Systems and methods for protecting identity metrics

A computer-implemented method for protecting identity metrics may include (i) receiving, by a computing device and from an originating device, an identity metric encrypted by an identity metric protection module on the originating device, where the identity metric includes biometric data about an op...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Henry, Colleen Kelly
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A computer-implemented method for protecting identity metrics may include (i) receiving, by a computing device and from an originating device, an identity metric encrypted by an identity metric protection module on the originating device, where the identity metric includes biometric data about an operator of the originating device, (ii) requesting, by an identity metric protection module on the computing device, a decryption key from an identity metric protection server, (iii) receiving, by the identity metric protection module, the decryption key from the identity metric protection server, (iv) decrypting, by the identity metric protection module, the identity metric with the decryption key received from the identity metric protection server, and (v) providing the decrypted identity metric to an application on the computing device that uses the identity metric to convey a communication from the operator of the originating device. Various other methods, systems, and computer-readable media are also disclosed.