Phone with secure element and critical data
First Claim
1. A method for accessing sensitive or confidential information remotely over a wireless communication network, comprising:
- providing first level authentication information for initiating wireless communication with a remote source, the wireless communication enabling an information request requiring second level authentication information;
providing at least second level authentication information, via a wireless medium, for requesting sensitive or confidential information;
wherein at least one of the first level and second level authentication information includes unique machine-readable identification information for ensuring association with a required context when accessing the sensitive or confidential information.
2 Assignments
0 Petitions
Accused Products
Abstract
A wireless communication device is implemented with a smart card module to secure the transmission of sensitive or confidential information. The user of the device must request permission to activate an application on the smart card module from a remote source. After this first level of security is satisfied, the application on the smart card module enables the user to scan data via a machine-readable medium in order to make a data request to the remote source. If a second level authorization is met in regard to the data request, the remote source will transmit the requested sensitive or confidential information to the user to view and/or update.
60 Citations
31 Claims
-
1. A method for accessing sensitive or confidential information remotely over a wireless communication network, comprising:
-
providing first level authentication information for initiating wireless communication with a remote source, the wireless communication enabling an information request requiring second level authentication information;
providing at least second level authentication information, via a wireless medium, for requesting sensitive or confidential information;
wherein at least one of the first level and second level authentication information includes unique machine-readable identification information for ensuring association with a required context when accessing the sensitive or confidential information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A wireless communication device for accessing sensitive or confidential information remotely over a wireless communication network, comprising:
-
means for providing first level authentication information for initiating wireless communication with a remote source, the wireless communication enabling an information request requiring second level authentication information;
means for providing at least second level authentication information, via a wireless medium, for requesting sensitive or confidential information;
wherein at least one of the first level and second level authentication information includes unique machine-readable identification information for ensuring association with a required context when accessing the sensitive or confidential information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product comprising a computer usable medium having computer readable program code embodied in said medium for accessing sensitive or confidential information remotely over a wireless communication network, comprising:
-
a computer readable program code for providing first level authentication information for initiating wireless communication with a remote source, the wireless communication enabling an information request requiring second level authentication information;
a computer readable program code for providing at least second level authentication information, via a wireless medium, for requesting sensitive or confidential information;
wherein at least one of the first level and second level authentication information includes unique machine-readable identification information for ensuring association with a required context when accessing the sensitive or confidential information. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A system for accessing sensitive or confidential information remotely over a wireless communication network, comprising:
-
A wireless communication device including a secured smart card module;
A remote source including at least a server containing sensitive or confidential information;
A machine-readable tag for providing at least first level or second level authentication information;
The wireless communication device providing first level authentication information for initiating wireless communication with the server, the wireless communication triggering a response from the server including a token enabling an information request requiring second level authentication information from the secured smart card module;
The wireless communication device providing at least second level authentication information via a wireless medium, for requesting sensitive or confidential information from the server;
wherein at least one of the first level and second level authentication information includes unique identification information read from the machine-readable tag, for ensuring association with a required context when accessing the sensitive or confidential information.
-
Specification