System for authenticating access to online content referenced in hardcopy documents
First Claim
Patent Images
1. A method for providing secure access to online content referenced in a hardcopy document, comprising the steps of:
- (a) receiving a first request for access to the online content referenced in the hardcopy document;
(b) issuing a challenge to the first request for online content;
(c) receiving a first password derived from a password generation mechanism in the hardcopy document in response to the challenge issued at step (b); and
(d) suggesting a state change to the password generation mechanism on the hardcopy document for identifying a second password to be used during a second request for access to the online content referenced in the hardcopy document.
9 Assignments
0 Petitions
Accused Products
Abstract
A system for controlling access to online content referenced in a hardcopy document. A user requesting access to online content available on a server responds to an authentication challenge from the server using a password mechanism printed in the hardcopy document. The password mechanism allows the user to identify a password for responding to an authentication request by the server. After authenticating the user, the server initiates a state change to enable subsequent access to the online content by the user with a different password that is also identified with the password mechanism.
-
Citations
18 Claims
-
1. A method for providing secure access to online content referenced in a hardcopy document, comprising the steps of:
-
(a) receiving a first request for access to the online content referenced in the hardcopy document;
(b) issuing a challenge to the first request for online content;
(c) receiving a first password derived from a password generation mechanism in the hardcopy document in response to the challenge issued at step (b); and
(d) suggesting a state change to the password generation mechanism on the hardcopy document for identifying a second password to be used during a second request for access to the online content referenced in the hardcopy document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
(e) receiving the second request for access to the online content referenced in the hardcopy document;
(f) issuing a challenge to the second request for the online content; and
(g) receiving the second password derived using the state change to the password generation mechanism in the hardcopy document suggested at said step (d).
-
-
5. The method according to claim 1, wherein said step (d) is performed after receiving the first password at said step (c).
-
6. The method according to claim 5, further comprising the steps of:
-
(e) receiving acknowledgment of the state change suggested at said step (d);
(f) enabling access to the online content using the second password upon receipt of the second request for online content; and
(g) providing access to the online content when the first password is valid.
-
-
7. The method according to claim 1, wherein said step (d) is performed simultaneously with said step (b).
-
8. The method according to claim 7, wherein said step (c) further comprises the step of receiving acknowledgment of the suggested state change at step (d).
-
9. The method according to claim 1, wherein said step (d) is performed when the first password is valid.
-
10. The method according to claim 1, wherein said step (b) is repeated when the first password is invalid.
-
11. The method according to claim 1, further comprising the step of printing the password generation mechanism on the hardcopy document.
-
12. The method according to claim 1, further comprising the steps of:
-
(e) receiving a request to register for access to online content; and
(f) suggesting an initial state for identifying the first password.
-
-
13. The method according to claim 1, wherein said step (d) further comprises the step of providing a character to complete the second password.
-
14. The method according to claim 1, wherein said step (d) further comprises tile step of identifying a locator character to scratch off of the password generation mechanism.
-
15. The method according to claim 1, wherein the state change to the password generation mechanism on the hardcopy document suggested at said step (d) is in a form that is humanly readable.
-
16. The method according to claim 1, wherein said step (c) further comprises the step of receiving a login identifier of the hardcopy document.
-
17. A server for providing secure access to online content referenced in a hardcopy document, comprising:
-
means for receiving a first request for access to the online content referenced in the hardcopy document;
means for issuing a challenge to the first request for online content;
means for receiving a first password derived from a password generation mechanism in the hardcopy document in response to the issued challenge; and
means for suggesting a state change to the password generation mechanism on the hardcopy document for identifying a second password to be used during a second request for access to the online content referenced in the hardcopy document.
-
-
18. A hardcopy document, comprising:
-
a reference for identifying online content on a network; and
a password generation mechanism for providing a first password to respond to a first challenge to a first request for the online content;
the password generation mechanism further comprising means for recording a state change;
the state change providing a second password to respond to a second challenge to a second request for the online content; and
wherein the first challenge and the second challenge include instructions for identifying the first password and the second password with the password generation mechanism.
-
Specification