Security information caching on authentication token
First Claim
1. A method comprising:
- monitoring a continuous user custody of a token having an identifier of the token representing a possession factor;
during a period of continuous user custody determined based on the monitoring of the continuous user custody, maintaining a knowledge factor in a memory of the token;
obtaining the knowledge factor in response to receiving a first authentication request prior to a second authentication request;
upon detecting a break in the continuous user custody, deleting the knowledge factor; and
during the period of continuous user custody determined based on the monitoring of the continuous user custody, and in response to the second authentication request received from a security system separate and distinct from the token, automatically conducting a multi-factor authentication by;
(a) presenting the identifier of the token to the security system verifying the identifier of the token, thereby satisfying a possession factor authentication, and(b) automatically retrieving the knowledge factor from the memory of the token and presenting the knowledge factor to the security system verifying the knowledge factor, thereby satisfying a knowledge factor authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of operating a security token to authenticate a user in a multi-factor authentication system is disclosed. The method includes: monitoring user custody of the token, the token having an identifying characteristic representing a possession factor for use through possession factor authentication; during a period of continuous user custody of the token based on the monitoring, obtaining a knowledge factor from a user having the continuous user custody; caching the knowledge factor in a memory of the token; and in response to a second authentication request, retrieving the knowledge factor from the memory to demonstrate to an authentication system knowledge of the knowledge factor, during the period of continuous user custody.
20 Citations
27 Claims
-
1. A method comprising:
-
monitoring a continuous user custody of a token having an identifier of the token representing a possession factor; during a period of continuous user custody determined based on the monitoring of the continuous user custody, maintaining a knowledge factor in a memory of the token; obtaining the knowledge factor in response to receiving a first authentication request prior to a second authentication request; upon detecting a break in the continuous user custody, deleting the knowledge factor; and during the period of continuous user custody determined based on the monitoring of the continuous user custody, and in response to the second authentication request received from a security system separate and distinct from the token, automatically conducting a multi-factor authentication by; (a) presenting the identifier of the token to the security system verifying the identifier of the token, thereby satisfying a possession factor authentication, and (b) automatically retrieving the knowledge factor from the memory of the token and presenting the knowledge factor to the security system verifying the knowledge factor, thereby satisfying a knowledge factor authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus acting as a token to conduct a multi-factor authentication, the apparatus comprising:
-
a sensor to take measurements indicative of continuous user custody of the token; a controller configured to monitor the measurements to determine a period of continuous user custody of the token; a memory to cache a knowledge factor during the period of continuous user custody, to obtain the knowledge factor in response to receiving a first authentication request prior to a second authentication request, and to delete the knowledge factor upon detecting a break in the continuous user custody; an interface to receive authentication requests from a security system, wherein the security system is separate and distinct from the apparatus; and the controller configured to retrieve an identifier of the token to demonstrate possession of a possession factor to the security system, in response to receiving the second authentication request, wherein the knowledge factor is different from the identifier of the token representing the possession factor; wherein, during the period of continuous user custody of the token, the controller is configured to retrieve the knowledge factor from the memory to demonstrate knowledge of the knowledge factor to the security system, in response to receiving the second authentication request at the interface. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. An apparatus comprising:
-
a sensor to take measurements indicative of continuous user custody of the apparatus; a controller configured to monitor the measurements to determine a period of continuous user custody of the apparatus and to provide an identifier representing a possession factor of the apparatus, the possession factor of the apparatus to satisfy a possession factor authentication on a security system; a memory to cache a knowledge factor to satisfy a knowledge factor authentication on the security system, and to obtain the knowledge factor in response to receiving a first authentication request prior to a second authentication request, wherein the knowledge factor is different from the identifier representing the possession factor; an output component to demonstrate the knowledge factor during the period of continuous user custody determined based on said taking measurements indicative of continuous user custody, the output component, in response to the second authentication request received from the security system separate and distinct from the apparatus, to automatically conduct a multi-factor authentication by; (a) presenting the identifier of the apparatus to the security system verifying the identifier of the apparatus, thereby satisfying the possession factor authentication, and (b) automatically retrieving the knowledge factor from the memory of the apparatus and presenting the knowledge factor to the security system verifying the knowledge factor, thereby satisfying the knowledge factor authentication; and wherein the knowledge factor is deleted from the memory when the period of continuous user custody ends. - View Dependent Claims (27)
-
Specification