Keyless access to laptop
First Claim
Patent Images
1. A method comprising:
- transmitting, by a mobile device, an authentication request to a cloud information handling system (IHS) to determine that the mobile device is authorized to unlock a node IHS;
determining, by the mobile device, that the node IHS is within range of a near field communication interface of the mobile device;
transmitting, by the mobile device, an encrypted gadget token over the wireless interface between the mobile device and the node IHS in response to determining that the node IHS is within range;
transmitting, by the node IHS, an encrypted cloud token based on the encrypted gadget token over a communication link between the node IHS and a cloud IHS;
authenticating, by the cloud IHS, the encrypted cloud token;
transmitting, by the cloud IHS, an encrypted authentication token based on the encrypted cloud token over the communication link to the node IHS;
verifying, by the node IHS, that the transmission of the encrypted gadget token is from the mobile device;
authenticating, by the node IHS, the encrypted authentication token; and
unlocking the node IHS based on the authenticating of the encrypted authentication token.
14 Assignments
0 Petitions
Accused Products
Abstract
A method including transmitting, by a mobile device, a first encrypted gadget token over a wireless link to an Information Handling System (IHS). The method further including transmitting, by the IHS, an encrypted system token based on the first decrypted gadget token over the wireless link to the mobile device, transmitting, by the mobile device, a second encrypted gadget token based on the decrypted system token over the wireless link to the IHS, authenticating, by the IHS, the second decrypted gadget token, and unlocking the IHS based on the second authenticated gadget token.
-
Citations
14 Claims
-
1. A method comprising:
-
transmitting, by a mobile device, an authentication request to a cloud information handling system (IHS) to determine that the mobile device is authorized to unlock a node IHS; determining, by the mobile device, that the node IHS is within range of a near field communication interface of the mobile device; transmitting, by the mobile device, an encrypted gadget token over the wireless interface between the mobile device and the node IHS in response to determining that the node IHS is within range; transmitting, by the node IHS, an encrypted cloud token based on the encrypted gadget token over a communication link between the node IHS and a cloud IHS; authenticating, by the cloud IHS, the encrypted cloud token; transmitting, by the cloud IHS, an encrypted authentication token based on the encrypted cloud token over the communication link to the node IHS; verifying, by the node IHS, that the transmission of the encrypted gadget token is from the mobile device; authenticating, by the node IHS, the encrypted authentication token; and unlocking the node IHS based on the authenticating of the encrypted authentication token. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A wireless authentication system comprising:
-
a mobile device having a first wireless communication module; and a node Information Handling System (IHS) having a second wireless communication module to provide a wireless link to the mobile device via the first wireless communication module; wherein the mobile device is configured to; transmit an authentication request to a cloud IHS to determine that the mobile device is authorized to unlock the node IHS; determine that the node IHS is within range of a near field communication interface of the mobile device; and transmit an encrypted gadget token over the wireless link to the IHS in response to determining that the node IHS is within range; wherein the node IHS is configured to transmit an encrypted cloud token based on the encrypted gadget token over a communication link to an authentication system, to receive an encrypted authentication token over the communication link from the authentication system, to verify that the transmission of the encrypted gadget token is from the mobile device, and to unlock the node IHS based on the encrypted authentication token, wherein the encrypted authentication token is based on the encrypted cloud token. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A wireless authentication system comprising:
-
a mobile device; a first information handling system coupled to the mobile device via a first wireless link; a second information handling system coupled to the mobile device via a second wireless link; and an authentication system; wherein the mobile device is configured to; transmit an authentication request to a cloud IHS to determine that the mobile device is authorized to unlock the first and second information handling systems; determine that the first information handling system is within range of a near field communication interface of the mobile device; transmit a first encrypted gadget token over the first wireless link to the first information handling system in response to determining that the first information handling system is within range; and transmit a second encrypted gadget token over the second wireless link to the second information handling system; wherein the first information handling system is configured to transmit a first encrypted cloud token based on the first encrypted gadget token over a first communication link to the authentication system; wherein the second information handling system is configured to transmit a second encrypted cloud token based on the second encrypted gadget token over a second communication link to the authentication system; wherein the authentication system is configured to; authenticate the first and second encrypted cloud tokens; transmit a first encrypted authentication token based on the first encrypted cloud token over the first communication link to the first information handling system; and transmit a second encrypted authentication token based on the second encrypted cloud token over the second communication link to the second information handling system; wherein the first information handling system is further configured to verify that the transmission of the first encrypted gadget token is from the mobile device, and to unlock the first information handling system based on the first encrypted authentication token; and wherein the second information handling system is further configured to unlock the second information handling system based on the second encrypted authentication token. - View Dependent Claims (12, 13, 14)
-
Specification