Computing apparatus and methods using secure authentication arrangements
First Claim
1. Computing apparatus comprising:
- memory means storing the instructions of a secure process and an authentication process;
processing means arranged to control the operation of the computing apparatus including by executing the secure process and the authentication process;
user interface means arranged to receive user input and return to the user information generated by the processing means in response to the user input; and
interface means for receiving a removable primary token and communicating with the token, the token comprising a body supporting;
a token interface for communicating with the interface means;
a token processor; and
token memory storing token data including identity information for identifying the token and auxiliary token information identifying one or more authorised auxiliary tokens,wherein the processing means is arranged to receive the identity information and the auxiliary token information from the primary token, authenticate the token using the authentication process and, if the token is successfully authenticated, permit a user to interact with the secure process via the user interface means,and wherein the processing means is arranged to repeatedly authenticate the primary token and cause the computing platform to suspend interaction between the secure process and the user if authentication is not possible as a result of the removal of the primary token unless the primary token is replaced by an authorised auxiliary token identified by said auxiliary token information.
2 Assignments
0 Petitions
Accused Products
Abstract
Computing apparatus comprises a memory means storing the instructions of a secure process and an authentication process; a processing means arranged to control the operation of the computing apparatus including by executing the secure process and the authentication process; a user interface means arranged to receive user input and return to the user input; and an interface means for receiving a removable primary token and communication with the token. The token comprises a body supporting a token interface for communicating with the interface means, a token processor; and a token memory adapted to store token data including information for identifying the token and auxiliary token information identifying one or more authorized auxiliary tokens. The processing means is arranged to receive the identity information and the auxiliary token information from the primary token, to authenticate the toke using the authentication process and, if the token is successfully authenticated, permit a user to interact with the secure process via the user interface means. The processing means is arranged to repeatedly authenticate the primary toke and cause the computing platform to suspend interaction between the secure process and the user if authentication is not possible as a result of the removal of the primary token unless the primary token is replaced by an authorized auxiliary token.
-
Citations
27 Claims
-
1. Computing apparatus comprising:
-
memory means storing the instructions of a secure process and an authentication process; processing means arranged to control the operation of the computing apparatus including by executing the secure process and the authentication process; user interface means arranged to receive user input and return to the user information generated by the processing means in response to the user input; and interface means for receiving a removable primary token and communicating with the token, the token comprising a body supporting; a token interface for communicating with the interface means; a token processor; and token memory storing token data including identity information for identifying the token and auxiliary token information identifying one or more authorised auxiliary tokens, wherein the processing means is arranged to receive the identity information and the auxiliary token information from the primary token, authenticate the token using the authentication process and, if the token is successfully authenticated, permit a user to interact with the secure process via the user interface means, and wherein the processing means is arranged to repeatedly authenticate the primary token and cause the computing platform to suspend interaction between the secure process and the user if authentication is not possible as a result of the removal of the primary token unless the primary token is replaced by an authorised auxiliary token identified by said auxiliary token information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of controlling computing apparatus to authenticate a user, comprising the steps:
-
the computing apparatus receiving a primary token of the user, the primary token containing information suitable for authenticating the primary token and identification information relating to one or more authorised auxiliary tokens; if the token is authentic, permitting the user to interact with one or more secure applications that may be executed by the computing platform; at intervals, re-authenticating the primary token; and if it is not possible to re-authenticate the primary token, suspending the interaction between the computing apparatus and the user unless the primary token has been replaced with an authorised auxiliary token identified by said auxiliary token identification information. - View Dependent Claims (16, 17, 18, 19)
-
-
20. Computing apparatus comprising:
-
one or more memories adapted to store the instructions of a secure process and an authentication process; one or more processors arranged to control the operation of the computing apparatus including by executing the secure process and the authentication process; a user interface arranged to receive user input and return to the user information generated by the one or more processors in response to the user input; and a token reader interface for receiving and communicating with a removable token, the token having a token memory storing token data including identity information for identifying the token and auxiliary token information identifying one or more authorized auxiliary tokens, wherein the one or more processors are arranged to receive the identity information and the auxiliary token information from a primary token received in the token reader interface, authenticate the primary token using the authentication process and, if the primary token is successfully authenticated, permit a user to interact with the secure process via the user interface, and wherein the one or more processors are arranged to repeatedly authenticate the primary token and cause the computing platform to suspend interaction between the secure process and the user if authentication is not possible as a result of the removal of the primary token unless the primary token is replaced by an authorized auxiliary token identified by said auxiliary token information. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
Specification