SYSTEM AND METHOD FOR MANAGING SONIC TOKEN VERIFIERS
First Claim
1. A system for authentication, comprising:
- at least one hand-held token operable to generate at least one acoustic signal, the token being associated with a key identifier;
plural verifiers configured for receiving the acoustic signal and in response thereto accessing respective data structures representing identities of authorized tokens to selectively grant access to respective components; and
means coupled to the token and/or coupled to at least one verifier for adding the key identifier to the data structure associated with the verifier.
1 Assignment
0 Petitions
Accused Products
Abstract
A hand-held token can be operated to generate an acoustic signal representing the digital signature generated by a private key of a public key/private key pair. Verifiers that might be located at, e.g. buildings, in vehicles, at bank ATMs, etc. receive the signal and retrieve the corresponding public key to selectively grant access authorization to components served by the verifiers. Methods and systems permit adding and removing a token from the access list of a verifier. Other methods and systems enable the token to be used with several verifiers that are nearby each other, such as might be the case with multiple vehicles owned by the same user and parked nearby each other, without more than one verifier being operated to grant access.
91 Citations
28 Claims
-
1. A system for authentication, comprising:
-
at least one hand-held token operable to generate at least one acoustic signal, the token being associated with a key identifier; plural verifiers configured for receiving the acoustic signal and in response thereto accessing respective data structures representing identities of authorized tokens to selectively grant access to respective components; and means coupled to the token and/or coupled to at least one verifier for adding the key identifier to the data structure associated with the verifier. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for authentication, comprising:
-
at least one hand-held token operable to generate at least one acoustic signal, the token being associated with a key identifier; plural verifiers configured for receiving the acoustic signal and in response thereto accessing respective data structures representing identities of authorized tokens to selectively grant access to respective components; and means coupled to the token and/or coupled to at least one verifier for removing the key identifier from the data structure associated with the verifier. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A method for authentication, comprising:
-
transmitting a public key identifier associated with a token in an acoustic signal to a verifier; adding the key identifier to a data structure accessible to the verifier, the data structure representing identities of authorized tokens; generating at least one acoustic signal from the token, the signal being associated with a private key identifier; and receiving the acoustic signal at the verifier and in response thereto accessing the data structure to selectively grant access to a component - View Dependent Claims (13, 14, 15)
-
-
16. A method for authentication, comprising:
-
adding at least one key identifier to a data structure accessible to a verifier, the key identifier identifying a hand-held token; selectively granting access to at least one component associated with the verifier in response to acoustic authorization signals from the token; and removing the key identifier from the data structure. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. An authentication system, comprising:
-
at least one token configured for generating at least first and second acoustic signals, each signal being generated at least in part using a private key of the token; a first verifier configured for receiving acoustic signals and granting authorization to the user upon receipt of the first acoustic signal but not upon receipt of the second acoustic signal; and a second verifier configured for receiving acoustic signals and granting authorization to the user upon receipt of the second acoustic signal but not upon receipt of the first acoustic signal. - View Dependent Claims (23, 24, 25)
-
-
26. A method for selectively granting authorization to a bearer of a token to one of plural verifiers, comprising:
-
establishing a keyword for each verifier; gaining authorization access from a verifier by; speaking the keyword associated with the verifier; operating at least one activation element on the token to generate an acoustic authorization request receivable by the verifier; and selectively granting authorization based on the keyword and acoustic authorization request. - View Dependent Claims (27)
-
-
28. An authorization system, comprising:
plural hand-held tokens each generating a unique acoustic authorization request, the tokens being stackably engageable with each other.
Specification