Securing access to an application service based on a proximity token
First Claim
1. A computer-implemented method comprising:
- receiving an instruction at an application service;
generating a command at the application service based upon the instruction;
communicating the command to a security token;
modifying the command at the security token using a first cryptographic technique;
communicating the modified command from the security token to the application service;
communicating the modified command from the application service to a proximity token;
transforming the modified command at the proximity token using a second cryptographic technique;
communicating the transformed command from the proximity token to the application service;
communicating the transformed command from the application service to the security token;
recovering the modified command from the transformed command at the security token using a third cryptographic technique;
recovering the command from the recovered modified command at the security token using a fourth cryptographic technique;
executing the recovered command at the security token to produce a result; and
communicating the result from the security token to the application service.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token. The system may be configured to provide secured access to the application service when the proximity token validates the communication and to prevent secured access to the application service when the proximity token does not validate the communication.
-
Citations
24 Claims
-
1. A computer-implemented method comprising:
-
receiving an instruction at an application service; generating a command at the application service based upon the instruction; communicating the command to a security token; modifying the command at the security token using a first cryptographic technique; communicating the modified command from the security token to the application service; communicating the modified command from the application service to a proximity token; transforming the modified command at the proximity token using a second cryptographic technique; communicating the transformed command from the proximity token to the application service; communicating the transformed command from the application service to the security token; recovering the modified command from the transformed command at the security token using a third cryptographic technique; recovering the command from the recovered modified command at the security token using a fourth cryptographic technique; executing the recovered command at the security token to produce a result; and communicating the result from the security token to the application service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method comprising:
-
receiving an instruction at an application service; generating a command at the application service based upon the instruction; communicating the command to a security token; executing the command at the security token to produce a result; modifying the result at the security token using a first cryptographic technique; communicating the modified result from the security token to the application service; communicating the modified result from the application service to a proximity token; transforming the modified result at the proximity token using a second cryptographic technique; communicating the transformed result from the proximity token to the application service; communicating the transformed result from the application service to the security token; recovering the modified result from the transformed result at the security token using a third cryptographic technique; recovering the result from the recovered modified result at the security token using a fourth cryptographic technique; and communicating the recovered result from the security token to the application service. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system comprising:
-
an application service, the application service; receiving an instruction, generating a command based upon the instruction, communicating the command, receiving a modified command, communicating the modified command, receiving a transformed command, and communicating the transformed command; a security token, the security token; receiving the command from the application service, modifying the command using a first cryptographic technique, communicating the modified command to the application service, receiving the transformed command from the application service, recovering the modified command from the transformed command using a third cryptographic technique, recovering the command from the recovered modified command using a fourth cryptographic technique, executing the recovered command to produce a result, and communicating the result to the application service; and a proximity token, the proximity token; receiving the modified command from the application service, transforming the modified command using a second cryptographic technique, and communicating the transformed command to the application service.
-
-
24. A system comprising:
-
an application service, the application service; receiving an instruction, generating a command based upon the instruction, communicating the command, receiving a modified result, communicating the modified result, receiving a transformed result, and communicating the transformed result; and a security token, the security token; receiving the command from the application service, executing the command to produce a result, modifying the result using a first cryptographic technique, communicating the modified result to the application service, receiving the transformed result from the application service, recovering the modified result from the transformed result using a third cryptographic technique, recovering the result from the recovered modified result using a fourth cryptographic technique, and communicating the recovered result to the application service; and a proximity token, the proximity token; receiving the modified result from the application service, transforming the modified result using a second cryptographic technique, and communicating the transformed result to the application service.
-
Specification