Preauthorized wearable biometric device, system and method for use thereof
First Claim
1. A method for authenticating a user using a device that performs actions including:
- capturing information that identifies the user of the device;
authenticating the user of the device based on the information, wherein the authentication includes;
communicating the information to an authorized authentication device (AAD) that is separated from the device; and
comparing the information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the profile stored on the AAD corresponds to the information; and
providing the preauthorization to one or more access points, wherein the user is provided access to the one or more access points based on the preauthorization of the device.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed towards authenticating users using biometric devices. The biometric device may be arranged to capture one or more biometric feature of a user that may be wearing the biometric device such as biometric features that correspond to an electrocardiogram of the user. The user of the biometric device may be authenticated based on one or more biometric features, or a combination thereof. Authenticating the user of the biometric device, may include communicating information that includes biometric features to an authorized authentication device (AAD). When the user is authenticated, the biometric device may be preauthorized for the user. When the preauthorized biometric device senses at least one access point, an authorization signal may be provided to the access point. If the preauthorized biometric device is removed from the user, the biometric device is deauthorized, disabling access to access points by the user.
43 Citations
30 Claims
-
1. A method for authenticating a user using a device that performs actions including:
-
capturing information that identifies the user of the device; authenticating the user of the device based on the information, wherein the authentication includes; communicating the information to an authorized authentication device (AAD) that is separated from the device; and comparing the information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the profile stored on the AAD corresponds to the information; and providing the preauthorization to one or more access points, wherein the user is provided access to the one or more access points based on the preauthorization of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A device for authenticating a user, comprising:
-
a transceiver that communicates over a network; a memory that stores at least instructions; and a processor device that executes instructions that enable actions, including; capturing information identifying the user of the device; authenticating the user of the device based on the information, wherein the authentication includes; communicating the information to an authorized authentication device (AAD) that is separate from the device; and comparing the information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the information corresponds to the profile stored on the AAD; and providing the preauthorization to one or more access points, wherein the user is provided access to the one or more access points based on the preauthorization of the device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for using a device to authenticate a user, comprising:
-
a device for authenticating a user, comprising; a transceiver that communicates over a network; a memory that stores at least instructions; and a processor device that executes instructions that enable actions, including; capturing information that identifies the user of the device; authenticating the user of the device based on information, wherein the authentication includes; communicating information that includes the information to an authorized authentication device (AAD) that is separate from the device; and comparing the captured information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the profile stored on the AAD corresponds to the captured information; and providing the preauthorization to one or more access points, wherein the user is provided access to the one or more access points based on the preauthorization of the device; and an access point computer, comprising; a transceiver that communicates over the network; a memory that stores at least instructions; and a processor device that executes instructions that enable actions, including; providing access to the one or more access points to the user based on the preauthorization provided by the device. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A processor readable non-transitory storage media that includes instructions for using a device to authenticate a user, wherein execution of the instructions by a processor device enables actions, comprising:
-
capturing information that identifies the user of the device; authenticating the user of the device based on the captured information, wherein the authentication includes; communicating information that includes the captured information to an authorized authentication device (AAD) that is separate from the device; and comparing the information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the profile stored on the AAD corresponds to the information; and providing the preauthorization to one or more access points, wherein the user is provided access to the one or more access points based on the preauthorization of the device. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification