Authenticating access to confidential information by unregistered requestor
    2.
    发明申请
    Authenticating access to confidential information by unregistered requestor 审中-公开
    验证未注册请求者访问机密信息

    公开(公告)号:US20160352725A1

    公开(公告)日:2016-12-01

    申请号:US15232228

    申请日:2016-08-09

    摘要: An unregistered requestor requests access to confidential information of an individual stored at a computer. In one embodiment, the requestor is authenticated by the computer using at least two authentication tests. When the requestor is authenticated, the computer determines access permission for the requestor based on information provided from the requestor, and provides, to the requestor, access to the confidential information of the individual based on the access permission. In another embodiment, the computer presents a series of challenges to the requestor, and if any of the challenges is passed, access is granted.

    摘要翻译: 未注册的请求者请求访问存储在计算机中的个人的机密信息。 在一个实施例中,请求者由计算机使用至少两个认证测试来认证。 当请求者被认证时,计算机基于从请求者提供的信息来确定请求者的访问权限,并且根据访问许可向请求者提供对个人机密信息的访问。 在另一个实施例中,计算机向请求者提出一系列挑战,并且如果通过了任何挑战,则允许访问。

    AUTHENTICATING ACCESS TO CONFIDENTIAL INFORMATION BY UNREGISTERED REQUESTOR
    3.
    发明申请
    AUTHENTICATING ACCESS TO CONFIDENTIAL INFORMATION BY UNREGISTERED REQUESTOR 有权
    未经授权的申请人核实获取保密信息

    公开(公告)号:US20150288668A1

    公开(公告)日:2015-10-08

    申请号:US14247713

    申请日:2014-04-08

    摘要: An unregistered requestor requests access to confidential information of an individual stored at a computer. In one embodiment, the requestor is authenticated by the computer using at least two authentication tests. When the requestor is authenticated, the computer determines access permission for the requestor based on information provided from the requestor, and provides, to the requestor, access to the confidential information of the individual based on the access permission. In another embodiment, the computer presents a series of challenges to the requestor, and if any of the challenges is passed, access is granted.

    摘要翻译: 未注册的请求者请求访问存储在计算机中的个人的机密信息。 在一个实施例中,请求者由计算机使用至少两个认证测试来认证。 当请求者被认证时,计算机基于从请求者提供的信息来确定请求者的访问权限,并且根据访问许可向请求者提供对个人机密信息的访问。 在另一个实施例中,计算机向请求者提出一系列挑战,并且如果通过了任何挑战,则允许访问。