QUORUM-BASED SECURE AUTHENTICATION
First Claim
Patent Images
1. A method of secure authentication to a resource in accordance with a predefined, electronically stored quorum-based authentication policy, the method comprising the steps of:
- causing electronic interaction among a plurality of devices each associated with a user thereof, the devices constituting a quorum in accordance with the policy;
computationally determining whether the interaction satisfies the policy; and
if so, electronically according access to the resource to at least one individual associated with at least one of the interacting devices.
7 Assignments
0 Petitions
Accused Products
Abstract
Representative embodiments of secure authentication to a resource in accordance with a predefined, electronically stored quorum-based authentication policy include causing electronic interaction among multiple devices that constitute a quorum in accordance with the policy, computationally determining whether the interaction satisfies the policy, and if so, electronically according access to the resource to one or more individuals associated with the interacting device(s).
62 Citations
16 Claims
-
1. A method of secure authentication to a resource in accordance with a predefined, electronically stored quorum-based authentication policy, the method comprising the steps of:
-
causing electronic interaction among a plurality of devices each associated with a user thereof, the devices constituting a quorum in accordance with the policy; computationally determining whether the interaction satisfies the policy; and if so, electronically according access to the resource to at least one individual associated with at least one of the interacting devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An authentication server comprising:
-
a database for storing a quorum-based authentication policy for access to a secured resource, identifiers associated with users entitled to access the secured resource, and identifiers associated with a plurality of mobile devices that are themselves associated with the users; a communication module for receiving, from at least one of the mobile devices, an indicium indicating at least one interaction among the plurality of mobile devices; and a processor configured to determine whether (i) the plurality of mobile devices constitutes a quorum in accordance with the stored policy and (ii) whether the interaction satisfies the policy, and if so, to cause at least one individual associated with at least one of the mobile devices to be accorded access to the secured resource. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A wireless mobile device comprising a processor for:
-
executing a first procedure for communicating with at least one other wireless mobile device; executing a second procedure for creating an indicium indicative of the communication; executing a third procedure for reading an identifying tag associated with a device capable of facilitating access to a resource; and executing a fourth procedure for transmitting the indicium, information from the identifying tag and information identifying the wireless mobile device to a server.
-
Specification