Security for controlled access systems
First Claim
1. A method for ensuring that a user requesting access to a secured system should be granted such access, said user having substantially unique user identifying information and a wireless communication device with a substantially unique activation number if the user is entitled to access to the secured system, said method comprising the steps of:
- entering said user identifying information into said secured system, said entering step being performed by said user;
identifying the activation number of the wireless communication device which the user identified by said user identifying information should have, said identifying step being performed by said secured system;
transmitting revalidation information to the wireless communication device which the user identified by said user identifying information should have, said transmitting step being at least initiated by said secured system;
returning said revalidation information to said secured system, said returning step being performed by said user if said user has the wireless communication device which said user should have; and
detecting whether the revalidation information returned in said returning step matches the revalidation information transmitted in said transmitting step, and if so, allowing said user access to said secured system, said detecting step being performed by said secured system.
1 Assignment
0 Petitions
Accused Products
Abstract
In order to gain access to a secured system, a user must be able to enter valid user identification information and must also have a remote wireless communication device such as a pager or cellular telephone having a number that is substantially unique to that user. When the user requests access to the secured system, the system places a call to the user'"'"'s remote wireless communication device and sends that device revalidation information such as a random number generated by the secured system. The user must return the revalidation information to the secured system to gain access. In an alternative embodiment, another person (a user-approver) has the remote wireless communication device and must return the revalidation information to the secured system if the user-approver approves the user'"'"'s request for access.
57 Citations
24 Claims
-
1. A method for ensuring that a user requesting access to a secured system should be granted such access, said user having substantially unique user identifying information and a wireless communication device with a substantially unique activation number if the user is entitled to access to the secured system, said method comprising the steps of:
-
entering said user identifying information into said secured system, said entering step being performed by said user; identifying the activation number of the wireless communication device which the user identified by said user identifying information should have, said identifying step being performed by said secured system; transmitting revalidation information to the wireless communication device which the user identified by said user identifying information should have, said transmitting step being at least initiated by said secured system; returning said revalidation information to said secured system, said returning step being performed by said user if said user has the wireless communication device which said user should have; and detecting whether the revalidation information returned in said returning step matches the revalidation information transmitted in said transmitting step, and if so, allowing said user access to said secured system, said detecting step being performed by said secured system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for ensuring that a user requesting access to a secured system should be granted such access, said user having substantially unique user identifying information and being associated with a wireless communication device which has a substantially unique activation number if the user is entitled to access to the secured system, said wireless communication device being controlled by a user-approver who must approve said user'"'"'s request for access to said secured system, said method comprising the steps of:
-
entering said user identifying information into said secured system, said entering step being performed by said user; identifying the activation number of the wireless communication device associated with the user identified by said user identifying information, said identifying step being performed by said secured system; transmitting revalidation information to the wireless communication device associated with the user identified by said user identifying information, said transmitting step being at least initiated by said secured system; returning said revalidation information to said secured system, said returning step being performed by said user-approver if said user-approver approves said user'"'"'s request for access to said secured system; and detecting whether the revalidation information returned in said returning step matches the revalidation information transmitted in said transmitting step, and if so, allowing said user access to said secured system, said detecting step being performed by said secured system. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification