METHOD AND SYSTEM OF USER CONNECTION WITH PORTABLE DEVICE Russian patent published in 2020 - IPC G06F21/32 

Abstract RU 2717957 C2

FIELD: computer equipment.

SUBSTANCE: method includes: obtaining, by a computing device, a first physiological information of a wearable device user; comparison by the computing device of the obtained first physiological information with the saved physiological profile; updating by computing device based on trust value comparison; determining, by a computing device, that the confidence value is below a threshold value; transmitting, by the computing device into the portable device, a request to the portable device of the second physiological information; obtaining, by a computing device, a response from a wearable device, comprising a second physiological information of the user during the user's prescribed action; user verification by a computing device based on the second physiological information of the user; and approval or rejection of financial transaction.

EFFECT: technical result is higher security of transactions.

21 cl, 16 dwg

Similar patents RU2717957C2

Title Year Author Number
MULTIPLE-DEVICE TRANSACTION VERIFICATION 2016
  • Jin, Jing
  • Nelsen, Mark
  • Sheets, John
  • Wagner, Kim
RU2711464C2
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS 2015
  • Le Saint, Eric
  • Gordon, James
  • Joshi, Roopesh
RU2710897C2
TOKENIZATION REQUEST VIA ACCESS DEVICE 2015
  • Dimmick, James
RU2708945C2
SUPPORT PLATFORM FOR INTER-MACHINE DEVICES 2015
  • Prakash, Gyan
  • Gaddam, Ajit
  • Aissi, Selim
RU2707939C2
SYSTEM FOR SECURE REMOTE TRANSACTIONS USING MOBILE APPARATUSES 2018
  • Tadiparti, Srinivas
RU2769946C2
TRUSTED INTEGRITY MANAGER (TIM) 2010
  • Tavo Sebast'En
  • Nakhari Khadi
  • Djupra Ehrik
RU2523304C2
ON-LINE COMMERCIAL TRANSACTIONS 2006
  • Dzhonson Brjus Eh.
  • Vebster-Lehm Chung
RU2402814C2
ADAPTER FOR PROVIDING UNIFIED TRANSACTION INTERFACE 2018
  • Chen, Yuexi
  • Kekicheff, Marc
  • Martin, Philippe
RU2780821C2
MOBILE DEVICE IDENTIFICATION SYSTEMS AND METHODS 2015
  • Badenhorst, Cornelius Johannes
RU2704750C2
METHOD OF DETECTING UNAUTHORIZED ACCESS TO SOFTWARE AND NOTIFICATION THEREOF 2015
  • Aabye, Christian
  • Youdale, Robert
  • Nosseir, Mohamed
  • Singh, Brijendra
  • Hillar, Paul
RU2705019C2

RU 2 717 957 C2

Authors

Huxham, Horatio Nelson

Dates

2020-03-27Published

2016-04-07Filed