SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT
First Claim
1. An authorization system for coordinating secured access to an access-controlled environment as a function of biometric authentication of the user, the system comprising:
- a processor configured to execute electronic instructions;
a non-transitory computer readable storage medium that is accessible to the processor, wherein at least some of the electronic instructions are stored on the storage medium;
a plurality of keys stored in the storage medium, each of the keys respectively associated with a respective user account and generated, based on confirmation of a respective user'"'"'s identity by a respective computing device executing a biometric authentication application, using identification information concerning the respective user and a component of the of the respective computing device;
a communication module configured to communicatively connect the processor to at least one computing device over a network connection, and wherein the processor, executing the communication module, is configured to receive;
i) access-control information that identifies an access-controlled environment; and
ii) one or more transmissions from a computing device that each include a respective key and an indicator indicating that the user'"'"'s identity has been biometrically confirmed by the computing device;
an authorization module that, when executed by the processor, configures the processor to;
verify that the received key corresponds to at least one of the respective keys,determine, based on the indicator and the key, that the computing device has biometrically confirmed the identity of the user using the biometric authentication application,confirm that at least one of the one or more transmissions is not a replay of a previously received transmission from the computing device, andfacilitate, over the network with a remote computing device based on the information that identifies an access-controlled environment, the user access to the access-controlled environment as a function of the verification, determination and confirmation.
3 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a system and method for coordinating secured access to an access-controlled environment. A plurality of keys are stored, each associated with a user account and generated by executing a biometric authentication application, using identification information concerning the respective user and a component of the of the respective computing device. Access-control information identifies an access-controlled environment, and a transmission is received from a computing device that includes a respective key and an indicator indicating that the user'"'"'s identity has been biometrically confirmed by the computing device. The key confirms that the user has been biometrically authenticated, and that the transmission is not a replay of a previously received transmission from the computing device. Access to the access-controlled environment is facilitated as a function of the verification, determination and confirmation.
-
Citations
20 Claims
-
1. An authorization system for coordinating secured access to an access-controlled environment as a function of biometric authentication of the user, the system comprising:
-
a processor configured to execute electronic instructions; a non-transitory computer readable storage medium that is accessible to the processor, wherein at least some of the electronic instructions are stored on the storage medium; a plurality of keys stored in the storage medium, each of the keys respectively associated with a respective user account and generated, based on confirmation of a respective user'"'"'s identity by a respective computing device executing a biometric authentication application, using identification information concerning the respective user and a component of the of the respective computing device; a communication module configured to communicatively connect the processor to at least one computing device over a network connection, and wherein the processor, executing the communication module, is configured to receive; i) access-control information that identifies an access-controlled environment; and ii) one or more transmissions from a computing device that each include a respective key and an indicator indicating that the user'"'"'s identity has been biometrically confirmed by the computing device; an authorization module that, when executed by the processor, configures the processor to; verify that the received key corresponds to at least one of the respective keys, determine, based on the indicator and the key, that the computing device has biometrically confirmed the identity of the user using the biometric authentication application, confirm that at least one of the one or more transmissions is not a replay of a previously received transmission from the computing device, and facilitate, over the network with a remote computing device based on the information that identifies an access-controlled environment, the user access to the access-controlled environment as a function of the verification, determination and confirmation.
-
-
2. A method for secure sharing of an encrypted electronic file between users based on biometric authentication of the users performed using respective user computing devices, the method comprising:
-
receiving, at a server computing device that includes a storage medium having instructions stored therein and a processor configured by executing the instructions, from a first user computing device over a network connection; information identifying the encrypted electronic file (“
fileID”
), wherein the encrypted electronic file is stored in a file storage medium that is accessible by the first user computing device;an encryption key; access control information identifying at least a recipient user who is authorized to access the encrypted electronic file; receiving, at the server computing device over the network connection, one or more biometric authorization messages, each biometric authorization message being from a respective user computing device and including identification information associated with a respective user of the respective user computing device, and the identification information including a representation of the respective user'"'"'s identity that has been confirmed as a function of biometrics; verifying, by the server computing device in accordance with a datastore of user accounts associated with respective users and respective user computing devices, that the identification information corresponds to a user account that is associated with the first user and the first user computing device; generating, by the server computing device, a record of the encrypted electronic file in the storage medium, wherein the record comprises the fileID, the encryption key, the access control information and the userID; providing, by the server computing device, a registration notification to the first user computing device that is usable for the first user computing device to transmit the encrypted electronic file to a second computing device associated with the recipient and wherein the registration notification causes the first user computing device to erase any locally stored copies of the encryption key. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for secure sharing of an encrypted electronic file between users based on biometric authentication of the users performed using respective user computing devices, the method comprising:
-
transmitting, by a server computing device to a first user computing device, a request to confirm identity of a first user associated with the first user computing device; receiving, by the server computing device in response to the request and from the first user computing device, a confirmation of the identity as a function of biometric authentication by the first user computing device; determining, by the server computing device, a key that is unique to the first user, the first user computing device and the confirmation that the user identity using biometric authentication by the user computing device; validating, by the server computing device and in accordance with the key, the confirmation, the identity of the user and the user computing device based on the biometric authentication, a secure communication session; and constructing, by the server computing device and using the key, the validated secure communication session over a network between the server computing device and the first user computing device associated with the validated user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for authorizing access to an access-controlled environment, the method comprising:
-
a network communication interface; a computer-readable storage medium; one or more processors configured to interact with the network communication interface and the computer-readable storage medium and execute one or more software modules stored on the storage medium including; a database module, that when executed configures the one or more processors to access at least one database that includes user profiles that include information to identify respective users, respective user computing devices and respective transaction accounts that are associated with respective access-controlled environments; a communication module that when executed configures the one or more processors to receive access-control information that identifies the access-controlled environment, and to receive from a user computing device over a network, a transaction request including; a user identifier that identifies a user, and a user computing device identifier that identifies the user computing device, wherein the transaction request provides confirmation that the user computing device has biometrically authenticated the user; an authorization module that that when executed configures the one or more processors to process, using the at least one database, the transaction request to authorize the user to access the access-controlled environment by determining; that the user identifier is associated with at least one user profile stored in the at least one database, that the user computing device identifier is associated with the at least one user profile, and that the at least one user profile identifies a transaction account associated with the access-controlled environment; wherein the authorization module also configures the one or more processors to generate an authorization notification that facilitates the authorized user to access to the access-controlled environment; and wherein the communication module further configures the one or more processors to transmit the authorization notification to at least one remote computing device over a network.
-
Specification