WIRELESS TOKEN DEVICE
First Claim
Patent Images
1. A method comprising:
- detecting a first computing device as substantially collocated with a wireless token device, using a short-range wireless communication network;
establishing a connection between the first computing device and the wireless token device over the short-range wireless network; and
sending authentication data stored in memory of the wireless token device from the wireless token device to the first computing device over the short-range wireless network;
wherein the first computing device is authenticated to a particular computing session based on the authentication data and authenticating the first computing device permits the first computing device to participate in the particular computing session.
8 Assignments
0 Petitions
Accused Products
Abstract
A first computing device is detected as substantially collocated with a wireless token device, using a short-range wireless communication network, and a connection is established between the first computing device and the wireless token device over the short-range wireless network. Authentication data stored in memory of the wireless token device is sent from the wireless token device to the first computing device over the short-range wireless network. The first computing device is authenticated to a particular computing session based on the authentication data and authenticating the first computing device permits the first computing device to participate in the particular computing session.
121 Citations
24 Claims
-
1. A method comprising:
-
detecting a first computing device as substantially collocated with a wireless token device, using a short-range wireless communication network; establishing a connection between the first computing device and the wireless token device over the short-range wireless network; and sending authentication data stored in memory of the wireless token device from the wireless token device to the first computing device over the short-range wireless network; wherein the first computing device is authenticated to a particular computing session based on the authentication data and authenticating the first computing device permits the first computing device to participate in the particular computing session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. Logic encoded in non-transitory media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
detecting a first computing device as substantially collocated with a wireless token device, using a short-range wireless communication network; establishing a connection between the first computing device and the wireless token device over the short-range wireless network; and sending authentication data stored in memory of the wireless token device from the wireless token device to the first computing device over the short-range wireless network; wherein the first computing device is authenticated to a particular computing session based on the authentication data and authenticating the first computing device permits the first computing device to participate in the particular computing session.
-
-
23. A wireless token apparatus comprising:
-
a processor device; a memory element; a short-range wireless network adapter adapted to; detect a first computing device as substantially collocated with the apparatus, using a short-range wireless communication network; establish a connection between the first computing device and the apparatus over the short-range wireless network; and an authentication broker adapted to; send authentication data stored in the memory element to the first computing device over the short-range wireless network; wherein the first computing device is authenticated to a particular computing session based on the authentication data and authenticating the first computing device permits the first computing device to participate in the particular computing session. - View Dependent Claims (24)
-
Specification