Apparatus, system and method employing a wireless user-device
First Claim
Patent Images
1. An authentication system for controlling access to resources on at least one computer, the authentication system comprising:
- a protected computer having associated computer resources, the protected computer including a wireless signal receiver for receiving a wireless signal,a portable device configured to communicate with the protected computer, the portable device including;
a processor configured to provide a user interface configured to receive and to authenticate an identity of a user based on at least secret information known to the user of the portable device;
the processor further configured to generate a first unique value following a successful authentication, by the portable device, of the user; and
a wireless transceiver coupled to the processor and configured to transmit the wireless signal including the first unique value; and
a secure registry component, connected to the protected computer, the secure registry component configured to receive the first unique value and successfully authenticate the user of the portable device where the first unique value is matched to the user by the secure registry component,wherein the secure registry component is further configured to permit access to the user of the portable device to operate the protected computer to access the associated computer resources based on the successful authentication of the user, and is further configured to maintain access to the user of the portable device to operate the protected computer to access the associated computer resources so long as;
the portable device is determined, by the protected computer, to be within a minimum wireless signal proximity of the wireless signal receiver of the protected computer, andthe secure registry component periodically receives at least one second unique value that maintains authentication of the portable device to the secure registry component, the at least one second unique value being different than the first unique value.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention generally relate to apparatus, systems and methods for authenticating an entity for computer and/or network security and for selectively granting access privileges and providing other services in response to such authentications.
216 Citations
25 Claims
-
1. An authentication system for controlling access to resources on at least one computer, the authentication system comprising:
-
a protected computer having associated computer resources, the protected computer including a wireless signal receiver for receiving a wireless signal, a portable device configured to communicate with the protected computer, the portable device including; a processor configured to provide a user interface configured to receive and to authenticate an identity of a user based on at least secret information known to the user of the portable device; the processor further configured to generate a first unique value following a successful authentication, by the portable device, of the user; and a wireless transceiver coupled to the processor and configured to transmit the wireless signal including the first unique value; and a secure registry component, connected to the protected computer, the secure registry component configured to receive the first unique value and successfully authenticate the user of the portable device where the first unique value is matched to the user by the secure registry component, wherein the secure registry component is further configured to permit access to the user of the portable device to operate the protected computer to access the associated computer resources based on the successful authentication of the user, and is further configured to maintain access to the user of the portable device to operate the protected computer to access the associated computer resources so long as; the portable device is determined, by the protected computer, to be within a minimum wireless signal proximity of the wireless signal receiver of the protected computer, and the secure registry component periodically receives at least one second unique value that maintains authentication of the portable device to the secure registry component, the at least one second unique value being different than the first unique value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An authentication system for controlling access to resources on at least one computer, the authentication system comprising:
-
a protected computer having associated computer resources, the protected computer including a wireless signal receiver for receiving a wireless signal; a portable device configured to communicate with the protected computer, the portable device including; a processor configured to provide a user interface programmed to authenticate a user to the portable device based on at least secret information known to the user of the portable device; the processor programmed to generate a first unique value following a successful authentication of the user to the portable device; and a wireless transceiver coupled to the processor and configured to transmit a wireless signal including the first unique value; and a secure registry component, executing at least in part on the protected computer including a communication interface, the secure registry component configured to receive the first unique value and successfully authenticate the user of the portable device to the protected computer where the first unique value is matched to the user by the secure registry component, and further configured to pass the successful authentication to the protected computer; wherein the user of the portable device is permitted to operate the protected computer to access the associated computer resources based on the successful authentication of the user, and is permitted to continue operating the protected computer so long as; the portable device is determined, by the protected computer, to be within a minimum wireless signal proximity of the wireless signal receiver of the protected computer, and the secure registry component periodically receives at least one second unique value that maintains authentication of the portable device to the secure registry component, the at least one second unique value being different than the first unique value. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification