Session authentication using temporary passwords
First Claim
1. A method of authenticating a user at an un-trusted computing system, the user having at least one portable computing device coupled to a peripheral device, the method comprising:
- randomly generating a temporary password by the portable computing device;
sending the temporary password to the peripheral device;
rendering the temporary password by the peripheral device for perception by the user;
inputting a password, by the user, into the un-trusted computing system;
receiving, by the portable computing device, the password input by the user from the un-trusted computing system; and
allowing access to the portable computing device using the un-trusted computing system when the temporary password matches the user-inputted password.
1 Assignment
0 Petitions
Accused Products
Abstract
Authenticating a user of an un-trusted computing system, the user having at least one portable computing device coupled to a peripheral device, may be accomplished by randomly generating a temporary password by the portable computing device, sending the temporary password to the peripheral device, rendering the temporary password by the peripheral device for perception by the user, inputting a password, by the user, into the un-trusted computing system, receiving, by the portable computing device, the password input by the user from the un-trusted computing system, and allowing access to the portable computing device using the un-trusted computing system when the temporary password matches the user-inputted password. In one embodiment, the peripheral device may be a small form factor device worn by the user. In one embodiment, the user may carry or have immediate access to multiple portable computing devices.
89 Citations
28 Claims
-
1. A method of authenticating a user at an un-trusted computing system, the user having at least one portable computing device coupled to a peripheral device, the method comprising:
-
randomly generating a temporary password by the portable computing device;
sending the temporary password to the peripheral device;
rendering the temporary password by the peripheral device for perception by the user;
inputting a password, by the user, into the un-trusted computing system;
receiving, by the portable computing device, the password input by the user from the un-trusted computing system; and
allowing access to the portable computing device using the un-trusted computing system when the temporary password matches the user-inputted password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for authenticating a user of an un-trusted computing system, the user having at least one portable computing device coupled to a peripheral device, by randomly generating a temporary password by the portable computing device, by sending the temporary password to the peripheral device, by receiving at the portable computing device a password input by the user from the un-trusted computing system, and by allowing access to the portable computing device using the un-trusted computing system when the temporary password matches the user-inputted password.
- View Dependent Claims (16, 17, 18, 19, 20)
-
21. A system for authenticating a user desiring to use an un-trusted computing system comprising:
-
a portable computing device; and
a peripheral device, coupled to the portable computing device, capable of rendering a password for perception by the user;
the portable computing device comprising;
a random password generator to randomly generate a temporary password;
a memory to store instructions and data; and
a processor to execute the instructions obtained from the memory to send the temporary password to the peripheral device for rendering to the user, to receive from the un-trusted computing system a password input by the user; and
to allow access to the data by the un-trusted computing system when the temporary password matches the user-inputted password. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
Specification