Password management
First Claim
1. A method, comprising:
- determining, by a first computing device, that the first computing device is being worn;
while the first computing device is determined to be worn, detecting, by the first computing device, a machine-readable code that is displayed by a second computing device, wherein the machine-readable code identifies protected information that is viewable via the second computing device; and
responsive to detecting the machine-readable code while the first computing device is determined to be worn;
causing one or more biometric sensors associated with the first computing device to perform actions to collect, at the first computing device, biometric data after the first computing device detects the machine-readable code,based at least in part on the biometric data, the first computing device generating an authentication message that includes authentication information and identifies the protected information,sending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device, andafter sending the authentication message to the authentication server for the verification of the authentication information, deleting the collected biometric data.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatus, and computer-readable media are described herein related to biometric authentication. A first computing device can detect a machine-readable code displayed by a second computing device, where the machine-readable code can identify protected information viewable via the second computing device. In response to detecting the machine-readable code, the first computing device can acquire biometric data via one or more biometric sensors associated with the first computing device. Based at least in part on the biometric data, the first computing device can generate an authentication message that includes authentication information and identifies the protected information. The first computing device can then send the authentication message to an authentication server for verification of the authentication information, where verification of the authentication information can allow access to the protected information via the second computing device.
28 Citations
27 Claims
-
1. A method, comprising:
-
determining, by a first computing device, that the first computing device is being worn; while the first computing device is determined to be worn, detecting, by the first computing device, a machine-readable code that is displayed by a second computing device, wherein the machine-readable code identifies protected information that is viewable via the second computing device; and responsive to detecting the machine-readable code while the first computing device is determined to be worn; causing one or more biometric sensors associated with the first computing device to perform actions to collect, at the first computing device, biometric data after the first computing device detects the machine-readable code, based at least in part on the biometric data, the first computing device generating an authentication message that includes authentication information and identifies the protected information, sending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device, and after sending the authentication message to the authentication server for the verification of the authentication information, deleting the collected biometric data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A first computing device, comprising:
-
at least one processor; and a non-transitory computer-readable storage medium having stored thereon program instructions that, upon execution by the at least one processor, cause the first computing device to perform functions comprising; determining that the first computing device is being worn; while the first computing device is determined to be worn, detecting a machine-readable code that is displayed by a second computing device, wherein the machine-readable code identifies protected information that is viewable via the second computing device; and responsive to detecting the machine-readable code while the first computing device is determined to be worn; causing one or more biometric sensors associated with the first computing device to perform actions to collect biometric data after the first computing device detects the machine-readable code, based at least in part on the biometric data, generating an authentication message that includes authentication information and identifies the protected information, sending the authentication message to an authentication server for verification of the authentication information, wherein verification of the authentication information allows access to the protected information via the second computing device, and after sending the authentication message to the authentication server for the verification of the authentication information, deleting the collected biometric data. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification