Two-factor user authentication using near field communication
First Claim
1. A computer-implemented method, comprising:
- receiving, at a mobile computing device including one or more processors, a first request from a user for the mobile computing device to obtain a first identifier from a near field communication (NFC) tag;
scanning, at the mobile computing device, the NFC tag via NFC in response to receiving the first request;
receiving, at the mobile computing device, the first identifier corresponding to the NFC tag via the scanning;
storing, at the mobile computing device, the first identifier at a memory of the mobile computing device in response to receiving the first identifier;
transitioning, at the mobile computing device, from an unlocked state to a locked state after storing the first identifier at the memory, wherein the user has access to one or more functions of the mobile computing device in the unlocked state and does not have access to the one or more functions of the mobile computing device in the locked state;
receiving, at the mobile computing device, a second request from the user to transition the mobile computing device from the locked state to the unlocked state;
outputting, at the mobile computing device, a third request for the user to input a first password via a user interface of the mobile computing device, wherein the first password is stored at the memory and is associated with the user;
receiving, at the mobile computing device, a second password from the user via the user interface;
determining, at the mobile computing device, whether the second password matches the first password;
outputting, at the mobile computing device, a fourth request for the user to input the first identifier by scanning for the first NFC tag using the mobile computing device when the second password matches the first password;
scanning, at the mobile computing device, for the first NFC tag via NFC;
receiving, at the mobile computing device, a second NFC identifier via the scanning for the first NFC tag using the mobile computing device;
determining, at the mobile computing device, whether the second NFC identifier matches the first NFC identifier stored at the memory; and
transitioning, at the mobile computing device, from the locked state to the unlocked state when the second NFC identifier matches the first NFC identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
A user is authenticated to a mobile computing device using an NFC tag. The NFC tag may be initially associated when an NFC reader of the device senses the NFC tag and wirelessly retrieves a tag identifier from the tag. The tag identifier is stored for subsequent retrieval. The authentication process begins after receiving a valid password and then positioning the device proximate the object such that the NFC reader of the device retrieves the tag identifier from the NFC tag without receiving input at the mobile computing device. In the event that the retrieved tag identifier matches the stored tag identifier, the mobile computing device is unlocked and the user may access the mobile computing device. If the retrieved tag identifier does not match the stored tag identifier, the user is not authenticated and the mobile computing device remains locked.
65 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, at a mobile computing device including one or more processors, a first request from a user for the mobile computing device to obtain a first identifier from a near field communication (NFC) tag; scanning, at the mobile computing device, the NFC tag via NFC in response to receiving the first request; receiving, at the mobile computing device, the first identifier corresponding to the NFC tag via the scanning; storing, at the mobile computing device, the first identifier at a memory of the mobile computing device in response to receiving the first identifier; transitioning, at the mobile computing device, from an unlocked state to a locked state after storing the first identifier at the memory, wherein the user has access to one or more functions of the mobile computing device in the unlocked state and does not have access to the one or more functions of the mobile computing device in the locked state; receiving, at the mobile computing device, a second request from the user to transition the mobile computing device from the locked state to the unlocked state; outputting, at the mobile computing device, a third request for the user to input a first password via a user interface of the mobile computing device, wherein the first password is stored at the memory and is associated with the user; receiving, at the mobile computing device, a second password from the user via the user interface; determining, at the mobile computing device, whether the second password matches the first password; outputting, at the mobile computing device, a fourth request for the user to input the first identifier by scanning for the first NFC tag using the mobile computing device when the second password matches the first password; scanning, at the mobile computing device, for the first NFC tag via NFC; receiving, at the mobile computing device, a second NFC identifier via the scanning for the first NFC tag using the mobile computing device; determining, at the mobile computing device, whether the second NFC identifier matches the first NFC identifier stored at the memory; and transitioning, at the mobile computing device, from the locked state to the unlocked state when the second NFC identifier matches the first NFC identifier.
-
-
2. A computer-implemented method, comprising:
-
receiving, at a computing device including one or more processors, a first request from a user for the computing device to obtain a first identifier from a near field communication (NFC) device; scanning, at the computing device, the NFC device via NFC in response to receiving the first request; receiving, at the computing device, the first identifier corresponding to the NFC device via the scanning; storing, at the computing device, the first identifier at a memory of the computing device in response to receiving the first identifier; transitioning, at the computing device, from an unlocked state to a locked state after storing the first identifier at the memory, wherein the user has access to one or more functions of the computing device in the unlocked state and does not have access to the one or more functions of the computing device in the locked state; receiving, at the computing device, a second request from the user to transition the computing device from the locked state to the unlocked state; and transitioning, at the computing device, from the locked state to the unlocked state based on comparisons between (i) a first password stored at the memory and a second password input by the user via a user interface of the computing device and (ii) the first identifier stored at the memory and a second identifier obtained via a scan for the NFC device. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computing device, comprising:
-
a user interface configured to receive a first request from a user for the computing device to obtain a first identifier from a near field communication (NFC) tag; an NFC scanner configured to (i) scan the NFC device via NFC in response to receiving the first request and (ii) receive the first identifier corresponding to the NFC device via the scanning; a memory configured to store the first identifier in response to receiving the first identifier; and one or more processors configured to transition the computing device from an unlocked state to a locked state after storing the first identifier at the memory, wherein the user has access to one or more functions of the computing device in the unlocked state and does not have access to the one or more functions of the computing device in the locked state, wherein the user interface is further configured to receive a second request from the user to transition the computing device from the locked state to the unlocked state, and wherein the one or more processors are further configured to transition the computing device from the locked state to the unlocked state based on comparisons between (i) a first password stored at the memory and a second password input by the user via a user interface of the computing device and (ii) the first identifier stored at the memory and a second identifier obtained via a scan for the NFC device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification