Method for securing access to a remote system
First Claim
Patent Images
1. A method for secure user access to a separate system having data stored in a memory device, comprising the following steps:
- establishing a first connection between a first communications device and an access device and transmission of a first code word from the first communications device to the access device;
comparing the first code word with first authentication data stored in the access device;
establishing a second connection between a second communications device and the access device, and transmitting a second code word form the second communications device to the access device;
comparing the second code word with second authentication data stored in access device;
transmitting a third code word from access device to the first communications device;
transmitting the third code word from the first communications device to the second communications device;
transmitting the third code word from the second communications device to the access device; and
granting access to the system via at least one of the communications devices, given a valid third code word and the presence of a predetermined relationship between the first and second code words and the second authentication data stored in access device.
1 Assignment
0 Petitions
Accused Products
Abstract
Method for secure user access to a remote system using a communications device. Access to the system is released only after the input of valid code words via independent communications devices. One of the communications devices may be a data processing unit and the second communications device may be a mobile telephone.
80 Citations
27 Claims
-
1. A method for secure user access to a separate system having data stored in a memory device, comprising the following steps:
-
establishing a first connection between a first communications device and an access device and transmission of a first code word from the first communications device to the access device;
comparing the first code word with first authentication data stored in the access device;
establishing a second connection between a second communications device and the access device, and transmitting a second code word form the second communications device to the access device;
comparing the second code word with second authentication data stored in access device;
transmitting a third code word from access device to the first communications device;
transmitting the third code word from the first communications device to the second communications device;
transmitting the third code word from the second communications device to the access device; and
granting access to the system via at least one of the communications devices, given a valid third code word and the presence of a predetermined relationship between the first and second code words and the second authentication data stored in access device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 27)
an access device connected to the system; a data processing unit connectable to the access device via a data processing device network; and
a telephone connectable to the access device via a communication network.
-
-
27. The method in accordance with claim 1, wherein the second code word is equal to the third code word.
-
14. A method for secure user access to a separate system having data stored in a memory device, comprising the steps below:
-
establishing a first connection between a first communications device and an access device and transmission of a first code word from the first communications device to access device;
comparing the first code word with first authentication data stored in the access device;
given the presence of a predetermined relationship between the first code word and the authentication data stored in the access device, establishing a second connection between the access device and a second communications device and transmitting a second code word from access device to the second communications device;
transmitting the second code word from the second communications device to the first communications device;
transmitting the second code word from the first communications device to access device;
comparing the second code word with second authentication data stored in access device; and
granting access to the system with at least one of the communication devices, given the presence of a predetermined relationship between the second code word and the second authentication data stored in the access device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
an access device connected to the system; a data processing unit connectable to the access device via a data processing device network; and
a telephone connectable to the access device via a communications network.
-
Specification