Continual authorization for secured functions
First Claim
Patent Images
1. A method of submitting a purchase request to an online commerce website using a computing device, the method comprising:
- comparing a cost of the purchase request to a first threshold amount and a second threshold amount, the second threshold amount being greater than the first threshold amount;
selecting one of multiple types of authentication credentials based on the comparison of the cost of the purchase request;
receiving a first authentication credential at the computing device;
determining if the first authentication credential matches a reference authentication credential that is associated with the cost of the purchase request;
if the first authentication credential matches the reference authentication credential, determining if a first user is authorized to submit the purchase request;
transmitting the purchase request from the computing device to the online commerce website when the first user is authorized to submit the purchase request; and
providing a grace period of a given amount of time to receive, by the computing device, at least one additional purchase request having a cost that is less than the second threshold amount;
whereinat least the operation of comparing the cost of the purchase request to the first threshold amount and the second threshold amount occurs prior to the operation of transmitting the purchase request.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing device may determine to execute a secured function. The computing may obtain a biometric of the user of the computing device utilizing one or more biometric sensors associated with the computing device, determine that the biometric matches the biometric of a user authorized to utilize the secured function, and execute the secured function. Whenever during execution of the secured function the computing device determines that the biometric sensor no longer detects the biometric of the user, the computing device may cease execution of the secured function.
-
Citations
18 Claims
-
1. A method of submitting a purchase request to an online commerce website using a computing device, the method comprising:
-
comparing a cost of the purchase request to a first threshold amount and a second threshold amount, the second threshold amount being greater than the first threshold amount; selecting one of multiple types of authentication credentials based on the comparison of the cost of the purchase request; receiving a first authentication credential at the computing device; determining if the first authentication credential matches a reference authentication credential that is associated with the cost of the purchase request; if the first authentication credential matches the reference authentication credential, determining if a first user is authorized to submit the purchase request; transmitting the purchase request from the computing device to the online commerce website when the first user is authorized to submit the purchase request; and providing a grace period of a given amount of time to receive, by the computing device, at least one additional purchase request having a cost that is less than the second threshold amount;
whereinat least the operation of comparing the cost of the purchase request to the first threshold amount and the second threshold amount occurs prior to the operation of transmitting the purchase request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of operating a computing device, the method comprising:
-
receiving, at the computing device, a purchase request that is associated with a first user; comparing a cost of the purchase request to first and second threshold amounts; when the cost of the purchase request is less than the first threshold amount, transmitting the purchase request to an online commerce website; when the cost of the purchase request is between the first and second threshold amounts, selecting a first reference authentication credential that is associated with the first threshold amount; when the cost of the purchase request is greater than the second threshold amount, selecting a different second reference authentication credential that is associated with the second threshold amount; receiving an authentication credential at the computing device; determining if the received authentication credential matches the selected reference authentication credential; determining if the first user is authorized to submit the purchase request when the received authentication credential matches the selected reference authentication credential; transmitting the purchase request to the online commerce website when the first user is authorized to submit the purchase request; and providing a grace period of a given amount of time to receive, by the computing device, at least one additional purchase request having a cost that is less than the threshold amount associated with the selected authentication credential. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computing device, comprising:
-
a processing unit; a biometric sensor operably connected to the processing unit; and a non-transitory storage medium storing instructions executable by the processing unit to; compare a cost of a purchase request to a first threshold amount and a second threshold amount, the second threshold amount being greater than the first threshold amount; select one of multiple types of authentication credentials based on the comparison of the cost of the purchase request; determine if a received authentication credential matches a reference authentication credential that is associated with the cost of the purchase request; transmit the purchase request to an online commerce website when the received authentication credential matches the reference authentication credential; and provide a grace period of a given amount of time to receive at least one additional purchase request having a cost that is less than the second threshold amount;
whereinat least the operation of comparing the cost of the purchase request to the first threshold amount and the second threshold amount occurs prior to the operation of transmitting the purchase request. - View Dependent Claims (17, 18)
-
Specification