Selecting authentication method based on user constraints

    公开(公告)号:US12255891B2

    公开(公告)日:2025-03-18

    申请号:US17936461

    申请日:2022-09-29

    Abstract: Methods and systems for authenticating a user. One system includes a camera and an authentication computer. The authentication computer is configured to receive an image of a user captured by the camera, determine, based on the image, a constraint of the user impacting an availability of a part of the user's body for use in authenticating the user, and determine, based on the constraint of the user, an action to be performed by the user. The authentication computer is also configured to transmit data to a user device worn by the user, the data usable by the user device to output instructions to the user to perform the action, and, in response to detecting the action performed by the user, authenticating the user to use a resource.

    Detecting related information on calls in multi-tenant system and for consent based information sharing

    公开(公告)号:US12154555B2

    公开(公告)日:2024-11-26

    申请号:US17756624

    申请日:2019-12-05

    Abstract: Methods and systems for consent based information sharing. One system includes a server including an electronic processor configured to receive a first set of parsed communication data for a first talkgroup and a second set of parsed communication data for a second talkgroup. The electronic processor is configured to determine a topic of interest of the first talkgroup. The electronic processor is configured to identify relevant communication data from the second set of parsed communication data, where the relevant communication data is relevant to the topic of interest. The electronic processor is configured to determine whether the relevant communication data is shareable. The electronic processor is configured to, in response to determining that the relevant communication data is not shareable, request consent from the first talkgroup and the second talkgroup to share the relevant communication data, and, in response to receiving consent, enable sharing of the relevant communication data.

    SELECTING AUTHENTICATION METHOD BASED ON USER CONSTRAINTS

    公开(公告)号:US20240114023A1

    公开(公告)日:2024-04-04

    申请号:US17936461

    申请日:2022-09-29

    CPC classification number: H04L63/0861 H04L63/205

    Abstract: Methods and systems for authenticating a user. One system includes a camera and an authentication computer. The authentication computer is configured to receive an image of a user captured by the camera, determine, based on the image, a constraint of the user impacting an availability of a part of the user's body for use in authenticating the user, and determine, based on the constraint of the user, an action to be performed by the user. The authentication computer is also configured to transmit data to a user device worn by the user, the data usable by the user device to output instructions to the user to perform the action, and, in response to detecting the action performed by the user, authenticating the user to use a resource.

    DETECTING RELATED INFORMATION ON CALLS IN MULTI-TENANT SYSTEM AND FOR CONSENT BASED INFORMATION SHARING

    公开(公告)号:US20220415313A1

    公开(公告)日:2022-12-29

    申请号:US17756624

    申请日:2019-12-05

    Abstract: Methods and systems for consent based information sharing. One system includes a server including an electronic processor configured to receive a first set of parsed communication data for a first talkgroup and a second set of parsed communication data for a second talkgroup. The electronic processor is configured to determine a topic of interest of the first talkgroup. The electronic processor is configured to identify relevant communication data from the second set of parsed communication data, where the relevant communication data is relevant to the topic of interest. The electronic processor is configured to determine whether the relevant communication data is shareable. The electronic processor is configured to, in response to determining that the relevant communication data is not shareable, request consent from the first talkgroup and the second talkgroup to share the relevant communication data, and, in response to receiving consent, enable sharing of the relevant communication data.

Patent Agency Ranking