×

Method and apparatus for using cryptographic mechanisms to provide access to a portable device using integrated authentication using another portable device

  • US 8,479,011 B2
  • Filed: 10/27/2009
  • Issued: 07/02/2013
  • Est. Priority Date: 10/07/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing authentication of a user to a first peripheral device connected to a host computer using an authentication of the user on an independently connected second peripheral device also connected to the host computer, allowing the user access to both devices through a single authentication, comprising:

  • operating the host computer to detect that the user is attempting use of the first peripheral device;

    operating the second peripheral device to cause the user to authenticate to the second peripheral device;

    operating the host computer to cause the second peripheral device which is independently connected to the host computer to execute a security function that utilizes a unique characteristic of the second peripheral device to produce a result that uniquely links the first peripheral device to the second peripheral device and that ensures that the first peripheral device cannot be accessed without authentication via the second peripheral device, and the result of which may be used by the host computer to compute an authentication phrase that may be validated by the first peripheral device as a credential allowing access to the first peripheral device conditioned upon the presence of and successful authentication to the second peripheral device;

    operating the host computer to calculate the authentication phrase based on the result of the security function returned from the second peripheral device;

    transmitting the authentication phrase from the host computer to the first peripheral device;

    operating the first peripheral device to allow the user access to private assets stored on the first peripheral device only upon positive determination by the first peripheral device that the user has been authenticated based on verification of the authentication phrase as corresponding to an accepted authentication phrase.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×