Method and apparatus for secure authorization
First Claim
1. A method for authorizing access to a first computing device, the method comprising:
- the first computing device receiving a request from a user to access the first computing device;
the first computing device forming a challenge, said challenge comprising an identifier of the first computing device;
the first computing device encoding the challenge into a symbol;
the first computing device displaying the symbol,the first computing device allowing the user access to the first computing device in response to an access code that is generated by a server and provided by the user to the first computing device,wherein the access code is formed by a server in response to the user initiating a process of capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server, and wherein the server forms a decision to allow access by the user to the first computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
-
Citations
22 Claims
-
1. A method for authorizing access to a first computing device, the method comprising:
-
the first computing device receiving a request from a user to access the first computing device; the first computing device forming a challenge, said challenge comprising an identifier of the first computing device; the first computing device encoding the challenge into a symbol; the first computing device displaying the symbol, the first computing device allowing the user access to the first computing device in response to an access code that is generated by a server and provided by the user to the first computing device, wherein the access code is formed by a server in response to the user initiating a process of capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server, and wherein the server forms a decision to allow access by the user to the first computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A communications network for authorizing access to a first computing device, the network comprising:
-
a first computing device, wherein a user is requesting access to the first computing device; a second computing device; a server; a first communications link, wherein the first communications link couples the second computing device and the server; and a second communications link, wherein the second communications link couples the first computing device and the second computing device; wherein a method for authorizing access to the first computing device comprises a user requesting an access to the first computing device, the first computing device generating a challenge, said challenge comprising an identifier of the first computing device, the first computing device encoding the challenge into a symbol, the first computing device displaying the symbol, the user capturing the symbol within the second computing device, the second computing device decoding the symbol into the challenge, the second computing device generating a request from the challenge, the second computing device providing the request to the server, the server forming a decision, wherein one decision is to allow the user access to the first computing device, and wherein an alternate decision is to disallow access to the first computing device by the user, the server forming an access code, the server providing the access code to the second computing device, and the user providing the access code to the first computing device.
-
-
22. An article of manufacture for authorizing access to a first computing device, wherein the article comprises a non-transitory computer readable storage medium having one or more programs embodied therewith, wherein the one or more programs, when executed by a computer, perform steps of:
-
the first computing device receiving a request from a user to access the first computing device; the first computing device forming a challenge, said challenge comprising an identifier of the first computing device; the first computing device encoding the challenge into a symbol; the first computing device displaying the symbol, the first computing device allowing the user access to the first computing device in response to an access code that is generated by a server and provided by the user to the first computing device, wherein the access code is formed by a server in response to the user initiating a process of capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server, and wherein the server forms a decision to allow access by the user to the first computing device.
-
Specification