Preauthorized wearable biometric device, system and method for use thereof
DCFirst Claim
1. A method for authenticating a user using a device that performs actions including:
- capturing unique information that identifies the user of the device;
authenticating the user of the device based on the information, wherein the authentication includes;
communicating the information to an authorized authentication device (AAD) that is included with the device; and
comparing the information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the profile stored on the AAD corresponds to the information; and
providing the preauthorization to one or more access points, wherein the user is provided access to the one or more access points based on the preauthorization of the device.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Embodiments are directed towards authenticating users using biometric devices. The biometric device may be arranged to capture one or more biometric feature of a user that may be wearing the biometric device such as biometric features that correspond to an electrocardiogram of the user. The user of the biometric device may be authenticated based on one or more biometric features, or a combination thereof. Authenticating the user of the biometric device, may include communicating information that includes biometric features to an authorized authentication device (AAD). When the user is authenticated, the biometric device may be preauthorized for the user. When the preauthorized biometric device senses at least one access point, an authorization signal may be provided to the access point. If the preauthorized biometric device is removed from the user, the biometric device is deauthorized, disabling access to access points by the user.
-
Citations
30 Claims
-
1. A method for authenticating a user using a device that performs actions including:
-
capturing unique information that identifies the user of the device; authenticating the user of the device based on the information, wherein the authentication includes; communicating the information to an authorized authentication device (AAD) that is included with the device; and comparing the information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the profile stored on the AAD corresponds to the information; and providing the preauthorization to one or more access points, wherein the user is provided access to the one or more access points based on the preauthorization of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A device for authenticating a user, comprising:
-
a transceiver that communicates over a network; a memory that stores at least instructions; and one or more processor devices that executes instructions that enable actions, including; capturing unique information that identifies the user of the device; authenticating the user of the device based on the information, wherein the authentication includes; communicating the information to an authorized authentication device (AAD) that is included with the device; and comparing the information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the profile stored on the AAD corresponds to the information; and providing the preauthorization to one or more access points, wherein the user is provided access to the one or more access points based on the preauthorization of the device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for using a device to authenticate a user, comprising:
-
a device for authenticating a user, comprising; a transceiver that communicates over a network; a memory that stores instructions; and one or more processors that execute the instructions that perform actions, including; capturing unique information that identifies the user of the device; authenticating the user of the device based on the information, wherein the authentication includes; communicating the information to an authorized authentication device (AAD) that is included with the device; and comparing the information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the profile stored on the AAD corresponds to the information; and providing the preauthorization to one or more access points; and an access point computer, comprising; a transceiver that communicates over the network; a memory that stores instructions; and one or more processors that execute instructions that perform actions, including; providing the access to the one or more access points to the user based on the preauthorization provided by the device. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A processor readable non-transitory storage media that includes instructions for using a device to authenticate a user, wherein execution of the instructions by one or more processors performs actions, comprising:
-
capturing unique information that identifies the user of the device; authenticating the user of the device based on the information, wherein the authentication includes; communicating the information to an authorized authentication device (AAD) that is included with the device; and comparing the information to a profile that corresponds to the user and is stored on the AAD, wherein the AAD preauthorizes the device for the user when the profile stored on the AAD corresponds to the information; and providing the preauthorization to one or more access points, wherein the user is provided access to the one or more access points based on the preauthorization of the device. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification