×

User authentication based on FOB/indicia scan

  • US 9,565,195 B2
  • Filed: 02/09/2016
  • Issued: 02/07/2017
  • Est. Priority Date: 02/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer apparatus for authenticating a user, the apparatus comprising:

  • A non-transitory memory;

    a computer processor;

    a plurality of sensors, the sensors being configured to sense a plurality of authentication validating carriers; and

    a module stored in the memory, executable by the processor, and configured to cause the processor to;

    receive a first request from a user to access at least one first function associated with a first software application, the first software application comprising a plurality of functions, the plurality of functions comprising different levels of sensitivity;

    determine that access to the at least one first function requires user authentication;

    initiate sensing of a first authentication validating carrier comprising a first credential based on the first request;

    determine the first credential based at least in part on the sensed first authentication validating carrier;

    validate the first credential based on the first request, thereby resulting in a first successful user authentication;

    grant access to the at least one first function associated with the first software application based at least in part on the first successful user authentication, wherein the access to at least one first function associated with the first software application expires after an occurrence of an expiration event, wherein the expiration event is at least one of a lapse of a period of time, an event associated with a third party application, an event associated with an operating system, and a user-initiated event;

    receive a second request from the user for access to at least one second function associated with a second software application;

    determine that access to at least one second function associated with the second software application requires user authentication;

    receive a second credential from the user;

    validate the second credential, thereby resulting in a second successful user authentication; and

    grant access to the at least one second function associated with the second software application based on the second successful user authentication.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×