METHOD, SYSTEM AND APPARATUS FOR ACCESSING A RESOURCE BASED ON DATA SUPPLIED BY A LOCAL USER
First Claim
1. A method, comprising:
- acquiring candidate data in association with a request for accessing a resource, said candidate data comprising first data and second data;
processing said first data with a first key in an attempt to effect decryption of said first data, thereby to obtain first processed data;
processing the second data with a second key in an attempt to effect decryption of said second data, thereby to obtain second processed data;
granting said request if a pre-determined portion of said first processed data is derivable from said second processed data.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, comprising: acquiring candidate data in association with a request for accessing a resource, said candidate data comprising first data and second data; processing said first data with a first key in an attempt to effect decryption of said first data, thereby to obtain first processed data; processing the second data with a second key in an attempt to effect decryption of said second data, thereby to obtain second processed data; and granting said request if a pre-determined portion of said first processed data is derivable from said second processed data. The method may further comprise extracting from said first processed data a group identifier and said pre-determined portion of said first processed data, and effecting a comparison of said group identifier to a reference group identifier in order to conclude whether said first data has been successfully decrypted based on an outcome of said comparison.
-
Citations
86 Claims
-
1. A method, comprising:
-
acquiring candidate data in association with a request for accessing a resource, said candidate data comprising first data and second data; processing said first data with a first key in an attempt to effect decryption of said first data, thereby to obtain first processed data; processing the second data with a second key in an attempt to effect decryption of said second data, thereby to obtain second processed data; granting said request if a pre-determined portion of said first processed data is derivable from said second processed data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A computer-readable medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method, the computer-readable program code comprising:
-
first computer-readable program code for causing the computing apparatus to acquire candidate data in association with a request for accessing a resource, said candidate data comprising first and second data; second computer-readable program code for causing the computing apparatus to process said first data with a first key in an attempt to effect decryption of said first data, thereby to obtain first processed data; third computer-readable program code for causing the computing apparatus to process the second data with a second key in an attempt to effect decryption of said second data, thereby to obtain second processed data; and fourth computer-readable program code for causing the computing apparatus to grant said request if a pre-determined portion of said first processed data is derivable from said second processed data.
-
-
45. A method comprising:
-
receiving a request for accessing a resource, said request comprising first data and second data; processing said first data with a key in an attempt to effect decryption of said first data, thereby to obtain processed data; granting said request if a pre-determined portion of said processed data is derivable from said second data. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68)
-
-
69. A method of pre-authorizing a user to access a resource, comprising:
-
determining a user identifier associated with the user; applying a hash function to said user identifier to create a hash value; determining a second identifier associated with a group of users pre-authorized to access the resource, said group including said user; encrypting the second identifier and at least one of the user identifier and the hash value with an encryption key to produce first data; providing said first data and the other of the user identifier and the hash value to said user. - View Dependent Claims (70, 71, 72, 73, 74)
-
- 75. The method of said 74, further comprising providing said second decryption key to said user.
-
78. A tag, comprising:
- a memory storing an encrypted version of first data and an encrypted version of second data, said first data capable of being retrieved by decryption using a first key received from a first entity, said second data capable of being retrieved by decryption using a second key received from a user of the tag, wherein a pre-determined portion of said first data is derivable from said second data when the user is pre-authorized by the first entity to access a resource associated with a second entity having a trust relationship with the first entity.
- View Dependent Claims (79, 80, 81, 82, 83, 84)
-
85. A method, comprising;
-
informing a user of a data element indicative of said user being pre-authorized to access a resource to which access is controlled by a gateway entity; receiving usage data from said gateway entity, said usage data being indicative of said user accessing said resource via said gateway entity; and compensating said gateway entity for said user'"'"'s access to said resource. - View Dependent Claims (86)
-
Specification