Systems and methods for dynamic authentication using physical keys
First Claim
1. A method of dynamic authentication of a guest device by an authentication system, the guest device being in communication with a user device controlled by a user, the method at the authentication system comprising:
- storing a first set of associations between users, user devices and physical keys;
receiving, over a first communications channel, a proposed dynamic association between the guest device and a physical key based on presence of the physical key at or near the guest device;
determining the user device corresponding to the physical key based on the first set of associations;
receiving, over a second communication channel, a user confirmation of the proposed dynamic association from the user device; and
authenticating the guest device based on the proposed dynamic association, the user confirmation, and the first set of associations for access to at least one of;
information and services associated with the user of the user device,wherein the proposed dynamic association and information received by the guest device exclude information required for completing the authenticating of the guest device.
3 Assignments
0 Petitions
Accused Products
Abstract
A physical key is used to propose an association between a guest device and user information and services. Contact-based or contact-less connectors are used to establish the proposed association between the physical key and the guest device. The proposed association then communicated to the dynamic authentication system over a first communication channel. The dynamic authentication system determines a user confirmation over a second communications channel based on a user device and previously determined associations between users, user devices and the physical key. The guest device is then authenticated for access to information and/or services associated with the user. The information retrieved from and/or transmitted to the user'"'"'s personal information repository is optionally protected using various transformations. Optional session identifiers supported on the physical key and/or the user device, ensure the protected information is inaccessible when the physical key is removed and/or the predetermined association with the user device is deleted.
59 Citations
40 Claims
-
1. A method of dynamic authentication of a guest device by an authentication system, the guest device being in communication with a user device controlled by a user, the method at the authentication system comprising:
-
storing a first set of associations between users, user devices and physical keys; receiving, over a first communications channel, a proposed dynamic association between the guest device and a physical key based on presence of the physical key at or near the guest device; determining the user device corresponding to the physical key based on the first set of associations; receiving, over a second communication channel, a user confirmation of the proposed dynamic association from the user device; and authenticating the guest device based on the proposed dynamic association, the user confirmation, and the first set of associations for access to at least one of;
information and services associated with the user of the user device,wherein the proposed dynamic association and information received by the guest device exclude information required for completing the authenticating of the guest device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system of dynamic authentication of a guest device comprising:
-
a memory for storing a first set of associations between users, user devices and physical keys; an input/output circuit for receiving, over a first communications channel, a proposed dynamic association between the guest device and a user associated with a physical key based on presence of the physical key at or near the guest device, and for receiving from a user device, associated with the user, a user confirmation of the proposed dynamic association over a second communication channel; and a processor for determining the user device corresponding to the physical key based on the first set of associations and for authenticating the guest device based on the dynamic association, the user confirmation, and the first set of associations, the guest device being authenticated for receiving at least one of;
information and services associated with the user,wherein the proposed dynamic association and information received by the guest device exclude information required for completing the authenticating of the guest device. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A computer readable storage medium comprising computer readable program code embodied on the computer readable storage medium, the computer readable program code useable to program a computer to dynamically authenticate guest devices by a method comprising:
-
storing a first set of associations between users, user devices and physical keys; receiving over a first communications channel, a proposed dynamic association between a guest device and a physical key based on presence of the physical key at or near the guest device; determining the user device corresponding to the physical key based on the first set of associations; receiving over a second communication channel, a user confirmation of the proposed dynamic association from the user device; and authenticating the guest device based on the proposed dynamic association, the user confirmation, and the first set of associations for access to at least one of;
information and services associated with the user,wherein the proposed dynamic association and information received by the guest device exclude information required for completing the authenticating of the guest device.
-
Specification