User authentication using personal objects
First Claim
1. A computer-implemented method for providing a user secure access to a plurality of applications, the computer-implemented method comprising using in an authentication scheme a personal object that said user already uses for purposes other than said authentication scheme, wherein an object ID associated with said personal object is used as an authentication credential in said authentication scheme associated with accessing one or more of said plurality of applications.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system of authentication for accessing one or more applications by a user by using a personal object belonging to the user. Such a personal object is one that is already in use by the user for purposes other than accessing the one or more applications.
33 Citations
67 Claims
- 1. A computer-implemented method for providing a user secure access to a plurality of applications, the computer-implemented method comprising using in an authentication scheme a personal object that said user already uses for purposes other than said authentication scheme, wherein an object ID associated with said personal object is used as an authentication credential in said authentication scheme associated with accessing one or more of said plurality of applications.
-
37. A method for allowing secure access of a plurality of applications by a user, the method comprising:
-
selecting a personal object belonging to said user, wherein said personal object is already in use by said user for purposes other than said secure access;
electronically reading an electronic object ID of said personal object; and
using said electronic object ID to access one or more of said plurality of applications.
-
-
38. An authentication system for authenticating a user who wishes to access a plurality of enterprise applications, said authentication system comprising an object ID reader for reading an object ID, wherein said object ID is associated with a personal object belonging to said user and wherein said personal object is already in use by said user for purposes other than accessing said plurality of enterprise applications, an agent for communicating said object ID to one or more of:
- an application server associated with said plurality of enterprise applications, and an object verifier.
- View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
67. An authentication system, the authentication system comprising:
-
means for reading an object ID for accessing one or more applications in at least one enterprise application system;
means for employing said object ID in formulating authentication credentials for accessing said one or more applications;
means for interfacing with said at least one enterprise application system for purposes of accessing said at least one or more enterprise applications; and
means for remotely verifying said authentication credentials, if verification is desired.
-
Specification