System and method for authenticating wireless device with fixed station
First Claim
1. A method for authenticating a wireless device with a fixed station, the method comprising the steps of:
- receiving a first authentication request from the wireless device when the wireless device detects that the fixed station is in close proximity, the first authentication request including a first unique identifier for identifying the wireless device and a second unique identifier for identifying the fixed station;
receiving a second authentication request from the fixed station when the fixed station detects that the wireless device is in close proximity, the second authentication request including the second unique identifier for identifying the fixed station; and
authenticating the wireless device with the fixed station based on whether the second unique identifier received in the first authentication request matches the second unique identifier received in the second authentication request, and also based on whether the first unique identifier received in the first authentication request is associated in an authentication database with the second unique identifier received in the second authentication request.
4 Assignments
0 Petitions
Accused Products
Abstract
A method is provided for authenticating a wireless device with a fixed station. A first authentication request is received from the wireless device when the wireless device detects that the fixed station is in close proximity, and a second authentication request is received from the fixed station when the fixed station detects that the wireless device is in close proximity. The first authentication request includes a first unique identifier for identifying the wireless device and a second unique identifier for identifying the fixed station, and the second authentication request includes the second unique identifier. The wireless device is authenticated with the fixed station based on whether the second unique identifier received in the first authentication request matches the second unique identifier received in the second authentication request, and also based on whether the first unique identifier received in the first authentication request is associated in an authentication database with the second unique identifier received in the second authentication request. Also provided is an authentication server for authenticating a wireless device with a fixed station.
135 Citations
18 Claims
-
1. A method for authenticating a wireless device with a fixed station, the method comprising the steps of:
-
receiving a first authentication request from the wireless device when the wireless device detects that the fixed station is in close proximity, the first authentication request including a first unique identifier for identifying the wireless device and a second unique identifier for identifying the fixed station;
receiving a second authentication request from the fixed station when the fixed station detects that the wireless device is in close proximity, the second authentication request including the second unique identifier for identifying the fixed station; and
authenticating the wireless device with the fixed station based on whether the second unique identifier received in the first authentication request matches the second unique identifier received in the second authentication request, and also based on whether the first unique identifier received in the first authentication request is associated in an authentication database with the second unique identifier received in the second authentication request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An authentication system comprising:
-
a wireless device that includes a first sensing mechanism and a first transmitter; and
a fixed station that includes a second sensing mechanism for detecting when the wireless device is in close proximity, and a second transmitter for transmitting a second authentication request when the second sensing mechanism detects that the wireless device is in close proximity, the second authentication request including a second unique identifier for identifying the fixed station, wherein the first sensing mechanism detects when the fixed station is in close proximity, and the first transmitter transmits a first authentication request when the first sensing mechanism detects that the fixed station is in close proximity, the first authentication request including a first unique identifier for identifying the wireless device and the second unique identifier for identifying the fixed station, and the system further comprises an authentication server for receiving the first and second authentication requests and authenticating the wireless device with the fixed station based on whether the second unique identifier received in the first authentication request matches the second unique identifier received in the second authentication request, and also based on whether the first unique identifier received in the first authentication request is associated in an authentication database with the second unique identifier received in the second authentication request. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. An authentication server for authenticating a wireless device with a fixed station, the authentication server comprising:
-
a receiver for receiving a first authentication request from the wireless device when the wireless device detects that the fixed station is in close proximity, and a second authentication request from the fixed station when the fixed station detects that the wireless device is in close proximity, the first authentication request including a first unique identifier for identifying the wireless device and a second unique identifier for identifying the fixed station, and the second authentication request including the second unique identifier for identifying the fixed station;
an authentication database; and
a processor for determining whether to authenticate the wireless device with the fixed station based on whether the second unique identifier received in the first authentication request matches the second unique identifier received in the second authentication request, and also based on whether the first unique identifier received in the first authentication request is associated in an authentication database with the second unique identifier received in the second authentication request. - View Dependent Claims (16, 17, 18)
-
Specification