Security, storage and communication system
First Claim
1. A secure system comprising:
- a user authentication device including memory for storing information regarding one or more authentication factors, a microCPU, an authentication factor input and a communication port; and
a securely monitored device including an identification transmitter that broadcasts information, wherein a user is granted access to receive the broadcast information from said securely monitored device through said user authentication device after the user is authenticated by said user authentication device.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure system includes a user authentication device including memory, a microCPU, an authentication factor input and a communication port. The authentication device interacts with a securely monitored device including an identification transmitter that broadcasts information. A user is granted access to receive the broadcast information from the securely monitored device through the user authentication device after the user is authenticated by the user authentication device. A method of receiving information from a secured a device comprises the steps of receiving information broadcast from a securely monitored device to a user authentication device that includes memory for storing information regarding one or more authentication factors, a microCPU, an authentication factor input and a communication port. A user is authenticated by inputting authentication factors into the user authentication device. If the user is authenticated the received broadcast information to the user.
-
Citations
20 Claims
-
1. A secure system comprising:
-
a user authentication device including memory for storing information regarding one or more authentication factors, a microCPU, an authentication factor input and a communication port; and
a securely monitored device including an identification transmitter that broadcasts information, wherein a user is granted access to receive the broadcast information from said securely monitored device through said user authentication device after the user is authenticated by said user authentication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of receiving information from a secured a device comprising the steps of:
-
receiving information that is broadcast from a securely monitored device that includes an identification transmitter that broadcasts information, wherein the information is received in a user authentication device that includes memory for storing information regarding one or more authentication factors, a microCPU, an authentication factor input and a communication port;
authenticating a user to use the user authentication device by receiving authentication factor input through the user authentication device and comparing the authentication factor input to authentication factor information previously stored in the user authentication device and/or database on a server; and
if the authentication factor input into the authentication device matches the authentication factor information stored in the user authentication device, authenticating the user authentication device to provide the received broadcast information to the user. - View Dependent Claims (18, 19, 20)
-
Specification