System and method for mobile peer authentication and asset control
First Claim
Patent Images
1. A computer-aided method for peer asset authentication and asset control, the steps comprising:
- providing a server application;
prompting a user to select a share on a first computing device, such that a selected share is created;
prompting said user to configure said selected share with one or more authentication factors on said first computing device, such that a configured and selected share is created;
receiving said configured and selected share from said first computing device by said server application;
returning a secured share link to said first computing device;
sharing said secured share link with one or more second computing devices of one or more recipients via one or more electronic transmissions;
accepting by said server application one or more authentication engagements by said one or more recipients to determine if one or more recipients are authenticated to have access to said configured and selected share in said secured share link;
comparing said one or more authentication engagements to said one or more authentication factors by said server application; and
providing an access to said configured and selected share to said one or more recipients whose said one or more authentication engagements match up with said one or more authentication factors, said access provided on said one or more second computing devices;
wherein said secured share link is configured to only be accessible by said one or more recipients via a synchronicity, such that at least two of said one or more recipients are required by said server application be mutually and synchronously engaged with the secured share link.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for mobile peer authentication and asset control. The system and method may be configured to authenticate peer users across any digital network and platform and may allow users to independently control access to content they share with others across the same platforms from their computing devices. Senders may anonymously verify other mobile users according to device, location, behavior, and knowledge contexts, and may independently control or monetize shares with one or more of those peers in real-time across any social, messaging, or electronic communication network, either by value or by reference.
-
Citations
19 Claims
-
1. A computer-aided method for peer asset authentication and asset control, the steps comprising:
-
providing a server application; prompting a user to select a share on a first computing device, such that a selected share is created; prompting said user to configure said selected share with one or more authentication factors on said first computing device, such that a configured and selected share is created; receiving said configured and selected share from said first computing device by said server application; returning a secured share link to said first computing device; sharing said secured share link with one or more second computing devices of one or more recipients via one or more electronic transmissions; accepting by said server application one or more authentication engagements by said one or more recipients to determine if one or more recipients are authenticated to have access to said configured and selected share in said secured share link; comparing said one or more authentication engagements to said one or more authentication factors by said server application; and providing an access to said configured and selected share to said one or more recipients whose said one or more authentication engagements match up with said one or more authentication factors, said access provided on said one or more second computing devices; wherein said secured share link is configured to only be accessible by said one or more recipients via a synchronicity, such that at least two of said one or more recipients are required by said server application be mutually and synchronously engaged with the secured share link. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-aided method for peer asset authentication and asset control, the steps comprising:
-
providing a server application; prompting a user to select a share on a first computing device, such that a selected share is created; prompting said user to configure said selected share with one or more authentication factors on said first computing device, such that a configured and selected share is created; receiving said configured and selected share from said first computing device by said server application; returning a secured share link to said first computing device; sharing said secured share link with one or more second computing devices of one or more recipients via one or more electronic transmissions; accepting by said server application one or more authentication engagements by said one or more recipients to determine if one or more recipients are authenticated to have access to said configured and selected share in said secured share link; comparing said one or more authentication engagements to said one or more authentication factors by said server application; providing an access to said configured and selected share to said one or more recipients whose said one or more authentication engagements match up with said one or more authentication factors, said access provided on said one or more second computing devices; wherein said share is selected remotely on said first computing device; wherein said one or more recipients having valid access to said configured and selected share have access for a set duration of time; and wherein said secured share link is configured to only be accessible by said one or more recipients via a synchronicity, such that at least one of said one or more recipients and said user are required by said server application be mutually and synchronously engaged with the secured share link. - View Dependent Claims (18)
-
-
19. A computer-aided method for peer asset authentication and asset control, the steps comprising:
-
providing a server application; prompting a user to select a share on a first computing device, such that a selected share is created; prompting said user to configure said selected share with one or more authentication factors on said first computing device, such that a configured and selected share is created; receiving said configured and selected share from said first computing device by said server application; returning a secured share link to said first computing device; sharing said secured share link with one or more second computing devices of one or more recipients via one or more electronic transmissions; accepting by said server application one or more authentication engagements by said one or more recipients to determine if one or more recipients are authenticated to have access to said configured and selected share in said secured share link; comparing said one or more authentication engagements to said one or more authentication factors by said server application; providing an access to said configured and selected share to said one or more recipients whose said one or more authentication engagements match up with said one or more authentication factors, said access provided on said one or more second computing devices; and notifying said user regarding whether any of said one or more recipients successfully accessed said configured and selected share; wherein said one or more recipients having valid access to said configured and selected share have access for a set duration of time; wherein said one or more authentication factors comprise a monetization factor, which comprises one or more valid peer electronic payments from said one or more recipients to said user in an amount specified by said user; wherein said secured share link is shared to one or more recipients by reverse proxy to hide a source location of said secured share link; wherein said access is only granted if said one or more valid peer electronic payments are made and if said one or more authentication engagements match up with said one or more authentication factors; monitoring, such that said user tracks or is notified of said one or more authentication engagements by said one or more recipients; wherein said monitoring step allows said user to override said one or more authentication factors, such that said user is able to allow or deny access to said share to said one or more recipients in real-time; and wherein said configured and selected share is encrypted.
-
Specification