AUGMENTED REALITY DIGITAL CONSENT
First Claim
1. A method for securely authenticating user consent to a high-security communication via mobile communications, said method utilizing:
- a mobile device, said method authenticating the identity of a user by confirming the user'"'"'s possession of the mobile device;
said method comprising;
accessing a settings management state associated with the mobile device;
creating within the state, a personal profile for the user in connection with the mobile device, said settings being stored on, and accessible by, the user of the mobile device, said settings comprising;
description-type settings relating to said user; and
live motion settings and behavior settings of said user, the live motion settings comprising steps per minute of said user;
storing said initial settings of said user'"'"'s personal profile for future authentication of the user; and
transmitting, in response to the user attempting to consent, via said mobile device, an invitation to the high-security communications sent by an initiator, said invitation being sent to said mobile device in order to perform a real-time profile validation check of the user of the mobile device, said real-time profile validation check comprising;
capturing, via said mobile device, live motion and behavior of the user;
verifying, via said mobile device, the live motion and behavior of the user, by confirming that the real-time live motion and behavior corresponds to the initial personal profile settings stored on the mobile device by the user of the mobile device;
in response to verifying the motion and behavior of the user, safely instructing the initiator to authenticate and securely accept the user'"'"'s consent.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile device for securely authenticating user consent may be provided. The mobile device may include a settings management state. The mobile device may include a processor configured to: access the settings management state, create a personal profile for the user and process a plurality of settings created by the user. The settings may include description-type settings and live motion and/or behavior settings of the user. The mobile device may include a database for storing the plurality of settings and the user'"'"'s personal profile. The storing may enable future authentication of the user. In response to the user attempting to consent to an initiator via the mobile device, the processor may be configured to perform a real-time profile validation check. The validation check may include capturing live motion and/or behavior of the user, verifying the live motion and/or behavior and instructing the initiator to accept the consent.
-
Citations
20 Claims
-
1. A method for securely authenticating user consent to a high-security communication via mobile communications, said method utilizing:
-
a mobile device, said method authenticating the identity of a user by confirming the user'"'"'s possession of the mobile device; said method comprising; accessing a settings management state associated with the mobile device; creating within the state, a personal profile for the user in connection with the mobile device, said settings being stored on, and accessible by, the user of the mobile device, said settings comprising; description-type settings relating to said user; and live motion settings and behavior settings of said user, the live motion settings comprising steps per minute of said user; storing said initial settings of said user'"'"'s personal profile for future authentication of the user; and transmitting, in response to the user attempting to consent, via said mobile device, an invitation to the high-security communications sent by an initiator, said invitation being sent to said mobile device in order to perform a real-time profile validation check of the user of the mobile device, said real-time profile validation check comprising; capturing, via said mobile device, live motion and behavior of the user; verifying, via said mobile device, the live motion and behavior of the user, by confirming that the real-time live motion and behavior corresponds to the initial personal profile settings stored on the mobile device by the user of the mobile device; in response to verifying the motion and behavior of the user, safely instructing the initiator to authenticate and securely accept the user'"'"'s consent. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for securely authenticating user consent to a high-security communication via mobile communications, said method utilizing:
-
a mobile device, said method authenticating the identity of a user by confirming the user'"'"'s possession of the mobile device; said method comprising; accessing a settings management state associated with the mobile device; creating within the state, a personal profile for the user in connection with the mobile device, said settings being stored on, and accessible by, the user of the mobile device, said settings comprising; description-type settings relating to said user; and live motion settings and behavior settings of said user comprising steps per minute of said user; storing said initial settings of said user'"'"'s personal profile for future authentication of the user; and transmitting, in response to the user attempting to consent, via said mobile device, an invitation to the high-security communications sent by an initiator, said invitation being sent to said mobile device in order to perform a real-time profile validation check of the user of the mobile device, said real-time profile validation check comprising; capturing, via said mobile device, live motion and behavior of the user; capturing, via said mobile device, a signature of the user; verifying, via said mobile device, the live motion and/or behavior of the user, by confirming that the real-time live motion and behavior corresponds to the initial personal profile settings stored on the mobile device by the user of the mobile device; verifying, via said mobile device, the signature of the user, by confirming that the signature corresponds to the initial signature stored on the mobile device by the user of the mobile device; in response to verifying the motion and behavior of the user as corresponding to the signature inputted by the user, securely instructing the initiator to authenticate and securely accept the user'"'"'s consent. - View Dependent Claims (8, 9, 10)
-
-
11. A mobile device for securely authenticating user consent via mobile communications, said mobile device authenticating the identity of a user, said mobile device comprising:
-
a settings management state associated with the mobile device; a processor for; accessing the settings management state associated with the mobile device; creating, within the state, a personal profile for the user in connection with the mobile device; and processing a plurality of initial settings created by the user within his personal profile, said settings being stored on, and accessible by, the user of the mobile device, said settings comprising; description-type settings relating to the user; and live motion settings and behavior settings of said user comprising steps per minute of said user; a database for storing the plurality of initial settings and the user'"'"'s personal profile for future authentication of the user; wherein, in response to the user attempting to consent to an initiator via the mobile device, the processor is further configured to; receive a request from the initiator to the mobile device to perform a real-time profile validation check of the user using the mobile device based on the saved profile settings in the database of the mobile device; perform said real-time profile validation check, said validation check comprising; capturing, via the mobile device, live motion and behavior of the user; verifying, via said mobile device, the live motion and behavior of the user, by confirming that the real-time live motion and behavior corresponds to the initial personal profile settings stored in the database on the mobile device, by the user; wherein, in response to verifying the motion and behavior of the user, securely instructing the initiator to authenticate and securely accept the user'"'"'s consent. - View Dependent Claims (12, 13, 14, 15, 16, 18, 19, 20)
-
-
17. (canceled)
Specification