USER AUTHENTICATON
First Claim
1. A method of authenticating access to a service, comprising:
- a) receiving at a mobile terminal, over a bi-directional near-field communication channel between the mobile terminal and a client, at least part of the identifier of a service;
b) comparing, at the mobile terminal, at least part of said identifier received at the mobile terminal with a set of identifiers stored in the mobile device; and
c) authenticating access to the service on the basis of whether the at least part of the identifier received at the mobile terminal matches an identifier in the set.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating access to a service comprises: a) receiving at a mobile terminal, over a bi-directional near-field communication channel between the mobile terminal and a browser, at least part of the identifier of a service; b) comparing, at the mobile terminal, at least part of the identifier received at the mobile terminal with a set of identifiers stored in the mobile device; and c) authenticating access to the service on the basis of whether at least part of the identifier received at the mobile terminal matches an identifier in the set. The mobile terminal may stored a set of URLs, and may compare a received URL (or part URL) with the set of stored URLs. It may generate an alert to the user if at least part of the URL received at the mobile terminal does not match a stored URL. User names and keys are not required to be stored on the web-browser, so the web-browser does not need to maintain a password database. This improves security, since a password database would be vulnerable to malicious code.
64 Citations
27 Claims
-
1. A method of authenticating access to a service, comprising:
-
a) receiving at a mobile terminal, over a bi-directional near-field communication channel between the mobile terminal and a client, at least part of the identifier of a service; b) comparing, at the mobile terminal, at least part of said identifier received at the mobile terminal with a set of identifiers stored in the mobile device; and c) authenticating access to the service on the basis of whether the at least part of the identifier received at the mobile terminal matches an identifier in the set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A mobile terminal, comprising:
-
a receiver for receiving, over a bi-directional near-field communication channel between the mobile terminal and a web client, at least part of the identifier of a service; and a comparator for comparing the at least part of the identifier received at the mobile terminal with a set of identifiers stored in the mobile device, wherein the mobile terminal is adapted to authenticate access to the service on the basis of whether the at least part of the identifier received at the mobile terminal matches an identifier in the set. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification