Authentication employing the bluetooth communication protocol
First Claim
Patent Images
44. A device capable of communicating with a communication network via a Bluetooth communication protocol, said device including at least one authentication functionality at least part of at least one of which forms part of said Bluetooth communication protocol.
1 Assignment
0 Petitions
Accused Products
Abstract
A device and method capable of communicating with a communication network via a Bluetooth communication protocol, wherein the device includes at least one authentication functionality, at least part of at least one of which is operative to communicate authentication information via the Bluetooth communication protocol.
-
Citations
440 Claims
-
44. A device capable of communicating with a communication network via a Bluetooth communication protocol, said device including at least one authentication functionality at least part of at least one of which forms part of said Bluetooth communication protocol.
- View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
45. A device according to claim 44 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
46. A device according to claim 44 and wherein said device is effective to identify said device to an authenticator coupled to said communication network.
-
47. A device according to claim 44 and wherein said device is effective to identify another device to an authenticator coupled to said communication network.
-
48. A device according to claim 44 and wherein said device is effective to identify a user to an authenticator coupled to said communication network.
-
49. A device according to claim 44 and wherein said device is a dedicated authentication device.
-
50. A device according to claim 49 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
51. A device according to claim 44 and wherein said device includes substantial non-authentication functionality.
-
52. A device according to claim 51 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
53. A device according to claim 51 and wherein said device comprises a telephone.
-
54. A device according to claim 51 and wherein said device comprises a PDA.
-
55. A device according to claim 51 and wherein said device comprises a computer.
-
56. A device according to claim 51 and wherein said device comprises an electronic wallet.
-
57. A device according to claim 44 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
58. A device according to claim 57 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
59. A device according to claim 57 and wherein said device is a dedicated authentication device.
-
60. A device according to claim 57 and wherein said device includes substantial non-authentication functionality.
-
61. A device according to claim 44 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
62. A device according to claim 44 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
63. A device according to claim 44 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
64. A device according to claim 63 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
65. A device according to claim 63 and wherein said device is a dedicated authentication device.
-
66. A device according to claim 63 and wherein said device includes substantial non-authentication functionality.
-
67. A device according to claim 63 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
68. A device according to claim 67 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
69. A device according to claim 67 and wherein said device is a dedicated authentication device.
-
70. A device according to claim 67 and wherein said device includes substantial non-authentication functionality.
-
45. A device according to claim 44 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
71. A device capable of communicating with a communication network, said device comprising at least one authentication functionality at least part of at least one of which employs a Bluetooth communication protocol.
- View Dependent Claims (72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97)
-
72. A device according to claim 71 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
73. A device according to claim 71 and wherein said device is effective to identify said device to an authenticator coupled to said communication network.
-
74. A device according to claim 71 and wherein said device is effective to identify another device to an authenticator coupled to said communication network.
-
75. A device according to claim 71 and wherein said device is effective to identify a user to an authenticator coupled to said communication network.
-
76. A device according to claim 71 and wherein said device is a dedicated authentication device.
-
77. A device according to claim 76 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
78. A device according to claim 71 and wherein said device includes substantial non-authentication functionality.
-
79. A device according to claim 78 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
80. A device according to claim 78 and wherein said device comprises a telephone.
-
81. A device according to claim 78 and wherein said device comprises a PDA.
-
82. A device according to claim 78 and wherein said device comprises a computer.
-
83. A device according to claim 78 and wherein said device comprises an electronic wallet.
-
84. A device according to claim 71 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
85. A device according to claim 84 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
86. A device according to claim 84 and wherein said device is a dedicated authentication device.
-
87. A device according to claim 84 and wherein said device includes substantial non-authentication functionality.
-
88. A device according to claim 71 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
89. A device according to claim 71 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
90. A device according to claim 71 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
91. A device according to claim 90 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
92. A device according to claim 90 and wherein said device is a dedicated authentication device.
-
93. A device according to claim 90 and wherein said device includes substantial non-authentication functionality.
-
94. A device according to claim 90 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
95. A device according to claim 94 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
96. A device according to claim 94 and wherein said device is a dedicated authentication device.
-
97. A device according to claim 94 and wherein said device includes substantial non-authentication functionality.
-
72. A device according to claim 71 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
98. A method for communicating with a communication network via a Bluetooth communication protocol, said method comprising:
at least one authentication functionality, at least part of at least one of which is operative to communicate authentication information via said Bluetooth communication protocol. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180, 181, 182, 183, 185, 186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200, 201, 202, 203, 204, 205, 206, 207, 208, 209, 210)
-
1. A device capable of communicating with a communication network via a Bluetooth communication protocol, said device including at least one authentication functionality, at least part of at least one of which is operative to communicate authentication information via said Bluetooth communication protocol.
-
2. A device according to claim 1 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
3. A device according to claim 1 and wherein said device is effective to identify said device to an authenticator coupled to said communication network.
-
4. A device according to claim 1 and wherein said device is effective to identify another device to an authenticator coupled to said communication network.
-
5. A device according to claim 1 and wherein said device is effective to identify a user to an authenticator coupled to said communication network.
-
6. A device according to claim 1 and wherein said device is a dedicated authentication device.
-
7. A device according to claim 6 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
8. A device according to claim 1 and wherein said device includes substantial non-authentication functionality.
-
9. A device according to claim 8 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
10. A device according to claim 8 and wherein said device comprises a telephone.
-
11. A device according to claim 8 and wherein said device comprises a PDA.
-
12. A device according to claim 8 and wherein said device comprises a computer.
-
13. A device according to claim 8 and wherein said device comprises an electronic wallet.
-
14. A device according to claim 1 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
15. A device according to claim 14 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
16. A device according to claim 14 and wherein said device is a dedicated authentication device.
-
17. A device according to claim 14 and wherein said device includes substantial non-authentication functionality.
-
18. A device according to claim 1 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
19. A device according to claim 1 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
20. A device according to claim 1 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
21. A device according to claim 20 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
22. A device according to claim 20 and wherein said device is a dedicated authentication device.
-
23. A device according to claim 20 and wherein said device includes substantial non-authentication functionality.
-
24. A device according to claim 20 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
25. A device according to claim 24 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
26. A device according to claim 24 and wherein said device is a dedicated authentication device.
-
27. A device according to claim 24 and wherein said device includes substantial non-authentication functionality.
-
28. A device according to claim 1 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
29. A device according to claim 28 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
30. A device according to claim 28 and wherein said device is a dedicated authentication device.
-
31. A device according to claim 28 and wherein said device includes substantial non-authentication functionality.
-
32. A device according to claim 28 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
33. A device according to claim 32 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
34. A device according to claim 32 and wherein said device is a dedicated authentication device.
-
35. A device according to claim 32 and wherein said device includes substantial non-authentication functionality.
-
36. A device according to claim 28 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
37. A device according to claim 36 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
38. A device according to claim 36 and wherein said device is a dedicated authentication device.
-
39. A device according to claim 36 and wherein said device includes substantial non-authentication functionality.
-
40. A device according to claim 36 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
41. A device according to claim 40 and wherein said device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
42. A device according to claim 40 and wherein said device is a dedicated authentication device.
-
43. A device according to claim 40 and wherein said device includes substantial non-authentication functionality.
-
99. A method according to claim 98 and wherein said method is effective to identify at least one of a device and a user to at least one authenticator coupled to said communication network.
-
100. A method according to claim 98 and wherein said method is effective to identify a device to an authenticator coupled to said communication network.
-
101. A method according to claim 98 and wherein said method is effective to identify a user to an authenticator coupled to said communication network.
-
102. A method according to claim 98 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
103. A method according to claim 102 and wherein said method is effective to identify at least one of a device, and a user to at least one authenticator coupled to said communication network.
-
104. A method according to claim 98 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic based authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
105. A method according to claim 98 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic based authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
106. A method according to claim 98 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
107. A method according to claim 106 and wherein said method is effective to identify at least one of a device and a user to at least one authenticator coupled to said communication network.
-
108. A method according to claim 106 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
109. A method according to claim 108 and wherein said method is effective to identify at least one of a device, and a user to at least one authenticator coupled to said communication network.
-
110. A method according to claim 98 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
111. A method according to claim 110 and wherein said method is effective to identify at least one of a device and a user to at least one authenticator coupled to said communication network.
-
112. A method according to claim 110 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
113. A method according to claim 112 and wherein said method is effective to identify at least one of a device, and a user to at least one authenticator coupled to said communication network.
-
114. A method according to claim 110 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
115. A method according to claim 114 and wherein said method is effective to identify at least one of a device and a user to at least one authenticator coupled to said communication network.
-
116. A method according to claim 114 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
117. A method according to claim 116 and wherein said method is effective to identify at least one of a device, and a user to at least one authenticator coupled to said communication network.
-
119. A method according to claim 118 and wherein said method is effective to identify at least one of a device and a user to at least one authenticator coupled to said communication network.
-
120. A method according to claim 118 and wherein said method is effective to identify a device to an authenticator coupled to said communication network.
-
121. A method according to claim 118 and wherein said method is effective to identify a user to an authenticator coupled to said communication network.
-
122. A method according to claim 118 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
123. A method according to claim 122 and wherein said method is effective to identify at least one of a device, and a user to at least one authenticator coupled to said communication network.
-
124. A method according to claim 118 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic based authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
125. A method according to claim 118 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic based authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
126. A method according to claim 118 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
127. A method according to claim 126 and wherein said method is effective to identify at least one of a device and a user to at least one authenticator coupled to said communication network.
-
128. A method according to claim 126 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
129. A method according to claim 128 and wherein said method is effective to identify at least one of a device, and a user to at least one authenticator coupled to said communication network.
-
131. A method according to claim 130 and wherein said method is effective to identify at least one of a device and a user to at least one authenticator coupled to said communication network.
-
132. A method according to claim 130 and wherein said method is effective to identify a device to an authenticator coupled to said communication network.
-
133. A method according to claim 130 and wherein said method is effective to identify a user to an authenticator coupled to said communication network.
-
134. A method according to claim 130 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
135. A method according to claim 134 and wherein said method is effective to identify at least one of a device, and a user to at least one authenticator coupled to said communication network.
-
136. A method according to claim 130 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic based authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
137. A method according to claim 130 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic based authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
138. A method according to claim 137 and wherein said method is effective to identify at least one of a device and a user to at least one authenticator coupled to said communication network.
-
139. A method according to claim 137 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
140. A method according to claim 139 and wherein said method is effective to identify at least one of a device, and a user to at least one authenticator coupled to said communication network.
-
142. A system according to claim 141 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
143. A system according to claim 141 and wherein said at least one device is effective to identify said device to an authenticator coupled to said communication network.
-
144. A system according to claim 141 and wherein said at least one device is effective to identify another device to an authenticator coupled to said communication network.
-
145. A system according to claim 141 and wherein said at least one device is effective to identify a user to an authenticator coupled to said communication network.
-
146. A system according to claim 141 and wherein said at least one device is a dedicated authentication device.
-
147. A system according to claim 146 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
148. A system according to claim 141 and wherein said at least one device includes substantial non-authentication functionality.
-
149. A system according to claim 148 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
150. A system according to claim 148 and wherein said at least one device comprises a telephone.
-
151. A system according to claim 148 and wherein said at least one device comprises a PDA.
-
152. A system according to claim 148 and wherein said at least one device comprises a computer.
-
153. A system according to claim 148 and wherein said at least one device comprises an electronic wallet.
-
154. A system according to claim 141 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
155. A system according to claim 154 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
156. A system according to claim 154 and wherein said at least one device is a dedicated authentication device.
-
157. A system according to claim 154 and wherein said at least one device includes substantial non-authentication functionality.
-
158. A system according to claim 141 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
159. A system according to claim 141 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
160. A system according to claim 141 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
161. A system according to claim 160 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
162. A system according to claim 160 and wherein said at least one device is a dedicated authentication device.
-
163. A system according to claim 160 and wherein said at least one device includes substantial non-authentication functionality.
-
164. A system according to claim 160 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
165. A system according to claim 164 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
166. A system according to claim 164 and wherein said at least one device is a dedicated authentication device.
-
167. A system according to claim 164 and wherein said at least one device includes substantial non-authentication functionality.
-
168. A system according to claim 141 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
169. A system according to claim 168 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
170. A system according to claim 168 and wherein said at least one device is a dedicated authentication device.
-
171. A system according to claim 168 and wherein said at least one device includes substantial non-authentication functionality.
-
172. A system according to claim 168 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
173. A system according to claim 172 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
174. A system according to claim 172 and wherein said at least one device is a dedicated authentication device.
-
175. A system according to claim 172 and wherein said at least one device includes substantial non-authentication functionality.
-
176. A system according to claim 168 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
177. A system according to claim 176 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
178. A system according to claim 176 and wherein said at least one device is a dedicated authentication device.
-
179. A system according to claim 176 and wherein said at least one device includes substantial non-authentication functionality.
-
180. A system according to claim 176 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
181. A system according to claim 180 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
182. A system according to claim 180 and wherein said at least one device is a dedicated authentication device.
-
183. A system according to claim 180 and wherein said at least one device includes substantial non-authentication functionality.
-
185. A system according to claim 184 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
186. A system according to claim 184 and wherein said at least one device is effective to identify said device to an authenticator coupled to said communication network.
-
187. A system according to claim 184 and wherein said at least one device is effective to identify another device to an authenticator coupled to said communication network.
-
188. A system according to claim 184 and wherein said at least one device is effective to identify a user to an authenticator coupled to said communication network.
-
189. A system according to claim 184 and wherein said at least one device is a dedicated authentication device.
-
190. A system according to claim 189 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
191. A system according to claim 184 and wherein said at least one device includes substantial non-authentication functionality.
-
192. A system according to claim 191 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
193. A system according to claim 191 and wherein said at least one device comprises a telephone.
-
194. A system according to claim 191 and wherein said at least one device comprises a PDA.
-
195. A system according to claim 191 and wherein said at least one device comprises a computer.
-
196. A system according to claim 191 and wherein said at least one device comprises an electronic wallet.
-
197. A system according to claim 184 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
198. A system according to claim 197 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
199. A system according to claim 197 and wherein said at least one device is a dedicated authentication device.
-
200. A system according to claim 197 and wherein said at least one device includes substantial non-authentication functionality.
-
201. A system according to claim 184 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
202. A system according to claim 184 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
203. A system according to claim 184 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
204. A system according to claim 203 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
205. A system according to claim 203 and wherein said at least one device is a dedicated authentication device.
-
206. A system according to claim 203 and wherein said at least one device includes substantial non-authentication functionality.
-
207. A system according to claim 203 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
208. A system according to claim 207 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
209. A system according to claim 207 and wherein said at least one device is a dedicated authentication device.
-
210. A system according to claim 207 and wherein said at least one device includes substantial non-authentication functionality.
-
1. A device capable of communicating with a communication network via a Bluetooth communication protocol, said device including at least one authentication functionality, at least part of at least one of which is operative to communicate authentication information via said Bluetooth communication protocol.
-
118. A method for communicating with a communication network via a Bluetooth communication protocol, said method comprising:
at least one authentication functionality at least part of at least one of which forms part of said Bluetooth communication protocol.
-
130. A method for communicating with a communication network via a Bluetooth communication protocol, said method comprising:
at least one authentication functionality at least part of at least one of which employs a Bluetooth communication protocol.
-
137-1. A method according to claim 130 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
141. A system comprising:
-
a communication network;
at least one authenticator; and
at least one device capable of communicating with said at least one authenticator through said communication network via a Bluetooth communication protocol, said at least one device including at least one authentication functionality, at least part of at least one of which is operative to communicate authentication information via said Bluetooth communication protocol to said at least one authenticator.
-
-
184. A system comprising:
-
a communication network;
at least one authenticator; and
at least one device capable of communicating with a communication network via a Bluetooth communication protocol, said device including at least one authentication functionality at least part of at least one of which forms part of said Bluetooth communication protocol.
-
-
211. A system comprising:
-
a communication network;
at least one authenticator; and
at least one device capable of communicating with a communication network, said device comprising at least one authentication functionality at least part of at least one of which employs a Bluetooth communication protocol. - View Dependent Claims (212, 213, 214, 215, 216, 217, 218, 219, 220, 221, 222, 223, 224, 225, 226, 227, 228, 229, 230, 231, 232, 233, 234, 235, 236, 237, 239, 240, 241, 242, 243, 244, 245, 246, 247, 248, 249, 250, 251, 252, 253, 254, 255, 256, 257, 258, 259, 260, 261, 262, 263, 264, 265, 266, 267, 268, 269, 270, 271, 272, 273, 274, 275, 276, 277, 278, 279, 280, 282, 283, 284, 285, 286, 287, 288, 289, 290, 291, 292, 293, 294, 295, 296, 297, 298, 299, 300, 301, 302, 303, 304, 305, 306, 307, 370)
-
212. A system according to claim 211 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
213. A system according to claim 211 and wherein said at least one device is effective to identify said device to an authenticator coupled to said communication network.
-
214. A system according to claim 211 and wherein said at least one device is effective to identify another device to an authenticator coupled to said communication network.
-
215. A system according to claim 211 and wherein said at least one device is effective to identify a user to an authenticator coupled to said communication network.
-
216. A system according to claim 211 and wherein said at least one device is a dedicated authentication device.
-
217. A system according to claim 216 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
218. A system according to claim 211 and wherein said at least one device includes substantial non-authentication functionality.
-
219. A system according to claim 218 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
220. A system according to claim 218 and wherein said at least one device comprises a telephone.
-
221. A system according to claim 218 and wherein said at least one device comprises a PDA.
-
222. A system according to claim 218 and wherein said at least one device comprises a computer.
-
223. A system according to claim 218 and wherein said at least one device comprises an electronic wallet.
-
224. A system according to claim 211 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
225. A system according to claim 224 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
226. A system according to claim 224 and wherein said at least one device is a dedicated authentication device.
-
227. A system according to claim 224 and wherein said at least one device includes substantial non-authentication functionality.
-
228. A system according to claim 211 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
229. A system according to claim 211 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
230. A system according to claim 211 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
231. A system according to claim 230 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
232. A system according to claim 230 and wherein said at least one device is a dedicated authentication device.
-
233. A system according to claim 230 and wherein said at least one device includes substantial non-authentication functionality.
-
234. A system according to claim 230 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
235. A system according to claim 234 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
236. A system according to claim 234 and wherein said at least one device is a dedicated authentication device.
-
237. A system according to claim 234 and wherein said at least one device includes substantial non-authentication functionality.
-
239. A system according to claim 238 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
240. A system according to claim 238 and wherein said at least one device is effective to identify said device to an authenticator coupled to said communication network.
-
241. A system according to claim 238 and wherein said at least one device is effective to identify another device to an authenticator coupled to said communication network.
-
242. A system according to claim 238 and wherein said at least one device is effective to identify a user to an authenticator coupled to said communication network.
-
243. A system according to claim 238 and wherein said at least one device is a dedicated authentication device.
-
244. A system according to claim 243 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
245. A system according to claim 238 and wherein said at least one device includes substantial non-authentication functionality.
-
246. A system according to claim 245 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
247. A system according to claim 245 and wherein said at least one device comprises a telephone.
-
248. A system according to claim 245 and wherein said at least one device comprises a PDA.
-
249. A system according to claim 245 and wherein said at least one device comprises a computer.
-
250. A system according to claim 245 and wherein said at least one device comprises an electronic wallet.
-
251. A system according to claim 238 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
252. A system according to claim 251 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
253. A system according to claim 251 and wherein said at least one device is a dedicated authentication device.
-
254. A system according to claim 251 and wherein said at least one device includes substantial non-authentication functionality.
-
255. A system according to claim 238 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
256. A system according to claim 238 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
257. A system according to claim 238 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
258. A system according to claim 257 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
259. A system according to claim 257 and wherein said at least one device is a dedicated authentication device.
-
260. A system according to claim 257 and wherein said at least one device includes substantial non-authentication functionality.
-
261. A system according to claim 257 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
262. A system according to claim 261 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
263. A system according to claim 261 and wherein said at least one device is a dedicated authentication device.
-
264. A system according to claim 261 and wherein said at least one device includes substantial non-authentication functionality.
-
265. A system according to claim 238 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
266. A system according to claim 265 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
267. A system according to claim 265 and wherein said at least one device is a dedicated authentication device.
-
268. A system according to claim 265 and wherein said at least one device includes substantial non-authentication functionality.
-
269. A system according to claim 265 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
270. A system according to claim 269 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
271. A system according to claim 269 and wherein said at least one device is a dedicated authentication device.
-
272. A system according to claim 269 and wherein said at least one device includes substantial non-authentication functionality.
-
273. A system according to claim 265 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
274. A system according to claim 273 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
275. A system according to claim 273 and wherein said at least one device is a dedicated authentication device.
-
276. A system according to claim 273 and wherein said at least one device includes substantial non-authentication functionality.
-
277. A system according to claim 273 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
278. A system according to claim 277 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
279. A system according to claim 277 and wherein said at least one device is a dedicated authentication device.
-
280. A system according to claim 277 and wherein said at least one device includes substantial non-authentication functionality.
-
282. A system according to claim 281 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
283. A system according to claim 281 and wherein said at least one device is effective to identify said device to an authenticator coupled to said communication network.
-
284. A system according to claim 281 and wherein said at least one device is effective to identify another device to an authenticator coupled to said communication network.
-
285. A system according to claim 281 and wherein said at least one device is effective to identify a user to an authenticator coupled to said communication network.
-
286. A system according to claim 281 and wherein said at least one device is a dedicated authentication device.
-
287. A system according to claim 286 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
288. A system according to claim 281 and wherein said at least one device includes substantial non-authentication functionality.
-
289. A system according to claim 288 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
290. A system according to claim 288 and wherein said at least one device comprises a telephone.
-
291. A system according to claim 288 and wherein said at least one device comprises a PDA.
-
292. A system according to claim 288 and wherein said at least one device comprises a computer.
-
293. A system according to claim 288 and wherein said at least one device comprises an electronic wallet.
-
294. A system according to claim 281 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
295. A system according to claim 294 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
296. A system according to claim 294 and wherein said at least one device is a dedicated authentication device.
-
297. A system according to claim 294 and wherein said at least one device includes substantial non-authentication functionality.
-
298. A system according to claim 281 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
299. A system according to claim 281 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
300. A system according to claim 281 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
301. A system according to claim 300 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
302. A system according to claim 300 and wherein said at least one device is a dedicated authentication device.
-
303. A system according to claim 300 and wherein said at least one device includes substantial non-authentication functionality.
-
304. A system according to claim 300 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
305. A system according to claim 304 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
306. A system according to claim 304 and wherein said at least one device is a dedicated authentication device.
-
307. A system according to claim 304 and wherein said at least one device includes substantial non-authentication functionality.
-
370. A system according to claim 265 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
212. A system according to claim 211 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
-
238. A system comprising:
-
at least one authenticator; and
at least one device capable of communicating with said at least one authenticator via a Bluetooth communication protocol, said at least one device including at least one authentication functionality, at least part of at least one of which is operative to communicate authentication information via said Bluetooth communication protocol to said at least one authenticator.
-
-
281. A system comprising:
-
at least one authenticator; and
at least one device capable of communicating with said at least one authenticator via a Bluetooth communication protocol, said at least one device including at least one authentication functionality, at least part of at least one of which forms part of said Bluetooth communication protocol.
-
-
308. A system comprising:
-
at least one authenticator; and
at least one device capable of communicating with said at least one authenticator via a Bluetooth communication protocol, said at least one device including at least one authentication functionality at least part of at least one of which employs a Bluetooth communication protocol. - View Dependent Claims (309, 310, 311, 312, 313, 314, 315, 316, 317, 318, 319, 320, 321, 322, 323, 324, 325, 326, 327, 328, 329, 330, 331, 332, 333, 334, 336, 337, 338, 339, 340, 341, 342, 343, 344, 345, 346, 347, 348, 349, 350, 351, 352, 353, 354, 355, 356, 357, 358, 359, 360, 361, 362, 363, 364, 365, 366, 367, 368, 369, 371, 372, 373, 374, 375, 376, 377, 379, 380, 381, 382, 383, 384, 385, 386, 387, 388, 389, 390, 391, 392, 393, 394, 395, 396, 397, 398, 399, 400, 401, 402, 403, 404, 432, 433, 435, 436, 438, 439)
-
309. A system according to claim 308 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
310. A system according to claim 308 and wherein said at least one device is effective to identify said device to an authenticator coupled to said communication network.
-
311. A system according to claim 308 and wherein said at least one device is effective to identify another device to an authenticator coupled to said communication network.
-
312. A system according to claim 308 and wherein said at least one device is effective to identify a user to an authenticator coupled to said communication network.
-
313. A system according to claim 308 and wherein said at least one device is a dedicated authentication device.
-
314. A system according to claim 313 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
315. A system according to claim 308 and wherein said at least one device includes substantial non-authentication functionality.
-
316. A system according to claim 315 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
317. A system according to claim 315 and wherein said at least one device comprises a telephone.
-
318. A system according to claim 315 and wherein said at least one device comprises a PDA.
-
319. A system according to claim 315 and wherein said at least one device comprises a computer.
-
320. A system according to claim 315 and wherein said at least one device comprises an electronic wallet.
-
321. A system according to claim 308 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
322. A system according to claim 321 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
323. A system according to claim 312 and wherein said at least one device is a dedicated authentication device.
-
324. A system according to claim 321 and wherein said at least one device includes substantial non-authentication functionality.
-
325. A system according to claim 308 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
326. A system according to claim 308 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
327. A system according to claim 308 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
328. A system according to claim 327 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
329. A system according to claim 327 and wherein said at least one device is a dedicated authentication device.
-
330. A system according to claim 327 and wherein said at least one device includes substantial non-authentication functionality.
-
331. A system according to claim 327 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
332. A system according to claim 331 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
333. A system according to claim 331 and wherein said at least one device is a dedicated authentication device.
-
334. A system according to claim 331 and wherein said at least one device includes substantial non-authentication functionality.
-
336. A system according to claim 335 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
337. A system according to claim 335 and wherein said at least one device is effective to identify said device to an authenticator coupled to said communication network.
-
338. A system according to claim 335 and wherein said at least one device is effective to identify another device to an authenticator coupled to said communication network.
-
339. A system according to claim 335 and wherein said at least one device is effective to identify a user to an authenticator coupled to said communication network.
-
340. A system according to claim 335 and wherein said at least one device is a dedicated authentication device.
-
341. A system according to claim 340 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
342. A system according to claim 335 and wherein said at least one device includes substantial non-authentication functionality.
-
343. A system according to claim 342 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
344. A system according to claim 342 and wherein said at least one device comprises a telephone.
-
345. A system according to claim 342 and wherein said at least one device comprises a PDA.
-
346. A system according to claim 342 and wherein said at least one device comprises a computer.
-
347. A system according to claim 342 and wherein said at least one device comprises an electronic wallet.
-
348. A system according to claim 335 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
349. A system according to claim 348 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
350. A system according to claim 348 and wherein said at least one device is a dedicated authentication device.
-
351. A system according to claim 348 and wherein said at least one device includes substantial non-authentication functionality.
-
352. A system according to claim 335 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
353. A system according to claim 335 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
354. A system according to claim 335 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
355. A system according to claim 354 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
356. A system according to claim 354 and wherein said at least one device is a dedicated authentication device.
-
357. A system according to claim 354 and wherein said at least one device includes substantial non-authentication functionality.
-
358. A system according to claim 354 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
359. A system according to claim 358 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
360. A system according to claim 358 and wherein said at least one device is a dedicated authentication device.
-
361. A system according to claim 358 and wherein said at least one device includes substantial non-authentication functionality.
-
362. A system according to claim 335 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
363. A system according to claim 362 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
364. A system according to claim 362 and wherein said at least one device is a dedicated authentication device.
-
365. A system according to claim 362 and wherein said at least one device includes substantial non-authentication functionality.
-
366. A system according to claim 362 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
367. A system according to claim 366 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
368. A system according to claim 366 and wherein said at least one device is a dedicated authentication device.
-
369. A system according to claim 366 and wherein said at least one device includes substantial non-authentication functionality.
-
371. A system according to claim 370 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
372. A system according to claim 370 and wherein said at least one device is a dedicated authentication device.
-
373. A system according to claim 370 and wherein said at least one device includes substantial non-authentication functionality.
-
374. A system according to claim 370 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
375. A system according to claim 374 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
376. A system according to claim 374 and wherein said at least one device is a dedicated authentication device.
-
377. A system according to claim 374 and wherein said at least one device includes substantial non-authentication functionality.
-
379. A system according to claim 378 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
380. A system according to claim 378 and wherein said at least one device is effective to identify said device to an authenticator coupled to said communication network.
-
381. A system according to claim 378 and wherein said at least one device is effective to identify another device to an authenticator coupled to said communication network.
-
382. A system according to claim 378 and wherein said at least one device is effective to identify a user to an authenticator coupled to said communication network.
-
383. A system according to claim 378 and wherein said at least one device is a dedicated authentication device.
-
384. A system according to claim 383 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
385. A system according to claim 378 and wherein said at least one device includes substantial non-authentication functionality.
-
386. A system according to claim 385 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
387. A system according to claim 385 and wherein said at least one device comprises a telephone.
-
388. A system according to claim 385 and wherein said at least one device comprises a PDA.
-
389. A system according to claim 385 and wherein said at least one device comprises a computer.
-
390. A system according to claim 385 and wherein said at least one device comprises an electronic wallet.
-
391. A system according to claim 378 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
392. A system according to claim 391 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
393. A system according to claim 391 and wherein said at least one device is a dedicated authentication device.
-
394. A system according to claim 391 and wherein said at least one device includes substantial non-authentication functionality.
-
395. A system according to claim 378 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
396. A system according to claim 378 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
397. A system according to claim 378 and wherein at least part of said at least one functionality employs a Bluetooth communication protocol.
-
398. A system according to claim 397 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
399. A system according to claim 397 and wherein said at least one device is a dedicated authentication device.
-
400. A system according to claim 397 and wherein said at least one device includes substantial non-authentication functionality.
-
401. A system according to claim 397 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
402. A system according to claim 401 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
403. A system according to claim 401 and wherein said at least one device is a dedicated authentication device.
-
404. A system according to claim 401 and wherein said at least one device includes substantial non-authentication functionality.
-
432. A system according to claim 335 and wherein said at least one multiple-tier authentication functionality is operative to enable a first device to communicate to said at least one authenticator, authentication information provided by at least one second device.
-
433. A system according to claim 378 and wherein said at least one multiple-tier authentication functionality is operative to enable a first device to communicate to said at least one authenticator, authentication information provided by at least one second device.
-
435. A system according to claim 335 and wherein said at least one multiple-tier authentication functionality is operative to enable a first device to be employed as an authentication proxy when suitably enabled by at least one second device.
-
436. A system according to claim 378 and wherein said at least one multiple-tier authentication functionality is operative to enable a first device to be employed as an authentication proxy when suitably enabled by at least one second device.
-
438. A system according to claim 335 and wherein said at least one multiple-tier authentication functionality is operative to enable an authenticator to require authentication from another device.
-
439. A system according to claim 378 and wherein said at least one multiple-tier authentication functionality is operative to enable an authenticator to require authentication from another device.
-
309. A system according to claim 308 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
-
335. A system comprising:
-
a communication network;
at least one authenticator; and
at least one device capable of communicating with said at least one authenticator through said communication network via a Bluetooth communication protocol, said at least one device including at least one multi-tier authentication functionality, at least part of at least one of which is operative to communicate authentication information via said Bluetooth communication protocol to said at least one authenticator.
-
-
378. A system comprising:
-
a communication network;
at least one authenticator; and
at least one device capable of communicating with said at least one authenticator through said communication network via a Bluetooth communication protocol, said at least one device including at least one multi-tier authentication functionality at least part of at least one of which forms part of said Bluetooth communication protocol.
-
-
405. A system comprising:
-
a communication network;
at least one authenticator; and
at least one device capable of communicating with said at least one authenticator through said communication network via a Bluetooth communication protocol, said at least one device including at least one multi-tier authentication functionality at least part of at least one of which employs a Bluetooth communication protocol. - View Dependent Claims (406, 407, 408, 409, 410, 411, 412, 413, 414, 415, 416, 417, 418, 419, 420, 421, 422, 423, 424, 425, 426, 427, 428, 429, 430, 431, 434, 437, 440)
-
406. A system according to claim 405 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
407. A system according to claim 405 and wherein said at least one device is effective to identify said device to an authenticator coupled to said communication network.
-
408. A system according to claim 405 and wherein said at least one device is effective to identify another device to an authenticator coupled to said communication network.
-
409. A system according to claim 405 and wherein said at least one device is effective to identify a user to an authenticator coupled to said communication network.
-
410. A system according to claim 405 and wherein said at least one device is a dedicated authentication device.
-
411. A system according to claim 410 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
412. A system according to claim 405 and wherein said at least one device includes substantial non-authentication functionality.
-
413. A system according to claim 412 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
414. A system according to claim 412 and wherein said at least one device comprises a telephone.
-
415. A system according to claim 412 and wherein said at least one device comprises a PDA.
-
416. A system according to claim 412 and wherein said at least one device comprises a computer.
-
417. A system according to claim 412 and wherein said at least one device comprises an electronic wallet.
-
418. A system according to claim 405 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
419. A system according to claim 418 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
420. A system according to claim 409 and wherein said at least one device is a dedicated authentication device.
-
421. A system according to claim 418 and wherein said at least one device includes substantial non-authentication functionality.
-
422. A system according to claim 405 and wherein said at least one authentication functionality is selected from the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
423. A system according to claim 405 and wherein said at least one authentication functionality includes at least a plurality of the following authentication functionalities:
-
a cryptographic authentication functionality;
a password based authentication functionality;
a smartcard based authentication functionality;
a token based authentication functionality; and
a biometric based authentication functionality.
-
-
424. A system according to claim 405 and wherein at least part of said at least one authentication functionality forms part of said Bluetooth communication protocol.
-
425. A system according to claim 424 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
426. A system according to claim 424 and wherein said at least one device is a dedicated authentication device.
-
427. A system according to claim 424 and wherein said at least one device includes substantial non-authentication functionality.
-
428. A system according to claim 424 and wherein said at least one authentication functionality comprises plural authentication functionalities.
-
429. A system according to claim 428 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
430. A system according to claim 428 and wherein said at least one device is a dedicated authentication device.
-
431. A system according to claim 428 and wherein said at least one device includes substantial non-authentication functionality.
-
434. A system according to claim 405 and wherein said at least one multiple-tier authentication functionality is operative to enable a first device to communicate to said at least one authenticator, authentication information provided by at least one second device.
-
437. A system according to claim 405 and wherein said at least one multiple-tier authentication functionality is operative to enable a first device to be employed as an authentication proxy when suitably enabled by at least one second device.
-
440. A system according to claim 405 and wherein said at least one multiple-tier authentication functionality is operative to enable an authenticator to require authentication from another device.
-
406. A system according to claim 405 and wherein said at least one device is effective to identify at least one of said device, another device and a user of said device or of said another device to at least one authenticator coupled to said communication network.
-
Specification
- Resources
Thank you for your request. You will receive a custom alert email when the Litigation Campaign Assessment is available.
×
-
Current AssigneeAladdin Knowledge Systems Limited (Thales SA)
-
Original AssigneeAladdin Knowledge Systems Limited (Thales SA)
-
InventorsZunke, Michael, Margalit, Yanki, Margalit, Dany
-
Application NumberUS09/821,716Publication NumberTime in Patent OfficeDaysField of SearchUS Class Current380/270CPC Class CodesH04L 63/06 for supporting key manageme...H04L 63/08 for authentication of entit...H04W 84/18 Self-organising networks, e...