Workstation log-in
First Claim
1. A method performed by a computer system, the method comprising:
- pairing the computer system with a mobile device;
receiving, by the computer system and from the mobile device, a user name, a password encrypted with a connector password key, and a public key of the mobile device;
providing, by the computer system and to a server, the password encrypted with the connector password key;
receiving, by the computer system and from the server, the password not encrypted with the connector password key;
obtaining, by the computer system, a pairing key;
encrypting, by the computer system, the pairing key using the public key of the mobile device;
encrypting, by the computer system, the password with a local password key of the computer system;
providing, by the computer system and to the mobile device, (i) the pairing key encrypted using the public key of the mobile device and (ii) the password encrypted with the local password key of the computer system, wherein the public key of the mobile device is different from the local password key of the computer system; and
providing, by the computer system, an identifier for the computer system to the mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method including actions of pairing with a mobile device and receiving a user name, a password encrypted with a connector password key, and a public key of the mobile device. Additional actions include providing the password encrypted with the connector password key, receiving the password in a decrypted form, obtaining a pairing key, encrypting the pairing key using the public key, encrypting the password with a local password key, providing the pairing key encrypted using the public key and the password encrypted with the local password key, disconnecting from the mobile device, after disconnecting form the mobile device, reconnecting with mobile device, providing a workstation identification, receiving the user name and the password encrypted with the local password key, decrypting the password encrypted with the local password key, and logging in the user using the user name and the password decrypted with the local password key.
114 Citations
20 Claims
-
1. A method performed by a computer system, the method comprising:
-
pairing the computer system with a mobile device; receiving, by the computer system and from the mobile device, a user name, a password encrypted with a connector password key, and a public key of the mobile device; providing, by the computer system and to a server, the password encrypted with the connector password key; receiving, by the computer system and from the server, the password not encrypted with the connector password key; obtaining, by the computer system, a pairing key; encrypting, by the computer system, the pairing key using the public key of the mobile device; encrypting, by the computer system, the password with a local password key of the computer system; providing, by the computer system and to the mobile device, (i) the pairing key encrypted using the public key of the mobile device and (ii) the password encrypted with the local password key of the computer system, wherein the public key of the mobile device is different from the local password key of the computer system; and providing, by the computer system, an identifier for the computer system to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a computer system comprising one or more computers; and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; pairing the computer system with a mobile device; receiving, by the computer system and from the mobile device, a user name, a password encrypted with a connector password key, and a public key of the mobile device; providing, by the computer system and to a server, the password encrypted with the connector password key; receiving, by the computer system and from the server, the password not encrypted with the connector password key; obtaining, by the computer system, a pairing key; encrypting, by the computer system, the pairing key using the public key of the mobile device; encrypting, by the computer system, the password with a local password key of the computer system; providing, by the computer system and to the mobile device, (i) the pairing key encrypted using the public key of the mobile device and (ii) the password encrypted with the local password key of the computer system, wherein the public key of the mobile device is different from the local password key of the computer system; and providing, by the computer system, an identifier for the computer system to the mobile device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. One or more non-transitory computer-readable media storing software comprising instructions executable by a computer system comprising one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
pairing the computer system with a mobile device; receiving, by the computer system and from the mobile device, a user name, a password encrypted with a connector password key, and a public key of the mobile device; providing, by the computer system and to a server, the password encrypted with the connector password key; receiving, by the computer system and from the server, the password not encrypted with the connector password key; obtaining, by the computer system, a pairing key; encrypting, by the computer system, the pairing key using the public key of the mobile device; encrypting, by the computer system, the password with a local password key of the computer system; providing, by the computer system and to the mobile device, (i) the pairing key encrypted using the public key of the mobile device and (ii) the password encrypted with the local password key of the computer system, wherein the public key of the mobile device is different from the local password key of the computer system; and providing, by the computer system, an identifier for the computer system to the mobile device. - View Dependent Claims (18, 19, 20)
-
Specification