Method for facilitating authentication using proximity
First Claim
Patent Images
1. A method for facilitating authentication comprising:
- a first application runs onboard a first mobile device and obtains a first set of configuration parameters,whereby upon a user requesting an operation from a second application onboard a second terminal,if the distance between said second terminal and said first mobile device has stayed below a predetermined threshold during a recent period of time;
said second application automatically obtains a second set of configuration parameters from said first application using wireless communication,wherein said second set of configuration parameters corresponds to said first set of configuration parameters,
whereby upon authentication of said second set of configuration parameters, the user is authorized to perform the operation,whereby said second application does not request credentials from the user,wherein the recent period of time spans between the last time an application onboard said second terminal obtained configuration parameters from said first mobile device and the current time;
whereby if the distance between said second terminal and said first mobile device has exceeded a distance threshold during the recent period of time;
the user is requested to enter credentials selected from the group consisting of;
pass code, pass phrase, gesture, voice command, finger print, wherein the operation is selected from the group consisting of;
login, authorize payment, authorize access;
whereby if the second application is active,if the distance between said first mobile device and said second terminal exceeds a distance threshold;
said second application determines the current location information using a means selected from the group consisting of;
GPS, Wi-Fi triangulation, cell tower,
whereby if the current location is within a predetermined geo-location, said second application performs an action selected from the group consisting of;
no action, log out, revoke authentication, revoke a user token, cancel a transaction, lock a device, play a long sound file,
whereby if the current location is outside a predetermined geo-location, said second application performs an action selected from the group consisting of;
log out, revoke authentication, revoke a user token, cancel a transaction, play a long sound file, lock a device, play a long sound file, issue an audible alert, call a mobile phone and issue a message, encrypt data, delete data, delete said second application, clear memory, send an email message comprising the current location information, send a Short Message Service message comprising the current location information, send a message comprising the current location information to a remote server.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for facilitating authentication enables to automatically log the user to an application multiple times as long as the user has not left proximity of the terminal since the last successful login.
-
Citations
20 Claims
-
1. A method for facilitating authentication comprising:
a first application runs onboard a first mobile device and obtains a first set of configuration parameters, whereby upon a user requesting an operation from a second application onboard a second terminal, if the distance between said second terminal and said first mobile device has stayed below a predetermined threshold during a recent period of time;
said second application automatically obtains a second set of configuration parameters from said first application using wireless communication,wherein said second set of configuration parameters corresponds to said first set of configuration parameters,
whereby upon authentication of said second set of configuration parameters, the user is authorized to perform the operation,whereby said second application does not request credentials from the user, wherein the recent period of time spans between the last time an application onboard said second terminal obtained configuration parameters from said first mobile device and the current time; whereby if the distance between said second terminal and said first mobile device has exceeded a distance threshold during the recent period of time;
the user is requested to enter credentials selected from the group consisting of;pass code, pass phrase, gesture, voice command, finger print, wherein the operation is selected from the group consisting of;
login, authorize payment, authorize access;whereby if the second application is active, if the distance between said first mobile device and said second terminal exceeds a distance threshold;
said second application determines the current location information using a means selected from the group consisting of;
GPS, Wi-Fi triangulation, cell tower,
whereby if the current location is within a predetermined geo-location, said second application performs an action selected from the group consisting of;no action, log out, revoke authentication, revoke a user token, cancel a transaction, lock a device, play a long sound file,
whereby if the current location is outside a predetermined geo-location, said second application performs an action selected from the group consisting of;log out, revoke authentication, revoke a user token, cancel a transaction, play a long sound file, lock a device, play a long sound file, issue an audible alert, call a mobile phone and issue a message, encrypt data, delete data, delete said second application, clear memory, send an email message comprising the current location information, send a Short Message Service message comprising the current location information, send a message comprising the current location information to a remote server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method for facilitating authentication comprising:
a first application runs onboard a first mobile device and obtains a first set of configuration parameters, whereby upon a user requesting an operation from a second application onboard a second terminal, if the distance between said second terminal and said first mobile device has stayed below a predetermined threshold during a recent period of time;
said second application automatically obtains a second set of configuration parameters from said first application using wireless communication,wherein said second set of configuration parameters corresponds to said first set of configuration parameters,
whereby upon authentication of said second set of configuration parameters,the user is authorized to perform the operation, whereby said second application does not request credentials from the user, wherein the recent period of time spans between the last time an application onboard said second terminal obtained configuration parameters from said first mobile device and the current time,
wherein the operation is selected from the group consisting of;
login, authorize payment, authorize access,
wherein said credentials are selected from the group consisting of;
pass code, pass phrase, gesture, voice command, finger print;whereby if said second application determines the distance between said second terminal and said first mobile device exceeded a predetermined threshold during the recent period of time; said second application requests credentials from the user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
18. A method for facilitating authentication comprising:
-
a first application runs onboard a first mobile device and obtains a first set of configuration parameters from a remote server, whereby said first mobile device connects to said remote server using a cellular data service, wherein said first set of configuration parameters comprises authentication data selected from the group consisting of; user credentials, user certificates, keys, account information, commands, one time password function, whereby said first set of configuration parameters comprises a set of authorized terminal identifiers; whereby upon a user requesting an operation from a second application onboard a second terminal, if a Bluetooth signal between said first mobile device and said second terminal has stayed above a predetermined threshold during a recent period of time; said second application requests information from said first application using Bluetooth short wireless communication, whereby said first application authenticates said second terminal using said set of authorized terminal identifiers,
wherein said set of authorized terminal identifiers is obtained from said remote server,whereby upon successful authentication,
said second application automatically obtains a second set of configuration parameters from said first application,wherein said second set of configuration parameters corresponds to said first set of configuration parameters,
whereby upon authentication of said second set of configuration parameters,the user is authorized to perform the operation,
wherein said second application does not request credentials from the user,
wherein the recent period of time spans between the last time an application onboard said second terminal obtained configuration parameters from said first mobile device and the current time,
wherein said credentials are selected from the group consisting of;
pass code, pass phrase, gesture, voice command, finger print,
wherein the operation is selected from the group consisting of;
login, authorize payment, authorize access;whereby if the Bluetooth signal between said first mobile device and said second terminal has dropped below a predetermined threshold during the recent period of time; said second application requests credentials from the user. - View Dependent Claims (19, 20)
-
Specification