METHOD, SYSTEM AND DEVICE FOR AUTHENTICATING A USER
First Claim
Patent Images
1. A method of authenticating a user of a computer via a handheld electronic device, the method comprising:
- receiving a first authentication code at the handheld electronic device, wherein the first authentication code has been generated using an algorithm and objective criterion;
generating a secure identification token at the handheld electronic device using the algorithm and objective criterion;
comparing the secure identification token generated at the handheld electronic device to the first authentication code received at the handheld electronic device; and
if the secure identification token generated at the handheld electronic device matches the first authentication code received at the handheld electronic device, transmitting a second authentication code from the handheld electronic device to the computer over a communication link therebetween, the second authentication code for unlocking the computer.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments described herein relate to a method and device for authenticating a user of a computer and a corresponding system using the method and device. The device is a handheld electronic device configured to receive a first authentication code and to generate a secure identification token. If the received first authentication code and the generated token match, a second authentication code is transmitted to a computer to unlock the computer.
-
Citations
21 Claims
-
1. A method of authenticating a user of a computer via a handheld electronic device, the method comprising:
-
receiving a first authentication code at the handheld electronic device, wherein the first authentication code has been generated using an algorithm and objective criterion; generating a secure identification token at the handheld electronic device using the algorithm and objective criterion; comparing the secure identification token generated at the handheld electronic device to the first authentication code received at the handheld electronic device; and if the secure identification token generated at the handheld electronic device matches the first authentication code received at the handheld electronic device, transmitting a second authentication code from the handheld electronic device to the computer over a communication link therebetween, the second authentication code for unlocking the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A handheld electronic device comprising:
-
a processor configured to implement a token generator at the handheld electronic device, the token generator configured to generate a secure identification token at the handheld electronic device using an algorithm and objective criterion; and a communication interface configured to permit communications between the handheld electronic device and a computer; wherein the processor is configured to receive a first authentication code at the handheld electronic device, wherein the first authentication code has been generated using the algorithm and objective criterion; and wherein the processor is further configured to compare the secure identification token generated at the handheld electronic device to the first authentication code received at the handheld electronic device, and, if the secure identification token generated at the handheld electronic device matches the first authentication code received at the handheld electronic device, to transmit a second authentication code from the handheld electronic device to the computer over a communication link therebetween, the second authentication code for unlocking the computer. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer readable storage medium having stored thereon computer program instructions which, when executed by a processor of a handheld electronic device, cause the handheld electronic device to perform a method of authenticating a user of a computer via the handheld electronic device, wherein the method comprises:
-
receiving a first authentication code at the handheld electronic device, wherein the first authentication code has been generated using an algorithm and objective criterion; generating a secure identification token at the handheld electronic device using the algorithm and objective criterion; comparing the secure identification token generated at the handheld electronic device to the first authentication code received at the handheld electronic device; and if the secure identification token generated at the handheld electronic device matches the first authentication code received at the handheld electronic device, transmitting a second authentication code from the handheld electronic device to the computer over a communication link therebetween, the second authentication code for unlocking the computer.
-
Specification