Intelligent remote device
First Claim
1. A method for accessing a security token enabled computer system, comprising:
- establishing communications connection between an intelligent remote device and the security computer system;
executing a remote authentication application installed in the intelligent remote device to emulate a local security device peripheral connected to the security token enabled computer system;
prompting a user to provide a critical security parameter;
sending the critical security parameter from the intelligent remote device to a security token operatively coupled to the intelligent remote device;
authenticating the critical security parameter using the security token to authenticate the user to the security token;
allowing the user access to at least one secure resource associated with the security token enabled computer system; and
providing aural or visual feedback to the user following successful authenticating to the security token enabled computer system, wherein the critical security parameter is provided from an other computer system and sent to the security token over another communication connection established between the intelligent remote device and the other computer system.
4 Assignments
0 Petitions
Accused Products
Abstract
An intelligent remote device equipped with a security token operatively coupled thereto is processing communications with a security token enabled computer system over a wireless private network. The intelligent remote device is adapted to emulate a local security device peripheral connected to the computer system. Multiple computer systems may be authenticated to using the intelligent remote device. Additionally, various secure communications connections mechanisms are described which are intended to augment existing security protocols available using wireless network equipment. Authentication of a user supplied critical security parameter is performed by the security token. The critical security parameter may be provided locally via the intelligent remote device or received from the wireless network and routed to the security token. Aural, visual or vibratory feedback may be provided to the user to signal a successful authentication transaction.
-
Citations
18 Claims
-
1. A method for accessing a security token enabled computer system, comprising:
-
establishing communications connection between an intelligent remote device and the security computer system; executing a remote authentication application installed in the intelligent remote device to emulate a local security device peripheral connected to the security token enabled computer system; prompting a user to provide a critical security parameter; sending the critical security parameter from the intelligent remote device to a security token operatively coupled to the intelligent remote device; authenticating the critical security parameter using the security token to authenticate the user to the security token; allowing the user access to at least one secure resource associated with the security token enabled computer system; and providing aural or visual feedback to the user following successful authenticating to the security token enabled computer system, wherein the critical security parameter is provided from an other computer system and sent to the security token over another communication connection established between the intelligent remote device and the other computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for accessing a security token enabled computer system, comprising:
-
an intelligent remote device that communicates with the security token enabled computer system using a communications connection, operatively couples a security token to the intelligent remote device, receives a critical security parameter provided by a user, and sends the critical security parameter to a security token, wherein the intelligent remote device triggers an access request to the security token enabled computer system to emulate a security token peripheral device locally connected to the security token enabled computers s m a security token that receives the critical security parameter associated with the user from the intelligent remote device and authenticates said critical security parameter and a security token enabled computer that uses the intelligent remote device as the security token peripheral device and allows the user access to at least one secure resource following successful authentication of the critical security parameter, wherein at least one of the intelligent remote device and the security token enabled computer system provides aural or visual feedback to the user upon successful completion of the authentication transaction, wherein the security token enabled computer system provides the critical security parameter to the security token over the communications connection. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A system for accessing a security token enabled computer system, comprising:
-
an intelligent remote device that communicates with the security token enabled computer system using a communications connection, operatively couples a security token to the intelligent remote device receives a critical security parameter provided by a user and sends the critical security parameter to a security token, wherein the intelligent remote device triggers an access request to the security token enabled computer system to emulate a security token peripheral device locally connected to the security token enabled computer system, a security token that receives the critical security parameter associated with the user from the intelligent remote device and authenticates said critical security parameter; and a security token enabled computer that uses the intelligent remote device as the security token peripheral device and allows the user access to at least one secure resource following successful authentication of the critical security parameter, wherein at least one of the intelligent remote device and the security token enabled computer system provides aural or visual feedback to the user upon successful completion of the authentication transaction, wherein the critical security parameter is provided from another computer system and sent to the security token over another wireless connection established between the intelligent remote device and another computer system. - View Dependent Claims (15, 16, 17, 18)
-
Specification