MOBILE AUTHENTICATION USING A WEARABLE DEVICE
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing a user with an option to access a protected system by satisfying a reduced security measure is disclosed. An attempt by the user to access the protected system is detected. It is detected that a first security token system is within a first proximity to the protected system. Based on the detecting of the attempt by the user to access the protected system and the detecting that the first security token system is within the first proximity, the user is provided with the option to access the protected system by satisfying the reduced security measure.
77 Citations
21 Claims
-
1. (canceled)
-
2. A system comprising:
-
one or more computer processors; one or more computer memories, the one or more computer memories including computer instructions, the computer instructions configuring the one or more processors to perform operations, the operations comprising; determining a first security token value based on a property of a first security token system, the property including at least one of a reliability or a level of security of the first security token system; determining a second security token value based on a property of a first security token system, the property including at least one of a reliability or a level of security of the second security token system; associating the first security token value with the first security token system; associating the second security token value with the second security token system; detecting an attempt by the user to access a protected system; and providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
determining a first security token value based on a property of a first security token system, the property including at least one of a reliability or a level of security of the first security token system; determining a second security token value based on a property of a first security token system, the property including at least one of a reliability or a level of security of the second security token system; associating the first security token value with the first security token system; associating the second security token value with the second security token system; detecting an attempt by the user to access a protected system; and providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, wherein the providing of the user with the option is performed by one or more computer processors. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory machine readable storage medium embodying instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
determining a first security token value based on a property of a first security token system, the property including at least one of a reliability or a level of security of the first security token system; determining a second security token value based on a property of a first security token system, the property including at least one of a reliability or a level of security of the second security token system; associating the first security token value with the first security token system; associating the second security token value with the second security token system; detecting an attempt by the user to access a protected system; and providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, wherein the providing of the user with the option is performed by one or more computer processors. - View Dependent Claims (19, 20, 21)
-
-
17. The non-transitory machine readable storage medium of claim 96, the operations further comprising:
-
detecting that the first security token system is within a first proximity to the protected system; detecting that the second security token system is within a second proximity to the protected system; and wherein the providing of the user with the option is further based on the detecting that the first security token system is within the first proximity and the detecting that the second security token system is within the second proximity. - View Dependent Claims (18)
-
Specification