Security platform
First Claim
1. A computer-implemented method, comprising:
- authenticating, by a security platform on a client device, a user of the client device, the security platform comprising a plurality of Internet of Things (IoT) applications, each of the IoT applications being configured to control at least one corresponding IoT device;
receiving, by the security platform on the client device, an authentication token for the user;
providing, in response to the authenticating, a plurality of graphical representations on a user interface of the client device, each graphical representation representing one of the IoT applications and prompting the user to select a particular IoT application represented by that graphical representation;
receiving selection data indicating a selection of a particular IoT application of the plurality of IoT applications by the user;
providing, by the security platform and based on the selection data, the authentication token to the selected particular IoT application to authenticate the user with the selected particular IoT application; and
providing, by the selected particular IoT application and the client device, control of at least one IoT device corresponding to the selected particular IoT application in response to receiving the authentication token.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for interconnecting devices. One of the methods includes authenticating, by a security platform, a user. The method includes generating, by the security platform, an authentication token for the user. The method includes receiving a selection of an IoT application by the user, the IoT application configured to control an IoT device. The method includes providing, by the security platform, the authentication token to the IoT application to authenticate the user with the selected application. The method also includes providing, by the selected application, control of the IoT device to the user.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
authenticating, by a security platform on a client device, a user of the client device, the security platform comprising a plurality of Internet of Things (IoT) applications, each of the IoT applications being configured to control at least one corresponding IoT device; receiving, by the security platform on the client device, an authentication token for the user; providing, in response to the authenticating, a plurality of graphical representations on a user interface of the client device, each graphical representation representing one of the IoT applications and prompting the user to select a particular IoT application represented by that graphical representation; receiving selection data indicating a selection of a particular IoT application of the plurality of IoT applications by the user; providing, by the security platform and based on the selection data, the authentication token to the selected particular IoT application to authenticate the user with the selected particular IoT application; and providing, by the selected particular IoT application and the client device, control of at least one IoT device corresponding to the selected particular IoT application in response to receiving the authentication token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer storage medium encoded with computer program instructions that when executed by one or more computers cause the one or more computers to perform operations comprising:
-
authenticating, by a security platform on a client device, a user of the client device, the security platform comprising a plurality of Internet of Things (IoT) applications, each of the IoT applications being configured to control at least one corresponding IoT device; receiving, by the security platform on the client device, an authentication token for the user; providing, in response to the authenticating, a plurality of graphical representations on a user interface of the client device, each graphical representation representing one of the IoT applications and prompting the user to select a particular IoT application represented by that graphical representation; receiving selection data indicating a selection of a particular IoT application of the plurality of IoT applications by the user; providing, by the security platform and based on the selection data, the authentication token to the selected particular IoT application to authenticate the user with the selected particular IoT application; and providing, by the selected particular IoT application and the client device, control of at least one IoT device corresponding to the selected particular IoT application in response to receiving the authentication token. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system comprising:
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; authenticating, by a security platform on a client device, a user of the client device, the security platform comprising a plurality of Internet of Things (IoT) applications, each of the IoT applications being configured to control at least one corresponding IoT device; receiving, by the security platform on the client device, an authentication token for the user; providing, in response to the authenticating, a plurality of graphical representations on a user interface of the client device, each graphical representation representing one of the IoT applications and prompting the user to select a particular IoT application represented by that graphical representation; receiving selection data indicating a selection of a particular IoT application of the plurality of IoT applications by the user; providing, by the security platform and based on the selection data, the authentication token to the selected particular IoT application to authenticate the user with the selected particular IoT application; and providing, by the selected particular IoT application and the client device, control of at least one IoT device corresponding to the selected particular IoT application in response to receiving the authentication token. - View Dependent Claims (16, 17, 18, 19, 20)
Specification