Authentication system based on periodic challenge/response protocol
First Claim
1. A method to control an operating state of a node, the method comprising:
- authenticating a token by a user inputting data into the token;
authenticating a node by exchanging messages between the token possesed by the user and the node, periodically performing the message exchange to ascertain whether the token is within a predetermined distance from the node, and disabling at least one peripheral device of the node in order to place the node into a non-operational state if the token is determined to be outside a range established by the predetermined distance; and
periodically authenticating the token by requiring the user to input the data into the token.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless authentication system to control an operating state of a node being a computer, door control mechanism or any muti-state product based on the proximity of an authorized user to the node. The wireless authentication system comprises a security device implemented within the computer and a user authentication token ("token") in possession of the authorized user. A Challenge/Response protocol is configured between the security device and the token. The first successful Challenge/Response message exchange between the security device and the token places the node in an operational state allowing the authorized user access to the contents and/or networked resources of the node. Later Challenge/Response message exchanges are set to occur periodically to check whether the authorized user possessing the token has left the node unattended thereby causing the node to be placed in a non-operational state.
-
Citations
47 Claims
-
1. A method to control an operating state of a node, the method comprising:
-
authenticating a token by a user inputting data into the token; authenticating a node by exchanging messages between the token possesed by the user and the node, periodically performing the message exchange to ascertain whether the token is within a predetermined distance from the node, and disabling at least one peripheral device of the node in order to place the node into a non-operational state if the token is determined to be outside a range established by the predetermined distance; and periodically authenticating the token by requiring the user to input the data into the token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method to control an operating state of a node, the method comprising:
-
authenticating a user from loading alphanumeric data into a token and determining whether the alphanumeric data matches pre-stored alphanumeric data; exchanging at least a first and second messages between the token and the node, the node being placed in an operational state if the second message correctly responds to the first message; and periodically determining whether the token is within a predetermined distance from the node. - View Dependent Claims (13, 14)
-
-
15. A wireless authentication system comprising:
-
a computer including a peripheral device; a security device having a wireless transceiver, the security device, including a package containing both (i) a processing unit and (ii) a memory unit coupled to the processing unit, to generate a plurality of messages to be transmitted through the wireless transceiver, each of the plurality of messages is separately transmitted after a prescribed time interval has elapsed; and a token to establish a wireless communication link with the security device, to operate in combination with the security device to respond to the plurality of messages in order to place the computer in an operational state using the plurality of messages when the token is within a predetermined distance from the computer, to place the computer in a non-operational state by disabling the peripheral device, and to authenticate a user of the token by periodically notifying the user to input information therein. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A wireless authentication system comprising:
a computer including a transmitter, a receiver, and a security device including a processing unit and a memory unit; and a token in bi-directional communications with the transmitter and receiver of the computer, the token operating in combination with the security device to place the computer in an operational state when the token is determined to be within a predetermined distance from the computer, and to place the computer in a non-operational state when the token is determined to be more than the predetermined distance from the computer, the token further authenticating its user by comparing input data received with a prestored master after a period of time has elapsed. - View Dependent Claims (23)
-
24. A method to control an operating state of a node, the method comprising:
-
activating a token; placing a node into either (i) an operational state if the token is determined to be within a predetermined distance from the node, or (ii) an non-operational state when the token is determined to be located more than the predetermined distance from the node; and re-authenticating the user of the token by periodically requiring the user to input predetermined data into the token. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A method to control an operating state of a node, the method comprising:
-
activating a token upon authentication of the user by loading alphanumeric data into the token and determining that the alphanumeric data matches pre-stored alphanumeric data; determining a state of the node by exchanging at least a first message and a second message between the token and the node, the node being placed in an operational state if the second message correctly responds to the first message; and periodically authenticating that the user is in possession of the token. - View Dependent Claims (34, 35, 36, 37, 38)
-
-
39. A token comprising:
-
an interface to support wireless communications with a node; a memory element; and a processor coupled to the memory element and the interface, the processor to authenticate a user of the token by periodically notifying the user to input information therein and to exchange messages with the node in order to place the node in an non-operational state when the token is determined to be greater than a predetermined distance away from the node. - View Dependent Claims (40, 41, 42)
-
-
43. A node comprising:
-
a peripheral device; a security device having a wireless transceiver and in control of the node, the security device to transmit a plurality of messages, each of the plurality of messages is separately transmitted to a mobile token after a prescribed time interval has elapsed in order to determine whether the token is within a predetermined distance from the security device and to maintain the node in an operational state if the token is authenticated and is determined to be within a predetermined distance from the security device. - View Dependent Claims (44, 45, 46, 47)
-
Specification