MOBILE AUTHENTICATION USING A WEARABLE DEVICE
First Claim
Patent Images
1. A method comprising:
- associating a first security token value with a first security token system;
associating a second security token value with a second security token system;
detecting an attempt by a user to access a protected system; and
providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing a user with an option to access a protected system by satisfying a reduced security measure is disclosed. An attempt by the user to access the protected system is detected. It is detected that a first security token system is within a first proximity to the protected system. Based on the detecting of the attempt by the user to access the protected system and the detecting that the first security token system is within the first proximity, the user is provided with the option to access the protected system by satisfying the reduced security measure.
-
Citations
20 Claims
-
1. A method comprising:
-
associating a first security token value with a first security token system; associating a second security token value with a second security token system; detecting an attempt by a user to access a protected system; and providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
at least one module implemented by at least one processor, the at least one module configured to, at least; associate a first security token value with a first security token system; associate a second security token value with a second security token system; detect an attempt by a user to access a protected system; and provide the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine readable medium embodying a set of instructions that, when executed by at least one processor, causes the at least one processor to perform operations, the operations comprising:
-
associating a first security token value with a first security token system; associating a second security token value with a second security token system; detecting an attempt by a user to access a protected system; and providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification