Method for secure authentication of mobile devices
First Claim
Patent Images
1. A method for authenticating a mobile device, comprising:
- receiving a communication request from the mobile device, wherein the mobile device is operable to exchange data over a primary channel;
receiving authentication data related to the communication request from the mobile device over a secondary channel, wherein the secondary channel is a short-range channel operable for exchanging data when the mobile device is within physical proximity; and
processing the authentication data to determine whether the mobile device is a trusted device.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating a mobile device is provided. The method includes receiving a communication request from the mobile device. The mobile device is operable to exchange data over a primary channel. Authentication data is received from the mobile device over a second channel. The secondary channel is a short-range channel operable for exchanging data when the mobile device is within physical proximity. The authentication data is processed to determine whether the mobile device is a trusted device.
25 Citations
20 Claims
-
1. A method for authenticating a mobile device, comprising:
-
receiving a communication request from the mobile device, wherein the mobile device is operable to exchange data over a primary channel; receiving authentication data related to the communication request from the mobile device over a secondary channel, wherein the secondary channel is a short-range channel operable for exchanging data when the mobile device is within physical proximity; and processing the authentication data to determine whether the mobile device is a trusted device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of authenticating a mobile device, comprising:
-
transmitting a communication request from the mobile device, wherein the mobile device is operable to exchange data over a primary channel; transmitting authentication data related to the communication request from the mobile device over a secondary channel, wherein the secondary channel is a short-range channel operable for exchanging data with a receiving party when the mobile device and the receiving party are within physical proximity, and wherein the receiving party processes the authentication data to determine whether the mobile device is a trusted device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for authenticating a mobile device, comprising:
-
receiving a communication request from the mobile device, wherein the mobile device is operable to exchange data over a primary channel; receiving time-varying authentication data related to the communication request from the mobile device over a secondary channel, wherein the secondary channel is a short-range channel operable for exchanging data when the mobile device is within physical proximity, and the received authentication data is varied by the sender according to a predetermined time interval; and processing the authentication data to determine whether the mobile device is a trusted device. - View Dependent Claims (20)
-
Specification