TOUCH-SHARE CREDENTIAL MANAGEMENT ON MULTIPLE DEVICES
First Claim
1. A computer-implemented method for credential management, the method comprising:
- obtaining a first biometric information by a first processing device, wherein the first processing device has stored one or more credentials;
responsive to obtaining the first biometric information, determining whether the first biometric information is valid;
creating, by the first processing device, an ad-hoc network based upon the determination that the first biometric information is valid;
receiving a second biometric information from a second processing device through the ad-hoc network; and
analyzing the second biometric information to determine whether the second biometric information is valid.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments include method, systems and computer program products for credential management. Aspects include obtaining a first biometric information by a first processing device, wherein the first processing device has stored one or more credentials. Then, responsive to obtaining the first biometric information, the method determines whether the first biometric information is valid. The method then creates, via the first processing device, an ad-hoc network based upon the determination that the first biometric information is valid. The method, then receives a second biometric information from a second processing device through the ad-hoc network. And, then the method analyzes the second biometric information to determine whether the second biometric information is valid.
-
Citations
20 Claims
-
1. A computer-implemented method for credential management, the method comprising:
-
obtaining a first biometric information by a first processing device, wherein the first processing device has stored one or more credentials; responsive to obtaining the first biometric information, determining whether the first biometric information is valid; creating, by the first processing device, an ad-hoc network based upon the determination that the first biometric information is valid; receiving a second biometric information from a second processing device through the ad-hoc network; and analyzing the second biometric information to determine whether the second biometric information is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system for credential management, the computer system including a server having a processor, the processor configured to:
-
obtain a first biometric information by a first processing device, wherein the first processing device has stored one or more credentials; responsive to obtaining the first biometric information, determine whether the first biometric information is valid; create, by the first processing device, an ad-hoc network based upon the determination that the first biometric information is valid; receive a second biometric information from a second processing device through the ad-hoc network; and analyze the second biometric information to determine whether the second biometric information is valid. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer program product for credential management, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform:
-
obtaining a first biometric information by a first processing device, wherein the first processing device has stored one or more credentials; responsive to obtaining the first biometric information, determining whether the first biometric information is valid; creating, by the first processing device, an ad-hoc network based upon the determination that the first biometric information is valid; receiving a second biometric information from a second processing device through the ad-hoc network; and analyzing the second biometric information to determine whether the second biometric information is valid. - View Dependent Claims (18, 19, 20)
-
Specification