |
---|---|---|---|
DR. MANJOT KAUR | LOVELY PROFESSIONAL UNIVERSITY, JALANDHAR-DELHI G.T. ROAD, PHAGWARA, PUNJAB-144 411, INDIA. | India | India |
DR. NAVNEET KAUR | LOVELY PROFESSIONAL UNIVERSITY, JALANDHAR-DELHI G.T. ROAD, PHAGWARA, PUNJAB-144 411, INDIA. | India | India |
Applicants
Name | Address | Country | Nationality |
---|---|---|---|
LOVELY PROFESSIONAL UNIVERSITY | JALANDHAR-DELHI G.T. ROAD, PHAGWARA, PUNJAB-144 411, INDIA. | India | India |
Specification
Description:FIELD OF THE INVENTION
This invention relates to cybersecurity, specifically focusing on a cloud-based, multifactor authentication (MFA) framework designed for small and medium industries (SMIs). The invention integrates various layers of authentication, including AI-driven adaptive security, password protection, biometrics, and token-based mechanisms, aiming to deliver scalable, robust, and cost-effective cybersecurity solutions tailored to SMI needs.
BACKGROUND OF THE INVENTION
The rise of cloud computing has increased cybersecurity threats, particularly for small and medium industries (SMIs) that often lack the resources to deploy sophisticated security systems. Traditional multifactor authentication (MFA) frameworks are costly, complex, and often designed for larger enterprises, making them unsuitable for SMIs with limited budgets and technical expertise. Moreover, conventional static MFA systems fail to adapt to real-time risks, leaving organizations vulnerable to evolving threats. This invention addresses these challenges by providing an AI-driven, cloud-native MFA framework, enabling SMIs to implement advanced security measures without significant financial burden. By leveraging AI for adaptive security and integrating biometric and token-based authentication methods, the framework offers a customizable, sustainable solution that meets the specific needs of SMIs.
SUMMARY OF THE INVENTION
This summary is provided to introduce a selection of concepts, in a simplified format, that are further described in the detailed description of the invention.
This summary is neither intended to identify key or essential inventive concepts of the invention and nor is it intended for determining the scope of the invention.
To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
The invention provides a cloud-native, AI-driven MFA framework tailored for SMIs, integrating password, biometric, and token-based authentication to enhance cybersecurity. The adaptive authentication engine utilizes AI to assess real-time risk, adjusting security levels based on user behavior and threat analysis. Biometric integration supports fingerprint and facial recognition, enhancing security with minimal user friction, while token-based authentication provides an additional layer of security for sensitive operations. Designed to be cost-effective and scalable, the framework offers SMIs a flexible, easy-to-integrate solution, combining affordability with robust protection in cloud environments.
BRIEF DESCRIPTION OF THE DRAWINGS
The illustrated embodiments of the subject matter will be understood by reference to the drawings, wherein like parts are designated by like numerals throughout. The following description is intended only by way of example, and simply illustrates certain selected embodiments of devices, systems, and methods that are consistent with the subject matter as claimed herein, wherein:
FIGURE 1: ILLUSTRATES THE MULTIFACTOR AUTHENTICATION FRAMEWORK, SHOWCASING THE INTEGRATION OF PASSWORD, BIOMETRIC, AND TOKEN-BASED LAYERS.
The figures depict embodiments of the present subject matter for the purposes of illustration only. A person skilled in the art will easily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the disclosure described herein.
DETAILED DESCRIPTION OF THE INVENTION
The detailed description of various exemplary embodiments of the disclosure is described herein with reference to the accompanying drawings. It should be noted that the embodiments are described herein in such details as to clearly communicate the disclosure. However, the amount of details provided herein is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the present disclosure as defined by the appended claims.
It is also to be understood that various arrangements may be devised that, although not explicitly described or shown herein, embody the principles of the present disclosure. Moreover, all statements herein reciting principles, aspects, and embodiments of the present disclosure, as well as specific examples, are intended to encompass equivalents thereof.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms "a"," "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used herein, specify the presence of stated features, integers, steps, operations, elements and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components and/or groups thereof.
It should also be noted that in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed concurrently or may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
In addition, the descriptions of "first", "second", "third", and the like in the present invention are used for the purpose of description only, and are not to be construed as indicating or implying their relative importance or implicitly indicating the number of technical features indicated. Thus, features defining "first" and "second" may include at least one of the features, either explicitly or implicitly.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which example embodiments belong. It will be further understood that terms, e.g., those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The Integrating Multifactor Authentication framework for Sustainable Cybersecurity in Cloud Solutions for SMIs is designed to provide robust security by layering multiple authentication methods, including passwords, biometrics, and token-based verification. This framework addresses specific security challenges faced by SMIs, combining flexibility, affordability, and adaptability within a unified, cloud-native system.
The invention features an Adaptive Authentication Engine, powered by artificial intelligence, which monitors user behavior and dynamically adjusts security levels based on detected risk. When unusual or high-risk activities are observed, additional layers of authentication, such as biometric or token-based, are automatically triggered. This real-time adaptability reduces the likelihood of unauthorized access and enhances overall system resilience. Biometric integration supports fingerprint and facial recognition, ensuring user-friendly security measures that minimize friction while providing robust protection. Token-based authentication is included to enhance security further, with one-time passwords (OTPs) or physical tokens providing an additional layer of defense against unauthorized access.
The Cloud Native Security Framework ensures seamless integration with existing cloud infrastructures, making it scalable and straightforward to deploy within an SMI environment. Designed to be cost-effective, the framework does not require extensive hardware investment, making it accessible for organizations with limited resources. Each authentication layer is customizable, allowing SMIs to select and configure security components based on their operational needs. The system's real-time threat detection, enabled by AI, provides constant vigilance, identifying irregular behaviors and responding with enhanced security protocols to prevent unauthorized access.
, Claims:1. A cloud-based multifactor authentication framework for SMIs, comprising adaptive authentication, biometric, and token-based methods, designed to enhance cybersecurity while maintaining affordability and scalability.
2. The framework as claimed in Claim 1, wherein the adaptive authentication engine utilizes AI to assess real-time risk, dynamically adjusting authentication layers based on detected threats.
3. The framework as claimed in Claim 1, wherein biometric authentication includes fingerprint and facial recognition to provide secure and user-friendly access control.
4. The framework as claimed in Claim 1, wherein token-based authentication provides an additional layer of security through OTPs or physical tokens, protecting against unauthorized access.
5. A method for integrating multifactor authentication as claimed in Claim 1, involving password, biometric, and token-based security in a cloud-native framework, suitable for SMI environments.
6. The framework as claimed in Claim 1, wherein the cloud-native design allows seamless integration with existing cloud infrastructures, supporting scalability and easy deployment.
Documents
Name | Date |
---|---|
202411085237-COMPLETE SPECIFICATION [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-DECLARATION OF INVENTORSHIP (FORM 5) [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-DRAWINGS [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-EDUCATIONAL INSTITUTION(S) [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-EVIDENCE FOR REGISTRATION UNDER SSI [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-FORM 1 [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-FORM FOR SMALL ENTITY(FORM-28) [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-FORM-9 [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-POWER OF AUTHORITY [06-11-2024(online)].pdf | 06/11/2024 |
202411085237-REQUEST FOR EARLY PUBLICATION(FORM-9) [06-11-2024(online)].pdf | 06/11/2024 |
Talk To Experts
Calculators
Downloads
By continuing past this page, you agree to our Terms of Service,, Cookie Policy, Privacy Policy and Refund Policy © - Uber9 Business Process Services Private Limited. All rights reserved.
Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.
Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.