Wireless token device
First Claim
1. At least one non-transitory, machine accessible storage medium having instructions stored thereon, wherein the instructions, when executed on a machine, cause the machine to perform a method comprising:
- establishing a connection between a first computing device and a wireless token device over a short-range wireless network;
sending first authentication data from the wireless token device to the first computing device over the short-range wireless network, wherein the first authentication data is based at least in part on user identifier data;
detecting a second computing device as collocated with the wireless token device, using the short-range wireless network;
establishing a connection between the second computing device and the wireless token device over the short-range wireless network; and
sending second authentication data stored in memory of the wireless token device from the wireless token device to the second computing device over the short-range wireless network, wherein the second authentication data is based at least in part on the user identifier data, the second computing device is authenticated for use by a particular user in a particular computing session based on the second authentication data, authenticating the second computing device permits the second computing device to participate in the particular computing session and causes association with the particular user within the particular computing session to transition from the first computing device to the second computing device,the first computing device is authenticated for use in the particular computing session based on the first authentication data, authenticating the first computing device permits the first computing device to participate in the particular computing session, and authentication of the first computing device to the particular computing session is terminated.
2 Assignments
0 Petitions
Accused Products
Abstract
A first computing device is detected as substantially collocated with a wireless token device, using a short-range wireless communication network, and a connection is established between the first computing device and the wireless token device over the short-range wireless network. Authentication data stored in memory of the wireless token device is sent from the wireless token device to the first computing device over the short-range wireless network. The first computing device is authenticated to a particular computing session based on the authentication data and authenticating the first computing device permits the first computing device to participate in the particular computing session.
-
Citations
24 Claims
-
1. At least one non-transitory, machine accessible storage medium having instructions stored thereon, wherein the instructions, when executed on a machine, cause the machine to perform a method comprising:
-
establishing a connection between a first computing device and a wireless token device over a short-range wireless network; sending first authentication data from the wireless token device to the first computing device over the short-range wireless network, wherein the first authentication data is based at least in part on user identifier data; detecting a second computing device as collocated with the wireless token device, using the short-range wireless network; establishing a connection between the second computing device and the wireless token device over the short-range wireless network; and sending second authentication data stored in memory of the wireless token device from the wireless token device to the second computing device over the short-range wireless network, wherein the second authentication data is based at least in part on the user identifier data, the second computing device is authenticated for use by a particular user in a particular computing session based on the second authentication data, authenticating the second computing device permits the second computing device to participate in the particular computing session and causes association with the particular user within the particular computing session to transition from the first computing device to the second computing device, the first computing device is authenticated for use in the particular computing session based on the first authentication data, authenticating the first computing device permits the first computing device to participate in the particular computing session, and authentication of the first computing device to the particular computing session is terminated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 20, 23)
-
-
17. A method, comprising:
-
establishing a connection between a first computing device and a wireless token device over a short-range wireless network; sending first authentication data from the wireless token device to the first computing device over the short-range wireless network, wherein the first authentication data is based at least in part on user identifier data; detecting a second computing device as collocated with a wireless token device, using the short-range wireless network; establishing a connection between the second computing device and the wireless token device over the short-range wireless network; and sending second authentication data stored in memory of the wireless token device from the wireless token device to the second computing device over the short-range wireless network, wherein the second authentication data is based at least in part on the user identifier data, the second computing device is authenticated for use by a particular user in a particular computing session based on the second authentication data, authenticating the second computing device permits the second computing device to participate in the particular computing session and causes association with the particular user within the particular computing session to transition from the first computing device to the second computing device, the first computing device is authenticated for use in the particular computing session based on the first authentication data, authenticating the first computing device permits the first computing device to participate in the particular computing session, the particular computing session persists during a transition from use of the first computing device to use of the second computing device by the particular user, and authentication of the first computing device to the particular computing session is terminated. - View Dependent Claims (24)
-
-
18. A wireless token apparatus comprising:
-
a processor device; a memory element; a short-range wireless network adapter adapted to detect computing devices as collocated with the apparatus, using a short-range wireless network; and establish connections between a first computing device and the apparatus over the short-range wireless network; and an authentication broker adapted to send first authentication data to the first computing device over the short-range wireless network, wherein the first authentication data is based at least in part on user identifier data; send second authentication data stored in the memory element to a second computing device over the short-range wireless network, wherein the second authentication data is based at least in part on the user identifier data, the second computing device is authenticated for use by a particular user in a particular computing session based on the second authentication data, authenticating the second computing device permits the second computing device to participate in the particular computing session and causes association with the particular user within the particular computing session to transition from the first computing device to the second computing device, the first computing device is authenticated for use in the particular computing session based on the first authentication data, authenticating the first computing device permits the first computing device to participate in the particular computing session, the particular computing session persists during a transition from use of the first computing device to use of the second computing device by the particular user, and authentication of the first computing device to the particular computing session is terminated. - View Dependent Claims (19, 21, 22)
-
Specification