METHOD AND SYSTEM FOR ACCESS TO SECURE RESOURCES
First Claim
1. A method for an external a device to gain access to a secure area of a resource, comprising:
- transmitting a signal that identifies the device as capable of authentication;
receiving an initiation of communication with the resource;
responding to the initiation of communication by transmitting one or more authentication mechanisms of the device, the authentication mechanisms being hardware devices for identifying an attribute of a user of the device;
receiving a request for use of one or more of the authentication mechanisms;
transmitting a token for each of the requested authentication mechanisms; and
gaining access to the secure area in response to acceptance of the one or more of the tokens by the resource.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for accessing secured resources using a portable device. When a user with such a portable device is within close proximity to a locked door or other secured resource, a verification process can be automatically initiated on the device. The user verification could utilize all the input and sensor methods on the device. Once the identification process has successfully completed, an access code can be transmitted to the locked door or device via wired or wireless network. This allows for reduced electronics required at these locked doors and allows for more dynamic security measures.
86 Citations
18 Claims
-
1. A method for an external a device to gain access to a secure area of a resource, comprising:
-
transmitting a signal that identifies the device as capable of authentication; receiving an initiation of communication with the resource; responding to the initiation of communication by transmitting one or more authentication mechanisms of the device, the authentication mechanisms being hardware devices for identifying an attribute of a user of the device; receiving a request for use of one or more of the authentication mechanisms; transmitting a token for each of the requested authentication mechanisms; and gaining access to the secure area in response to acceptance of the one or more of the tokens by the resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for a resource to grant access to a secure area of the resource to an external device, comprising:
-
receiving a signal from the external device that is capable of authentication; initiating a communication with the external device; receiving a list of one or more authentication tokens the external device is capable of providing, the authentication tokens being results of hardware devices for identifying an attribute of a user of the external device; transmitting a request for one or more authentication tokens; receiving one or more authentication tokens in response to the request; and granting to the external device access to the secure area based upon acceptability of the one or more authentication tokens. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A portable device for gaining access to a secure area of a resource, comprising:
-
a transmitter to transmit a signal that identifies the device as capable of authentication; a receiver to receive an initiation of a communication with the resource; a controller to respond to the initiation of the communication by transmitting one or more authentication mechanisms of the device; wherein the receiver receives a request for use of one or more of the authentication mechanisms; wherein the transmitter transmits a token for each of the requested authentication mechanisms; and wherein the device gains access to the secure area in response to acceptance of the one or more of the tokens by the resource. - View Dependent Claims (16)
-
-
17. An authentication unit of a resource for granting access to a secure area of the resource to an external device, comprising:
-
a first receiver to receive a signal from the external device that is capable of authentication; a communicator to initiate a communication with the external device; wherein the receiver receives a list of one or more authentication tokens the external device is capable of providing, the authentication tokens being results of hardware devices for identifying an attribute of a user of the external device; a transmitter to transmit a request for one or more authentication tokens; wherein the receiver receives one or more authentication tokens in response to the request; and an authenticator to grant the external device access to the secure area based upon acceptability of the one or more authentication tokens. - View Dependent Claims (18)
-
Specification