Password management
First Claim
1. A method, comprising:
- determining, by a wearable computing device, that the wearable computing device is being worn;
while the wearable computing device is determined to be worn, detecting, by the wearable computing device, a machine-readable code associated with protected information that is accessible via a second computing device; and
responsive to detecting the machine-readable code;
obtaining biometric data from one or more biometric sensors associated with the wearable computing device,based at least in part on the biometric data, the wearable computing device generating an authentication message that includes authentication information and identifies the protected information, andsending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatus, and computer-readable media are described herein related to biometric authentication. A first computing device can detect a machine-readable code displayed by a second computing device, where the machine-readable code can identify protected information viewable via the second computing device. In response to detecting the machine-readable code, the first computing device can acquire biometric data via one or more biometric sensors associated with the first computing device. Based at least in part on the biometric data, the first computing device can generate an authentication message that includes authentication information and identifies the protected information. The first computing device can then send the authentication message to an authentication server for verification of the authentication information, where verification of the authentication information can allow access to the protected information via the second computing device.
-
Citations
17 Claims
-
1. A method, comprising:
-
determining, by a wearable computing device, that the wearable computing device is being worn; while the wearable computing device is determined to be worn, detecting, by the wearable computing device, a machine-readable code associated with protected information that is accessible via a second computing device; and responsive to detecting the machine-readable code; obtaining biometric data from one or more biometric sensors associated with the wearable computing device, based at least in part on the biometric data, the wearable computing device generating an authentication message that includes authentication information and identifies the protected information, and sending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
detecting, by a wearable computing device, a machine-readable code associated with protected information that is accessible via a second computing device; and responsive to detecting the machine-readable code; obtaining biometric data from one or more biometric sensors associated with the wearable computing device, based at least in part on the biometric data, the wearable computing device generating an authentication message that includes authentication information and identifies the protected information, wherein the authentication information comprises encrypted biometric data generated by the wearable computing device based on the biometric data, wherein generating the encrypted biometric data comprises encoding additional data into the biometric data, wherein the additional data includes at least one identifier associated with the wearable computing device and a public key associated with the wearable computing device, and sending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device. - View Dependent Claims (10)
-
-
11. A method, comprising:
-
detecting, by a wearable computing device, a machine-readable code associated with protected information that is accessible via a second computing device; and responsive to detecting the machine-readable code; obtaining biometric data from one or more biometric sensors associated with the wearable computing device, based at least in part on the biometric data, determining, by the wearable computing device, a digital signature for the biometric data, wherein the digital signature is different from the biometric data, based on the digital signature, generating, by the wearable computing device, an encryption of the digital signature, generating, by the wearable computing device, an authentication message that includes authentication information and identifies the protected information, wherein the authentication information comprises the encryption of the digital signature, and sending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device.
-
-
12. A wearable computing device, comprising:
-
at least one processor; and a non-transitory computer-readable storage medium having stored thereon program instructions that, upon execution by the at least one processor, cause the wearable computing device to perform operations comprising; determining that the wearable computing device is being worn; while the wearable computing device is determined to be worn, detecting a machine-readable code associated with protected information that is accessible via a second computing device; and responsive to detecting the machine-readable code; obtaining biometric data from one or more biometric sensors associated with the wearable computing device, based at least in part on the biometric data, generating an authentication message that includes authentication information and identifies the protected information, and sending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device. - View Dependent Claims (13, 14)
-
-
15. A wearable computing device, comprising:
-
at least one processor; and a non-transitory computer-readable storage medium having stored thereon program instructions that, upon execution by the at least one processor, cause the wearable computing device to perform operations comprising; detecting a machine-readable code associated with protected information that is accessible via a second computing device; and responsive to detecting the machine-readable code; receiving a challenge signal requesting a verification response verifying the authenticity of a wearer of the wearable computing device using biometric data, responsive to receiving the challenge signal, transmitting an acknowledgement signal, after transmitting the acknowledgement signal, enabling the wearable computing device to obtain the biometric data, obtaining the biometric data from one or more biometric sensors associated with the wearable computing device, based at least in part on the biometric data, generating an authentication message that includes authentication information and identifies the protected information, and sending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device.
-
-
16. A non-transitory computer-readable medium having stored thereon program instructions that when executed by a wearable computing device that includes at least one processor cause the wearable computing device to perform operations comprising:
-
determining that the wearable computing device is being worn; while the wearable computing device is determined to be worn, detecting a machine-readable code associated with protected information that is accessible via a second computing device; and responsive to detecting the machine-readable code; obtaining biometric data from one or more biometric sensors associated with the wearable computing device, based at least in part on the biometric data, generating an authentication message that includes authentication information and identifies the protected information, and sending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device. - View Dependent Claims (17)
-
Specification