Architecture for access management
First Claim
1. A method comprises:
- listening by a user device for a beacon from a security system, the beacon including a message;
rendering a graphical user interface on a display associated with the user device, with the graphical user interface including fields for entering an email address and a password to register the user device with the security server, and a user public key stored in a digital wallet and a user digital wallet identification associated with the user device;
initiating by the user device a transaction with a security server in response to the message; and
sending in response to the message, the user public key that is stored in the digital wallet, and which public key is embedded in a code.
4 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are techniques that render a graphical user interface on a display device for performing transactions with a security system. The techniques include listening by a user device for a beacon from the security system, the beacon including a message and imitating by the user device the transaction with the security system in response to the message, with the message causing the user device to render a graphical user interface that has fields for entering an email address and a password to register the user device with a security server, with the graphical user interface rendering on the display a public key stored in a user digital wallet and a user digital wallet identification and sending in response to the message, a user'"'"'s public key that is stored in the user'"'"'s wallet and which is embedded in a code.
74 Citations
15 Claims
-
1. A method comprises:
-
listening by a user device for a beacon from a security system, the beacon including a message; rendering a graphical user interface on a display associated with the user device, with the graphical user interface including fields for entering an email address and a password to register the user device with the security server, and a user public key stored in a digital wallet and a user digital wallet identification associated with the user device; initiating by the user device a transaction with a security server in response to the message; and sending in response to the message, the user public key that is stored in the digital wallet, and which public key is embedded in a code. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A user device comprises:
-
a processor device; memory operatively coupled to the processor device; a display operatively coupled to the processor device; a communication device operatively coupled to the processor device; the user device configured to; listen for a beacon from the security system, with the beacon including a message; render a graphical user interface on the display, with the graphical user interface including fields for entering an email address and a password to register the user device with the security server, and a user public key stored in a digital wallet and a user digital wallet identification associated with the user device; embedded the user public key into a code; initiate a transaction with a security server in response to the message; and send in response to the message, the user public key embedded in a code to the security server. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program product tangibly stored on a computer readable hardware storage device, the computer program product comprising instructions to cause a user device to:
-
listen for a beacon from a security system, the beacon including a message; render a graphical user interface on a display associated with the user device, with the graphical user interface including fields for entering an email address and a password to register the user device with the security server, and a user public key stored in a digital wallet and a user digital wallet identification associated with the user device; initiate a transaction with a security server in response to the message; and send in response to the message, the user public key that is stored in the digital wallet, and which public key is embedded in a code. - View Dependent Claims (12, 13, 14, 15)
-
Specification