SYSTEMS AND METHODS FOR DIGITAL WORKFLOW AND COMMUNICATION
First Claim
1. A method performed by a computing device, the method comprising:
- encrypting information comprising a secret and a public key of the computing device using a public key of a remote system;
sending the encrypted information to the remote system;
receiving a response to the encrypted information from the remote system and decrypting the response using a private key of the computing device;
determining at a first time that the decrypted response matches the secret and based thereon;
verifying that the computing device is connected to a first network; and
verifying that the computing device is located within a first geofence.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authoring and performing procedural workflows, and engaging in multimedia communication, remote assistance, training, data entry, inventory management, authentication, and secure networking using a hands-free or substantially hands-free wearable digital device are described. In one implementation, a user logs into a secure network using existing credentials, and a Quick Response Code is generated to temporarily authorize the user'"'"'s wearable device within the secure network. In another implementation, information is encrypted and transferred between a computing device and a remote system, and the computing device is verified as being connected to a particular network and located within a particular geofence. In a further implementation, an interface for authoring a procedural workflow includes defining workflow steps based on selected primitives, and displaying rendered previews of the workflow as it would appear on different user devices.
-
Citations
16 Claims
-
1. A method performed by a computing device, the method comprising:
-
encrypting information comprising a secret and a public key of the computing device using a public key of a remote system; sending the encrypted information to the remote system; receiving a response to the encrypted information from the remote system and decrypting the response using a private key of the computing device; determining at a first time that the decrypted response matches the secret and based thereon; verifying that the computing device is connected to a first network; and verifying that the computing device is located within a first geofence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
one or more computing devices programmed to perform operations comprising; encrypting information comprising a secret and a public key of the computing device using a public key of a remote system; sending the encrypted information to the remote system; receiving a response to the encrypted information from the remote system and decrypting the response using a private key of the computing device; determining at a first time that the decrypted response matches the secret and based thereon; verifying that the computing device is connected to a first network; and verifying that the computing device is located within a first geofence. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
Specification