Cognitive Augmentation

Executive Summary

Many of the IT professionals discussing the topic of computer system access management agree that a user's true identity is the new authentication perimeter. More and more of them seem to agree that cognitive/behavioral biometric analysis may prove to be the key to successful continuous authentication mechanisms. The traditional approach to enterprise security has focused on keeping users out by employing strong infrastructure firewalls as security perimeters. However, today businesses must accommodate partners and customers demanding mobile access from wherever they are and whatever device they are utilizing at that moment. It is more important than ever to know the true identity of the person your system is giving access to, and that the system can trust that the person who was granted access is the one in command of the active logon session when it comes time to perform a transaction. It is also important to teach your computer system to make decisions relating to identity and access management to keep manual intervention to a minimum. A company must also have strong security systems in place to recognize and stop unauthorized users and other intruders from gaining access to the computer system. We create "Tools Of Thought" such as the two patents referred to previously, to assist you in more safely and productively reaching your company's desired level of success.

As mentioned previously, trying to find the solutions to the issues and problems facing your company on a daily basis-making workforce utilization decisions for example-could be made easier if the big data you collect through your computer systems each day in the normal course of business is mined timely and effectively. But today to become a cognitive company, you must also be able to turn data into information, information into knowledge, and knowledge into wisdom and power to maximize the company's potential. Many companies today are not even sure what data or information actually exists from the operation of their computer systems, and where that data resides at the moment they need access to it. They are not sure how to make decisions as to what data is most important today, and how it can best be used. However, what is considered most important today may be different than what is considered most important tomorrow. And then you must know what it is going to take to transform the data into information and knowledge, and take any newly created  information security  requirements  into consideration.  It could be more effective in some cases  to collect and store information and knowledge from the start as opposed to just raw data; take better control of it earlier. But in today's world, it is all about turning big data into smart business decisions.

Most people have heard the story of Sir Isaac Newton seeing an apple fall when he was sitting under a tree that ultimately changed science and math to this day. No child could have seen, and for that matter probably only a few people on earth at the time could have seen in the falling apple what Newton saw - the relation between the falling of an apple and the motion of the planets in their orbits. Seeing relationships involves thinking, and involves the discovering of relationships which exist between the various objects in our mental stream. Thinking involves bringing to light new meanings through the discovery of new relations (Betts). In today's world, many of the solutions that will change our world for the better are hidden within big data, awaiting discovery. One objective of machine learning(AI) is to teach machines to mimic the way humans think. Today, computers can process much faster than humans, so it seems logical to train machines to discover new relationships. But today much of the big data collected is invisible to computing analysis; and remains dark data - it cannot be mined for one reason or another.  But discovering new relationships in the big data alone is not enough either. Their meaning and significance must be determined as well. We must create computing systems modeled after the human brain that mimic the way humans think, but which are also capable of reason.  Importantly, companies need  to also develop many more Newtons - employees who are motivated to see, and can understand the meaning and significance of relationships as they perform their daily functions. This is one place where cognitive computing and cognitive augmentation can join forces.

Like many technical terms in today's world, "cognitive augmentation" covers a range of concepts. It can mean different things to different people. From our company's perspective , it means "the effective use of information technology in augmenting human intelligence". Imagine the potential benefits to your company that could come someday from having  a dedicated program in place  that strives to continually improve  the cognitive skills and performance  of each employee, and thusly your company's  entire workforce, as they  cognitively interact with the  computer system while performing their normal duties each day - "collectively" making your company a  better decision maker, more security conscious, safer, and more productive.  A system whereby employees could automatically learn from each other - as well as  teach each other. Those with stronger cognitive skills and experience in a certain department or area, could in effect over time  "transfer" those skills and that experience to other employees in that or another department, through their interactions with the computer system as they perform their normal work.

CogniDigital Corporation ..........                          creating digital "Tools Of Thought"

Company History

Operating a business of any size in today's digital world  is challenging. Charting your course takes skill, and having the focus and discipline to stay that course takes real courage and dedication.....and assistance from many different types of sources....

Please revisit us again soon for more detailed information as we continue our progress in constructing  this website and creating new "Tools Of Thought. If you haven't memorized our name by then - CogniDigital Corporation - you can revisit us using,,,,, Mentally, or Until the website is completely up and running questions may be addressed to Laird H. Shuart, 1920 S. W. Regency Pkwy. B, Topeka, Kansas 66604.

Big Data Mining

Method Of Criminal Profiling And Person Identification Using Cognitive/Behavioral Biometric Fingerprint Analysis-Patent #9,396,319 B2 (Non-provisional Application filed September 24, 2014):  A method of criminal profiling and person identification that utilizes an online identity software-based solution which focuses on the cognitive/behavioral aspects of an individual who is attempting to gain or has gained unauthorized access to a computer system or portions of that system, who may be posing as an authorized user of that system.  There is an emphasis on identifying the intruder's unique cognitive/behavioral biometric fingerprint while he is creating usable electronic evidence during his criminal behavior in cyberspace.  This technology provides the ability to identify and address cyber attacks in real time, whether the attack is successful or unsuccessful, and facilitates the gathering of usable electronic evidence from the crime scene(s) through edge computing. 

CogniDigital Corporation is a small information technology startup company located in  Kansas. The founders have been awarded two ground-breaking cognitive computing software patents relating to person identification, advanced authentication, adaptive authentication, cognitive/behavioral biometric fingerprint analysis, cybersecurity, big data mining, and cognitive augmentation. The first patent application was filed in 2010, and included what many people at the time would have  considered futuristic concepts and claims in these areas - and which today represent some of the most promising advances being made in these areas.              

AI, Machine Learning, and Cognitive Computing Meet Cognitive Augmentation - Creating Modern Day Newtons

Cognitive-Based Logon Process For Computing Device-Patent #9,672,335 B2 (Non-provisional Application filed December 15,2010):  This invention relates to the field of user authentication and authorization, and more particularly to a cognitive-based logon process for accessing a computing device and its systems, applications, directories, or files.  The invention requires the user to respond to a set of one or more "random cognitive logon variables" (i.e. questions or mental exercises), that may require motor skills.  In the short term, a user's responses to cognitive based prompts will enable the computer to determine whether the user demonstrates the required level of cognitive function to proceed with the current logon session.  Additionally, the user's pattern of responses to certain types of questions will, over time, provide a basis for continuously authenticating the user using his unique cognitive/behavioral biometric fingerprint (also referred to as "cognitive fingerprint").  It will also allow the computer system to determine whether or not the user's cognitive function is changing, and if so, to what extent.