-
公开(公告)号:US11451553B2
公开(公告)日:2022-09-20
申请号:US17006566
申请日:2020-08-28
发明人: Fengpei Du , Michael Lane , Kenneth Ives-Halperin
IPC分类号: G06F21/31 , H04L9/40 , H04L67/12 , H04L47/60 , H04L51/04 , H04L67/52 , H04L67/50 , H04L51/222
摘要: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.
-
公开(公告)号:US20190273741A1
公开(公告)日:2019-09-05
申请号:US16298453
申请日:2019-03-11
发明人: Fengpei Du , Michael Lane , Kenneth Ives-Halperin
摘要: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.
-
公开(公告)号:US10230729B2
公开(公告)日:2019-03-12
申请号:US15830543
申请日:2017-12-04
发明人: Fengpei Du , Michael Lane , Kenneth Ives-Halperin
摘要: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.
-
公开(公告)号:US10008057B2
公开(公告)日:2018-06-26
申请号:US14950758
申请日:2015-11-24
发明人: Kenneth Ives-Halperin , Harry C. Evans, III , David Johnson , Scott Wall , David Lilly , Ajay Pondicherry
IPC分类号: G07C9/00 , H04W4/00 , G06Q10/02 , G06Q20/32 , G06Q30/02 , H04L29/06 , H04W4/021 , H04W12/04 , H04W12/06 , H04W12/08
CPC分类号: G07C9/00119 , G06Q10/02 , G06Q20/3274 , G06Q20/40145 , G06Q30/0241 , G07C9/00087 , G07C9/00563 , G07C2009/00412 , G07C2209/08 , G07C2209/12 , H04L63/0492 , H04L63/0861 , H04W4/021 , H04W4/80 , H04W12/04 , H04W12/06 , H04W12/08
摘要: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.
-
公开(公告)号:US09898881B2
公开(公告)日:2018-02-20
申请号:US14951244
申请日:2015-11-24
发明人: Kenneth Ives-Halperin , Harry C. Evans, III , David Johnson , Scott Wall , David Lilly , Ajay Pondicherry
IPC分类号: G07C9/00 , G06Q10/02 , G06Q20/32 , G06Q30/02 , H04W4/00 , H04W4/02 , H04L29/06 , H04W12/04 , H04W12/06 , H04W12/08 , H04W84/18
CPC分类号: G07C9/00119 , G06Q10/02 , G06Q20/3274 , G06Q30/0241 , H04L63/0492 , H04L63/0861 , H04W4/021 , H04W4/80 , H04W12/04 , H04W12/06 , H04W12/08 , H04W84/18
摘要: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.
-
公开(公告)号:US09729641B2
公开(公告)日:2017-08-08
申请号:US15229259
申请日:2016-08-05
发明人: Kenneth Ives-Halperin , Jeffrey Kelsey , Jon Flanders , Yen Hoang
IPC分类号: G06F15/16 , H04L29/08 , H04W84/22 , H04L12/781
摘要: Systems and methods for selecting tiering protocols based on data transmissions over mesh networks within defined spatial areas can be provided. A mesh network can be established within a defined spatial area. Each network device within the mesh network can be a user device or a supernode. Further, a wireless communication link can be established between the user devices and supernodes. A plurality of tiered protocols for tiering data transmissions can be accessed. Data to be transmitted over the mesh network can be analyzed to determine which tiered protocol to select. Path data that identifies a routing path from the a user device to a supernode can be generated, and the data can be transmitted according to the path data.
-
公开(公告)号:US11356447B2
公开(公告)日:2022-06-07
申请号:US16786318
申请日:2020-02-10
摘要: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.
-
公开(公告)号:US20210352149A1
公开(公告)日:2021-11-11
申请号:US17328886
申请日:2021-05-24
发明人: Kenneth Ives-Halperin , Jeffrey Kelsey , Jon Flanders , Yen Hoang
摘要: Systems and methods for selecting tiering protocols based on data transmissions over mesh networks within defined spatial areas can be provided. A mesh network can be established within a defined spatial area. Each network device within the mesh network can be a user device or a supernode. Further, a wireless communication link can be established between the user devices and supernodes. A plurality of tiered protocols for tiering data transmissions can be accessed. Data to be transmitted over the mesh network can be analyzed to determine which tiered protocol to select. Path data that identifies a routing path from the a user device to a supernode can be generated, and the data can be transmitted according to the path data.
-
公开(公告)号:US20200342364A1
公开(公告)日:2020-10-29
申请号:US16871488
申请日:2020-05-11
发明人: Kenneth Ives-Halperin , Harry C. Evans, III , David Johnson , Scott Wall , David Lilly , Ajay Pondicherry
IPC分类号: G06Q10/02 , H04W4/80 , G06Q20/32 , G06Q30/02 , H04L29/06 , H04W4/021 , G07C9/00 , G06Q20/40 , G07C9/29 , G07C9/25 , H04W12/04 , H04W12/06 , H04W12/08
摘要: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.
-
公开(公告)号:US10560455B2
公开(公告)日:2020-02-11
申请号:US16252164
申请日:2019-01-18
摘要: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.
-
-
-
-
-
-
-
-
-