MOBILE AUTHENTICATION USING A WEARABLE DEVICE
First Claim
Patent Images
1. A method comprising:
- detecting an attempt by a user to access a protected system;
detecting that a first security token system is within a first proximity to the protected system;
providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on the detecting that the first security token system is within the first proximity, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing a user with an option to access a protected system by satisfying a reduced security measure is disclosed. An attempt by the user to access the protected system is detected. It is detected that a first security token system is within a first proximity to the protected system. Based on the detecting of the attempt by the user to access the protected system and the detecting that the first security token system is within the first proximity, the user is provided with the option to access the protected system by satisfying the reduced security measure.
-
Citations
20 Claims
-
1. A method comprising:
-
detecting an attempt by a user to access a protected system; detecting that a first security token system is within a first proximity to the protected system; providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on the detecting that the first security token system is within the first proximity, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9)
-
-
8. A system comprising:
-
a processor; at least one module implemented by the processor and configured to; detect an attempt by a user to access a protected system; detect that a first security token system is within a first proximity to the protected system; provide the user with an option to access the protected system by satisfying a reduced security measure, the providing based on the detecting that the first security token system is within the first proximity. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory machine readable medium embodying a set of instructions that, when executed by a processor, causes the processor to perform operations comprising:
-
detecting an attempt by a user to access a protected system; detecting that a first security token system is within a first proximity to the protected system; providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on the detecting that the first security token system is within the first proximity. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification