User authentication based on FOB/indicia scan
    54.
    发明授权
    User authentication based on FOB/indicia scan 有权
    基于FOB /标记扫描的用户认证

    公开(公告)号:US09584527B2

    公开(公告)日:2017-02-28

    申请号:US15019627

    申请日:2016-02-09

    Abstract: Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one function associated with a first application; determining that access to at least one function requires user authentication; initiating sensing of an authentication validating carrier comprising a first credential; determining the first credential based at least in part on the sensed authentication validating carrier; validating the first credential, thereby resulting in a first successful user authentication; and granting access to at least one function associated with the first application based on the validation of the first successful user authentication.

    Abstract translation: 本发明的实施例涉及用于从用户接收对与第一应用相关联的至少一个功能的访问的请求的系统,方法和计算机程序产品; 确定对至少一个功能的访问需要用户认证; 启动对包括第一凭证的验证验证载体的感测; 至少部分地基于感测到的认证验证载体来确定第一证书; 验证第一个凭证,从而导致第一个成功的用户认证; 以及基于所述第一成功用户认证的验证,授予对与所述第一应用相关联的至少一个功能的访问。

    USER AUTHENTICATION BASED ON OTHER APPLICATIONS

    公开(公告)号:US20160134614A1

    公开(公告)日:2016-05-12

    申请号:US14980974

    申请日:2015-12-28

    Abstract: The present invention includes a system for authenticating a second action based on a first action, wherein the system is configured to: receive a first request to execute a first action associated with a first application; determine that execution of the first action requires user authentication; request one or more authentication credentials from the user; receive a first authentication credential associated with the first action; validate the first authentication credential, thereby resulting in a successful validation of the received first authentication credential; in response to the successful validation, execute the first action; receive a second request to execute a second action associated with a second application; determine that execution of the second action requires user authentication; use the successful validation of the first authentication credential to validate a second authentication credential so that the second action may be executed.

Patent Agency Ranking