Intelligent remote device
First Claim
1. A method for accessing a security token enabled computer system using an intelligent remote device as a communication interface for a security token, comprising:
- establishing a wireless communications connection between at least an intelligent remote device and a security token enabled computer system,executing a remote authentication application installed in the intelligent remote device that triggers an access request to the security token enabled computer system which allows the intelligent remote device to emulate a local security device peripheral connected to the security token enabled computer system,prompting a user to provide a critical security parameter,sending the critical security parameter from the intelligent remote device to said security token operatively coupled to said intelligent remote device,authenticating said critical security parameter by said security token so that the user is authenticated to the security token,upon successful completion of the authentication transaction to the security token, allowing the user access to at least one secure resource associated with the security token enabled computer system, andproviding aural or visual feedback to said user following successful authenticating to at least said security token enabled computer system.
4 Assignments
0 Petitions
Accused Products
Abstract
An intelligent remote device equipped with a security token operatively coupled thereto is processing communications with a security token enabled computer system over a wireless private network. The intelligent remote device is adapted to emulate a local security device peripheral connected to the computer system. Multiple computer systems may be authenticated to using the intelligent remote device. Additionally, various secure communications connections mechanisms are described which are intended to augment existing security protocols available using wireless network equipment. Authentication of a user supplied critical security parameter is performed by the security token. The critical security parameter may be provided locally via the intelligent remote device or received from the wireless network and routed to the security token. Aural, visual or vibratory feedback may be provided to the user to signal a successful authentication transaction.
75 Citations
52 Claims
-
1. A method for accessing a security token enabled computer system using an intelligent remote device as a communication interface for a security token, comprising:
-
establishing a wireless communications connection between at least an intelligent remote device and a security token enabled computer system, executing a remote authentication application installed in the intelligent remote device that triggers an access request to the security token enabled computer system which allows the intelligent remote device to emulate a local security device peripheral connected to the security token enabled computer system, prompting a user to provide a critical security parameter, sending the critical security parameter from the intelligent remote device to said security token operatively coupled to said intelligent remote device, authenticating said critical security parameter by said security token so that the user is authenticated to the security token, upon successful completion of the authentication transaction to the security token, allowing the user access to at least one secure resource associated with the security token enabled computer system, and providing aural or visual feedback to said user following successful authenticating to at least said security token enabled computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for accessing a security token enabled computer system using an intelligent remote device as a communications interface for a security token, comprising:
-
an intelligent remote device that; communicates with at least a security token enabled computer system over at least a wireless communications connection, operatively couples a security token to said intelligent remote device, receives a critical security parameter provided by a user, sends the critical security parameter to the security token, and said intelligent remote device being equipped to trigger an access request to the security token enabled computer system and to emulate a security token peripheral device locally connected to said security token enabled computer system, said security token; receives the critical security parameter associated with said user from the intelligent remote device, and authenticates said critical security parameter; and said security token enabled computer; utilizes said intelligent remote device as said security token peripheral device, and allows said user access to at least one secure resource following successful authentication of said critical security parameter, wherein said intelligent remote device or said security token enabled computer system provides aural or visual feedback to said user upon successful completion of said two-factor authentication transaction. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for accessing a security token enabled computer system using an intelligent remote device as a communication interface for a security token, comprising:
-
establishing a wireless communications connection between at least an intelligent remote device and a security token enabled computer system, executing a remote authentication application installed in the intelligent remote device that triggers an access request to the security token enabled computer system which allows the intelligent remote device to emulate a local security device peripheral connected to the security token enabled computer system, prompting a user to provide a critical security parameter, sending the critical security parameter from the intelligent remote device to said security token operatively coupled to said intelligent remote device, authenticating said critical security parameter by said security token so that the user is authenticated to the security token, upon successful completion of the authentication transaction to the security token, allowing the user access to at least one secure resource associated with the security token enabled computer system, wherein the critical security parameter is entered by the user at the security token enabled computer system and is received at the intelligent remote device.
-
-
23. A method method for accessing a security token enabled computer system using an intelligent remote device as a communications interface for a security token, the intelligent remote device being equipped to emulate a local security device peripheral connected to the security token enabled computer system, the method comprising:
-
establishing a secure communications connection between a security token and a security token enabled computer system via an intelligent remote device, authenticating at least said security token to said security token enabled computer system, executing a remote authentication application installed in the intelligent remote device that triggers an access request to the security token enabled computer system which allows the intelligent remote device to emulate a local security device peripheral connected to the security token enabled computer system, prompting a user to provide a critical security parameter, sending the critical security parameter from the intelligent remote device to said security token operatively coupled to said intelligent remote device, authenticating said critical security parameter by said security token so that the user is authenticated to the security token, and upon successful completion of the authentication transaction to the security token, allowing the user access to at least one secure resource associated with the security token enabled computer system, wherein the critical security parameter is entered by the user at the security token enabled computer system and is received at the intelligent remote device. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A system for accessing a security token enabled computer system using an intelligent remote device as a communications interface for a security token, comprising:
-
an intelligent remote device that; communicates with at least a security token enabled computer system over at least a wireless communications connection, operatively couples a security token to said intelligent remote device, receives a critical security parameter provided by a user, sends the critical security parameter to the security token, and said intelligent remote device being equipped to trigger an access request to the security token enabled computer system and to emulate a security token peripheral device locally connected to said security token enabled computer system, said security token; receives the critical security parameter associated with said user from the intelligent remote device, and authenticates said critical security parameter; and said security token enabled computer; utilizes said intelligent remote device as said security token peripheral device, and allows said user access to at least one secure resource following successful authentication of said critical security parameter, wherein the critical security parameter is entered by the user at the security token enabled computer system and is received at the intelligent remote device.
-
-
29. A system system for accessing a security token enabled computer system using an intelligent remote device as a communications interface for a security token, comprising:
-
an intelligent remote device in processing communications with at least a security token enabled computer system over a communications connection, said intelligent remote device including; a device processor, a device memory coupled to said device processor, a security token interface coupled to said device processor, and at least one remote device application operatively stored in at least a portion of said device memory, said at least one remote device application having logical instructions executable by said device processor to; exchange information with said at least a secure token enabled computer system and said security token, receive a critical security parameter provided by a user; send the critical security parameter to the security token; trigger an access request to the security token enabled computer system; and emulate a security token peripheral device locally connected to said security token enabled computer system; said security token operatively coupled to said intelligent remote device via said security token interface, said security token including; a token processor, a token memory coupled to said token processor, at least one token application operatively stored in at least another portion of said token memory, said at least one token application having logical instructions executable by said token processor to; receive said critical security parameter provided by said user from the intelligent remote device, and authenticate said received critical security parameter; and
, said security token enabled computer system including;a computer processor, a computer memory coupled to said computer processor, and at least one computer application operatively stored in at least a portion of said computer memory, said at least one computer application having logical instructions executable by said computer processor to; exchange information with at least said intelligent remote device security token enabled computer system over said communications connection, receive said critical security parameter provided by said user, utilize said intelligent remote device as said locally connected security token peripheral device, and allow access to at least one secure resource following a successful authentication of said critical security parameter, wherein the critical security parameter is entered by the user at the security token enabled computer system and is received at the intelligent remote device. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A set of application program interfaces embodied on a computer readable medium for execution by a processor included in an intelligent remote device and a security token enabled computer system which allows the intelligent remote device to trigger an access request to the security token enabled computer system and to emulate a security token peripheral device locally connected to the security token enabled computer system, comprising:
-
a first interface that exchanges information between a security token and a remote security token enabled computer system in a protocol native to said security token; and
,a second interface, being an interface of the intelligent remote device, that receives and routes the critical security parameter to said security token, wherein the critical security parameter is authenticated with the security token, wherein the critical security parameter is entered by the user at the first interface and is received by the second interface. - View Dependent Claims (40, 41, 42, 43)
-
-
44. A set of application program interfaces embodied on a computer readable medium for execution by a processor included in an intelligent remote device and a security token enabled computer system which allows the intelligent remote device to trigger an access request to the security token enabled computer system and to emulate a security token peripheral device locally connected to the security token enabled computer system, comprising:
-
a first interface that exchanges information between a security token and a remote security token enabled computer system in a protocol native to said security token; and
,a second interface, being an interface of the intelligent remote device, that receives and routes the critical security parameter to said security token, wherein the critical security parameter is authenticated with the security token, wherein the critical security parameter is entered by the user at the second interface. - View Dependent Claims (45, 46, 47, 48)
-
-
49. A computer program product embodied in a tangible form readable by a plurality of processors in processing communications, wherein said computer program product includes executable instructions stored thereon for causing one or more of said plurality of processors to:
-
establish a secure communications connection between a security token and a security token enabled computer system via an intelligent remote device, wherein the intelligent remote device emulates a local security device peripheral connected to the security token computer system, authenticate at least said security token to said security token enabled computer system, execute a remote authentication application installed in the intelligent remote device that triggers an access request to the security token enabled computer system which allows the intelligent remote device to emulate a local security device peripheral connected to the security token enabled computer system, prompt a user to provide a critical security parameter, send the critical security parameter from the intelligent remote device to said security token operatively coupled to said intelligent remote device, authenticate said critical security parameter by said security token so that the user is authenticated to the security token, and upon successful completion of the authentication transaction to the security token, allow the user access to at least one secure resource associated with the security token enabled computer system, wherein the critical security parameter is entered by the user at the security token enabled computer system and is received at the intelligent remote device. - View Dependent Claims (50, 51, 52)
-
Specification