Intelligent remote device
First Claim
1. A method for accessing a security token enabled computer system using an intelligent remote device as a communications interface for a security token comprising the steps of:
- a. establishing a wireless communications connection between at least an intelligent remote device and a security token enabled computer system, b. providing a critical security parameter associated with a user to a security token operatively coupled to said intelligent remote device, and c. authenticating said critical security parameter by said security token.
4 Assignments
0 Petitions
Accused Products
Abstract
An intelligent remote device equipped with a security token operatively coupled thereto is processing communications with a security token enabled computer system over a wireless private network. The intelligent remote device is adapted to emulate a local security device peripheral connected to the computer system. Multiple computer systems may be authenticated to using the intelligent remote device. Additionally, various secure communications connections mechanisms are described which are intended to augment existing security protocols available using wireless network equipment. Authentication of a user supplied critical security parameter is performed by the security token. The critical security parameter may be provided locally via the intelligent remote device or received from the wireless network and routed to the security token. Aural, visual or vibratory feedback may be provided to the user to signal a successful authentication transaction.
92 Citations
39 Claims
-
1. A method for accessing a security token enabled computer system using an intelligent remote device as a communications interface for a security token comprising the steps of:
-
a. establishing a wireless communications connection between at least an intelligent remote device and a security token enabled computer system, b. providing a critical security parameter associated with a user to a security token operatively coupled to said intelligent remote device, and c. authenticating said critical security parameter by said security token. - View Dependent Claims (2, 3, 6, 7, 8, 9, 10, 11, 12)
-
- 4. The method according to claim I wherein said wireless communications connection includes at least one secure communications protocol comprising secure socket layer, transport layer security, private communications technology, internet protocol security or a secure messaging session.
-
13. A method for accessing a security token enabled computer system using an intelligent remote device as a communications interface for a security token comprising the steps of:
-
a. establishing a secure communications connection between a security token and a security token enabled computer system via an intelligent remote device, b. authenticating at least said security token to said security token enabled computer system, c. providing a critical security parameter associated with a user to said security token, and d. authenticating said critical security parameter by said security token. - View Dependent Claims (14, 15)
-
-
16. The method according to step 13 wherein said secure communications connection may be initiated from either said intelligent remote device or said security token enabled computer system.
-
17. A system for accessing a security token enabled computer system using an intelligent remote device as a communications interface for a security token comprising:
-
an intelligent remote device including means for;
communicating with at least a security token enabled computer system over at least a wireless communications connection, operatively coupling a security token to said intelligent remote device, receiving a critical security parameter provided by a user, and emulating a security token peripheral device locally connected to said security token enabled computer system;
said security token including means for;
receiving a critical security parameter associated with said user, authenticating said critical security parameter; and
said security token enabled computer system including means for;
utilizing said intelligent remote device as said security token peripheral device, and allowing said user access to at least one secure resource following successful authentication of said critical security parameter. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system for accessing a security token enabled computer system using an intelligent remote device as a communications interface for a security token comprising:
-
an intelligent remote device in processing communications with at least a security token enabled computer system over a communications connection, said intelligent remote device including;
a device processor, a device memory coupled to said device processor, a security token interface means coupled to said device processor, and at least one remote device application operatively stored in at least a portion of said device memory, said at least one remote device application having logical instructions executable by said device processor to;
exchange information with said at least a security token enabled computer system and said security token, receive a critical security parameter provided by a user;
emulate a security token peripheral device locally connected to said security token enabled computer system;
said security token operatively coupled to said intelligent remote device via said security token interface means, said security token including;
a token processor,a token memory coupled to said token processor, at least one token application operatively stored in at least another portion of said token memory, said at least one token application having logical instructions executable by said token processor to;
receive said critical security parameter provided by said user, authenticate said received critical security parameter; and
,said security token enabled computer system including;
a computer processor, a computer memory coupled to said computer processor, and at least one computer application operatively stored in at least a portion of said computer memory, said at least one computer application having logical instructions executable by said computer processor to;
exchange information with at least said intelligent remote device security token enabled computer system over said communications connection, receive a critical security parameter provided by said user, utilize said intelligent remote device as said locally connected security token peripheral device, and allow access to at least one secure resource following a successful authentication of said critical security parameter. - View Dependent Claims (28, 29, 30, 31)
-
-
32. A set of application program interfaces embodied on a computer readable medium for execution by a processor included in an intelligent remote device and a security token enabled computer system which allows the intelligent remote device to emulate a security token peripheral device locally connected to the security token enabled computer system comprising:
-
a first interface that exchanges information between a security token and a remote security token enabled computer system in a protocol native to said security token; and
,a second interface that receives and routes a critical security parameter to said security token. - View Dependent Claims (33, 34, 35, 36)
-
-
37. A computer program product embodied in a tangible form readable by a plurality of processors in processing communications, wherein said computer program product includes executable instructions stored thereon for causing one or more of said plurality of processors to;
-
a. establish a secure communications connection between a security token and a security token enabled computer system via an intelligent remote device, b. authenticate at least said security token to said security token enabled computer system, c. provide a critical security parameter associated with a user to said security token, and d. authenticate said critical security parameter by said security token. - View Dependent Claims (38, 39)
-
Specification