Method and system for secure authentication using mobile electronic devices
First Claim
1. A system for authenticating the identity of one of a plurality of individuals each having communication devices that are seeking access to at least one secure component having an input, the system comprising:
- at least one record that includes information about each of the plurality of individuals, the information including a communication path which defines how to contact the individual'"'"'s communication device and further defines a security protocol for allowing access to the secure component;
a controller having access to the at least one record wherein the controller receives signals from the input of the at least one secure component in response to the individual manipulating the input device, wherein the controller, in response to one of the individuals seeking access to the at least one secure component, retrieves the security protocol and the communications path from the at least one record; and
a communications interface that allows signals between the communications device carried by the individual and the controller wherein the controller (i) evaluates the signal received from the input device of the secure component, (ii) sends a first signal to the communications device of the individual in response to the individual seeking access to the at least one secure component and, (iii) evaluates a response signal by the individual by comparing the response signal to the security protocol to determine whether to allow access by the individual to the at least one secure component.
0 Assignments
0 Petitions
Accused Products
Abstract
An identity authentication system that controls access to devices information and areas only to authorized individuals. The system includes one or more processors that have a communication interface such that the processor can transmit signals to personal communication devices carried by individuals, such as cellular telephones, PDAs, pagers, and the like. The individual, to gain access to a particular secure component, area or information, is then prompted to provide PIN numbers or access codes via their personal communication device.
-
Citations
30 Claims
-
1. A system for authenticating the identity of one of a plurality of individuals each having communication devices that are seeking access to at least one secure component having an input, the system comprising:
-
at least one record that includes information about each of the plurality of individuals, the information including a communication path which defines how to contact the individual'"'"'s communication device and further defines a security protocol for allowing access to the secure component;
a controller having access to the at least one record wherein the controller receives signals from the input of the at least one secure component in response to the individual manipulating the input device, wherein the controller, in response to one of the individuals seeking access to the at least one secure component, retrieves the security protocol and the communications path from the at least one record; and
a communications interface that allows signals between the communications device carried by the individual and the controller wherein the controller (i) evaluates the signal received from the input device of the secure component, (ii) sends a first signal to the communications device of the individual in response to the individual seeking access to the at least one secure component and, (iii) evaluates a response signal by the individual by comparing the response signal to the security protocol to determine whether to allow access by the individual to the at least one secure component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for allowing access of individuals having communication devices to one or more secure components having an input, the system comprising:
-
one or more records containing information about each individual, the information including a communication path as to how to contact the communication device for the individual and access codes for the individual;
a controller having access to the one or more records wherein the controller receives signals from the inputs of the one or more secure components wherein the controller, in response to one of the individuals seeking access to one of the secure components determines whether to allow access of the individual to the secure component;
a communications interface that permits communication between the controller and the communication device of the individual, wherein the controller receives an access code from the individual when the individual is seeking access to the secure component and compares the access code to the access code in the one or more records for the individual to determine whether to allow access such that access is allowed to the individual when (i) the individual has in their possession the communication device, (ii) provides the access code to the controller, and (iii) communicates to the controller via the input of the secure component. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of controlling access to a secure component of a system, the method comprising:
-
receiving a signal from an input of the secure component indicative of the individual seeking access to the secure component;
receiving an access code from an individual seeking access to the secure component;
comparing the access code to a stored access code;
communicating with the individual'"'"'s portable communication device; and
allowing access to the secure component when the access code received from the individual matches the stored access code and when the individual has communicated with the system via their portable communication device. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification