Biometrics based electronic device authentication and authorization
First Claim
1. A method for authentication and authorization, the method comprising:
- receiving, at a security server, a first indication of an access request for a first electronic device, wherein the first indication of the access request comprises biometric data, wherein the biometric data identifies a user requesting access to the first electronic device;
validating the biometric data against previously captured biometric data accessible by the security server;
in response to the biometric data being valid based, at least in part, on validating the biometric data against the previously captured biometric data,accessing a first user profile associated with the biometric data, wherein the first user profile comprises data that at least indicates an operation and a permission associated with the operation;
generating a message that indicates access authorization to the first electronic device in accordance with the first user profile, wherein the message includes a subset of the first user profile that at least indicates the operation and the permission; and
transmitting the message to the first electronic device;
in response to the biometric data being not valid based, at least in part, on validating the biometric data against the previously captured biometric data, generating and transmitting a notification that an unauthorized access has been attempted;
receiving, at the security server, an indication of a configuration request for the first electronic device, wherein the indication of the configuration request is associated with a zero configuration networking protocol, wherein the indication of the configuration request comprises the biometric data;
determining whether the biometric data of the configuration request is associated with a second user profile, the second user profile having a user permission indicating that the user is permitted to configure an electronic device;
in response to determining that the biometric data of the configuration request is associated with the second user profile, configuring the first electronic device to operate with the security server; and
in response to determining that the biometric data of the configuration request is not associated with the second user profile, denying the configuration request.
1 Assignment
0 Petitions
Accused Products
Abstract
An indication of a configuration request for an electronic device is received. An indication of an access request for the electronic device is received after receiving the indication of the configuration request. The indication of the access request comprises biometric data. The biometric data is validated against previously captured biometric data. If the biometric data is valid based, at least in part, on said validation of the biometric data, a user profile associated with the biometric data is accessed and access to the electronic device is authorized in accordance with the user profile. If the biometric data is not valid based, at least in part, on said validation of the biometric data, a notification that an unauthorized access has been attempted is generated and transmitted.
67 Citations
32 Claims
-
1. A method for authentication and authorization, the method comprising:
-
receiving, at a security server, a first indication of an access request for a first electronic device, wherein the first indication of the access request comprises biometric data, wherein the biometric data identifies a user requesting access to the first electronic device; validating the biometric data against previously captured biometric data accessible by the security server; in response to the biometric data being valid based, at least in part, on validating the biometric data against the previously captured biometric data, accessing a first user profile associated with the biometric data, wherein the first user profile comprises data that at least indicates an operation and a permission associated with the operation; generating a message that indicates access authorization to the first electronic device in accordance with the first user profile, wherein the message includes a subset of the first user profile that at least indicates the operation and the permission; and transmitting the message to the first electronic device; in response to the biometric data being not valid based, at least in part, on validating the biometric data against the previously captured biometric data, generating and transmitting a notification that an unauthorized access has been attempted; receiving, at the security server, an indication of a configuration request for the first electronic device, wherein the indication of the configuration request is associated with a zero configuration networking protocol, wherein the indication of the configuration request comprises the biometric data; determining whether the biometric data of the configuration request is associated with a second user profile, the second user profile having a user permission indicating that the user is permitted to configure an electronic device; in response to determining that the biometric data of the configuration request is associated with the second user profile, configuring the first electronic device to operate with the security server; and in response to determining that the biometric data of the configuration request is not associated with the second user profile, denying the configuration request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable storage medium having instructions stored therein, which when executed by a processor causes the processor to perform operations that comprise:
-
receiving, at a security server, a first indication of an access request for an electronic device, wherein the first indication of the access request comprises biometric data, wherein the biometric data identifies a user requesting access to the electronic device; validating the biometric data against previously captured biometric data accessible by the security server; in response to the biometric data being valid based, at least in part, on validating the biometric data against the previously captured biometric data, accessing a first user profile associated with the biometric data, wherein the first user profile at least indicates an operation and a permission associated with the operation;
generating a message that indicates access authorization to the electronic device in accordance with the first user profile, wherein the message includes a subset of the first user profile that at least indicates the operation and the permission; andtransmitting the message to the electronic device; in response to the biometric data being not valid based, at least in part, on validating the biometric data against the previously captured biometric data, generating and transmitting a notification that an unauthorized access has been attempted; receiving, at the security server, an indication of a configuration request for the electronic device, wherein the indication of the configuration request is associated with a zero configuration networking protocol, wherein the indication of the configuration request comprises the biometric data; determining whether the biometric data of the configuration request is associated with a second user profile, the second user profile having a user permission indicating that the user is permitted to configure the electronic device; in response to determining that the biometric data of the configuration request is associated with the second user profile, configuring the electronic device to operate with the security server; and in response to determining that the biometric data of the configuration request is not associated with the second user profile, denying the configuration request. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A device comprising:
-
a network interface; and memory including instructions stored therein, the instructions executable by a processor to cause the device to; receive a first indication of an access request for an electronic device, wherein the first indication of the access request comprises biometric data, wherein the biometric data identifies a user requesting access to the electronic device; validate the biometric data against previously captured biometric data accessible by the device; in response to the biometric data being valid based, at least in part, on validation of the biometric data against the previously captured biometric data, access a first user profile associated with the biometric data, wherein the first user profile at least indicates an operation and a permission associated with the operation; generate a message that indicates access authorization to the electronic device in accordance with the first user profile, wherein the message includes a subset of the first user profile that at least indicates the operation and the permission; and transmit the message to the electronic device; in response to the biometric data not being valid based, at least in part, on validation of the biometric data against the previously captured biometric data, generate and transmit a notification that an unauthorized access has been attempted; receive an indication of a configuration request for the electronic device, wherein the indication of the configuration request is associated with a zero configuration networking protocol, wherein the indication of the configuration request comprises the biometric data; determine whether the biometric data of the configuration request is associated with a second user profile, the second user profile having a user permission indicating that the user is permitted to configure the electronic device; in response to a determination that the biometric data of the configuration request is associated with the second user profile, configure the electronic device to operate with the device; and in response to a determination that the biometric data of the configuration request is not associated with the second user profile, deny the configuration request. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
Specification