Method and system to authenticate a user when accessing a service
First Claim
Patent Images
1. A method to authenticate a user accessing a service, said method comprising:
- activating a first communication device, to communicate with said service;
storing an identifier in a second communications device, wherein said second communications device has a wireless signal strength for transmitting said identifier; and
accessing said service by said first communication device, only so long as said first communication device remains within range of said second communications device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system to authenticate a user accessing a service are disclosed. In one method embodiment, the present invention activates a first communication device to communicate with the service. Further, the present embodiment stores an identifier in a second communications device, wherein the second communications device has a wireless signal strength for transmitting the identifier. Moreover, the present embodiment accesses the service by the first communication device only so long as the first communication device remains within range of the second communication device.
16 Citations
21 Claims
-
1. A method to authenticate a user accessing a service, said method comprising:
-
activating a first communication device, to communicate with said service;
storing an identifier in a second communications device, wherein said second communications device has a wireless signal strength for transmitting said identifier; and
accessing said service by said first communication device, only so long as said first communication device remains within range of said second communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A user authentication system comprising:
-
a first communication device;
a second communications device having a signal strength for wirelessly transmitting an identifier stored within said second communications device; and
a service which performs functions according to the user, wherein said service only performs said functions so long as said first communication device remains within range of said signal strength of said second communications device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification