WIRELESS TOKEN AUTHENTICATION
First Claim
Patent Images
1. A method comprising:
- receiving, from a first computing device, authentication data based on data received by the first computing device from a wireless token device over a wireless connection between the first computing device and the wireless token device and based at least in part on the wireless token device being in proximity to the first computing device, the authentication data used to authenticate a first user to a particular computing session hosted remote from the first computing device;
authenticating the first computing device to the particular computing session based on the received authentication data; and
permitting the first computing device to consume resources of the particular computing session.
10 Assignments
0 Petitions
Accused Products
Abstract
Authentication data is received, from a first computing device, based on data received by the first computing device from a wireless token device, the authentication data used to authenticate a first user to a particular computing session hosted remote from the first computing device. The first computing device is authenticated to the particular computing session based on the received authentication data. The first computing device is permitted to consume resources of the particular computing session. In some instances, the data received by the first computing device from the wireless token device includes the authentication data.
-
Citations
23 Claims
-
1. A method comprising:
-
receiving, from a first computing device, authentication data based on data received by the first computing device from a wireless token device over a wireless connection between the first computing device and the wireless token device and based at least in part on the wireless token device being in proximity to the first computing device, the authentication data used to authenticate a first user to a particular computing session hosted remote from the first computing device; authenticating the first computing device to the particular computing session based on the received authentication data; and permitting the first computing device to consume resources of the particular computing session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. Logic encoded in non-transitory media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
receiving, from a first computing device, authentication data forwarded by the first computing device from a wireless token device to a server device hosting a particular computing session, the authentication data used to authenticate a first user to the particular computing session, wherein the authentication data was received by the first computing device from the wireless token device over a wireless communication channel and based at least in part on the wireless token device being in proximity to the first computing device; authenticating the first computing device to the particular computing session based on the received authentication data; and permitting the first computing device to consume resources of the particular computing session.
-
-
23. A system comprising:
-
at least one processor device; at least one memory element; and a session manager, adapted when executed by the at least one processor device to; manage hosting of a particular computing session; receive, from a first computing device, authentication data forwarded by the first computing device from a wireless token device, the authentication data used to authenticate a first user to the particular computing session, wherein the authentication data was received by the first computing device from the wireless token device over a wireless communication channel and based at least in part on the wireless token device being in proximity to the first computing device; authenticate the first computing device to the particular computing session based on the received authentication data; and permit the first computing device to consume resources of the particular computing session.
-
Specification