×

SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT

  • US 20160065571A1
  • Filed: 08/26/2015
  • Published: 03/03/2016
  • Est. Priority Date: 08/26/2014
  • Status: Abandoned Application
First Claim
Patent Images

1. An authorization system for coordinating secured access to an access-controlled environment as a function of biometric authentication of the user, the system comprising:

  • a processor configured to execute electronic instructions;

    a non-transitory computer readable storage medium that is accessible to the processor, wherein at least some of the electronic instructions are stored on the storage medium;

    a plurality of keys stored in the storage medium, each of the keys respectively associated with a respective user account and generated, based on confirmation of a respective user'"'"'s identity by a respective computing device executing a biometric authentication application, using identification information concerning the respective user and a component of the of the respective computing device;

    a communication module configured to communicatively connect the processor to at least one computing device over a network connection, and wherein the processor, executing the communication module, is configured to receive;

    i) access-control information that identifies an access-controlled environment; and

    ii) one or more transmissions from a computing device that each include a respective key and an indicator indicating that the user'"'"'s identity has been biometrically confirmed by the computing device;

    an authorization module that, when executed by the processor, configures the processor to;

    verify that the received key corresponds to at least one of the respective keys,determine, based on the indicator and the key, that the computing device has biometrically confirmed the identity of the user using the biometric authentication application,confirm that at least one of the one or more transmissions is not a replay of a previously received transmission from the computing device, andfacilitate, over the network with a remote computing device based on the information that identifies an access-controlled environment, the user access to the access-controlled environment as a function of the verification, determination and confirmation.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×