Touch-share credential management on multiple devices
First Claim
1. A computer-implemented method for credential management, the method comprising:
- receiving, by a first processing device, a first biometric information, wherein the first processing device has stored one or more credentials,wherein the first biometric information comprises a first finger engaged with a first fingerprint scanner associated with the first processing device, wherein a first fingerprint associated with the first finger is read by the fingerprint scanner, andwherein the finger print is associated with a first user;
responsive to obtaining the first biometric information, determining whether the first biometric information is valid;
creating, by the first processing device, an ad-hoc network based upon the determination that the first biometric information is valid, wherein the ad-hoc network is active while the first finger is engaged with the first fingerprint scanner associated with the first processing device;
receiving a second biometric information from a second processing device through the ad-hoc network, wherein the second processing device transmits the second biometric information over the ad-hoc network to the first processing device based on a determination that the second biometric information is foreign to the second processing device, andwherein the second biometric information comprises a second finger engaged with a second fingerprint scanner associated with the second processing device, wherein a second fingerprint associated with the second finger is read by the second fingerprint scanner, andwherein the second fingerprint is associated with the first user;
analyzing the second biometric information to determine whether the second biometric information is valid;
transmitting, by the first processing device over the ad-hoc network, a credential from the one or more credentials to the second processing device based on determining that the second biometric information is valid and based on a determination that the second finger is engaged with the second fingerprint scanner while the first finger is engaged with the first fingerprint scanner; and
transmitting a denial to the second processing device through the ad-hoc network based upon the second biometric information being invalid.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments include method, systems and computer program products for credential management. Aspects include obtaining a first biometric information by a first processing device, wherein the first processing device has stored one or more credentials. Then, responsive to obtaining the first biometric information, the method determines whether the first biometric information is valid. The method then creates, via the first processing device, an ad-hoc network based upon the determination that the first biometric information is valid. The method, then receives a second biometric information from a second processing device through the ad-hoc network. And, then the method analyzes the second biometric information to determine whether the second biometric information is valid.
-
Citations
12 Claims
-
1. A computer-implemented method for credential management, the method comprising:
-
receiving, by a first processing device, a first biometric information, wherein the first processing device has stored one or more credentials, wherein the first biometric information comprises a first finger engaged with a first fingerprint scanner associated with the first processing device, wherein a first fingerprint associated with the first finger is read by the fingerprint scanner, and wherein the finger print is associated with a first user; responsive to obtaining the first biometric information, determining whether the first biometric information is valid; creating, by the first processing device, an ad-hoc network based upon the determination that the first biometric information is valid, wherein the ad-hoc network is active while the first finger is engaged with the first fingerprint scanner associated with the first processing device; receiving a second biometric information from a second processing device through the ad-hoc network, wherein the second processing device transmits the second biometric information over the ad-hoc network to the first processing device based on a determination that the second biometric information is foreign to the second processing device, and wherein the second biometric information comprises a second finger engaged with a second fingerprint scanner associated with the second processing device, wherein a second fingerprint associated with the second finger is read by the second fingerprint scanner, and wherein the second fingerprint is associated with the first user;
analyzing the second biometric information to determine whether the second biometric information is valid;transmitting, by the first processing device over the ad-hoc network, a credential from the one or more credentials to the second processing device based on determining that the second biometric information is valid and based on a determination that the second finger is engaged with the second fingerprint scanner while the first finger is engaged with the first fingerprint scanner; and transmitting a denial to the second processing device through the ad-hoc network based upon the second biometric information being invalid. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system for credential management, the computer system comprising:
-
a first processing device configured to; obtain a first biometric information, wherein the first processing device has stored one or more credentials, wherein the first biometric information comprises a first finger engaged with a first fingerprint scanner associated with the first processing device, wherein a fingerprint associated with the first finger is read by the first fingerprint scanner, and wherein the finger print is associated with a first user; responsive to obtaining the first biometric information, determine whether the first biometric information is valid; create an ad-hoc network based upon the determination that the first biometric information is valid, wherein the ad-hoc network is active while the first finger is engaged with the first fingerprint scanner associated with the first processing device; receive a second biometric information from a second processing device through the ad-hoc network, wherein the second processing device transmits the second biometric information over the ad-hoc network to the first processing device based on a determination that the second biometric information is foreign to the second processing device, and wherein the second biometric information comprises a second finger engaged with a second fingerprint scanner associated with the second processing device, wherein a second fingerprint associated with the second finger is read by the second fingerprint scanner, and wherein the second fingerprint is associated with the first user; analyze the second biometric information to determine whether the second biometric information is valid; transmit, over the ad-hoc network, a credential from the one or more credentials to the second processing device based on determining that the second biometric information is valid and based on a determination that the second finger is engaged with the second fingerprint scanner while the first finger is engaged with the first fingerprint scanner; and transmit a denial to the second processing device through the ad-hoc network based upon the second biometric information being invalid. - View Dependent Claims (8, 9)
-
-
10. A computer program product for credential management, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform:
-
obtaining, by a first processing device, a first biometric information, wherein the first processing device has stored one or more credentials, wherein the first biometric information comprises a first finger engaged with a first fingerprint scanner associated with the first processing device, wherein a first fingerprint associated with the first finger is read by the fingerprint scanner, and wherein the second fingerprint is associated with the first user; responsive to obtaining the first biometric information, determining whether the first biometric information is valid; creating, by the first processing device, an ad-hoc network based upon the determination that the first biometric information is valid, wherein the ad-hoc network is active while the first finger is engaged with the first fingerprint scanner associated with the first processing device; receiving a second biometric information from a second processing device through the ad-hoc network, wherein the second processing device transmits the second biometric information over the ad-hoc network to the first processing device based on a determination that the second biometric information is foreign to the second processing device, and wherein the second biometric information comprises a second finger engaged with a second fingerprint scanner associated with the second processing device, wherein a second fingerprint associated with the second finger is read by the second fingerprint scanner, and wherein the second fingerprint is associated with the first user; analyzing the second biometric information to determine whether the second biometric information is valid; transmitting, by the first processing device over the ad-hoc network, a credential from the one or more credentials to the second processing device based on determining that the second biometric information is valid and based on a determination that the second finger is engaged with the second fingerprint scanner while the first finger is engaged with the first fingerprint scanner; and transmitting a denial to the second processing device through the ad-hoc network based upon the second biometric information being invalid. - View Dependent Claims (11, 12)
-
Specification