System and method for authenticating a request for access to a secured device
First Claim
1. A method for authenticating a request for access to a secured device configured for use with a security token, the method comprising:
- monitoring one or more ambient transmissions present in a local environment;
analyzing the one or more ambient transmissions to create a characterization of the one or more ambient transmissions, the characterization comprising a schedule of one or more attributes of each of the one or more ambient transmissions as a function of time;
transmitting information configured to instruct a security token regarding characteristics of an adapted transmission protocol based on the characterization, the adapted transmission protocol for use by the security token to transmit authentication information, the adapted transmission protocol being configured for decreasing a likelihood of interference by the one or more ambient transmissions with reception of an authentication transmission from the security token;
receiving an authentication transmission from the security token, the authentication transmission comprising authentication information;
authenticating the security token based on the authentication information; and
in response to a request for access, transmitting a signal to a controller indicating the request is authentic.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating a request for access comprises monitoring one or more ambient transmissions present in a local environment, analyzing the one or more ambient transmissions to create a characterization thereof, and transmitting information configured to instruct a security token regarding characteristics of an adapted transmission protocol based on the characterization. The adapted transmission protocol is configured for decreasing a likelihood of interference by the one or more ambient transmissions with reception of an authentication transmission from the security token. An authentication transmission comprising authentication information is received from the security token, and the security token is authenticated based on the authentication information. In response to a request for access, a signal is transmitted to a controller indicating the request is authentic. A system for authenticating a request for access comprises a secured device configured for use with a security token and for monitoring one or more ambient transmissions.
39 Citations
20 Claims
-
1. A method for authenticating a request for access to a secured device configured for use with a security token, the method comprising:
-
monitoring one or more ambient transmissions present in a local environment; analyzing the one or more ambient transmissions to create a characterization of the one or more ambient transmissions, the characterization comprising a schedule of one or more attributes of each of the one or more ambient transmissions as a function of time; transmitting information configured to instruct a security token regarding characteristics of an adapted transmission protocol based on the characterization, the adapted transmission protocol for use by the security token to transmit authentication information, the adapted transmission protocol being configured for decreasing a likelihood of interference by the one or more ambient transmissions with reception of an authentication transmission from the security token; receiving an authentication transmission from the security token, the authentication transmission comprising authentication information; authenticating the security token based on the authentication information; and in response to a request for access, transmitting a signal to a controller indicating the request is authentic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for authenticating a request, the system comprising a secured device and a security token,
the secured device being configured to monitor one or more ambient transmissions present in a local environment, to analyze the one or more ambient transmissions to create a characterization thereof, and to transmit information configured to instruct the security token regarding characteristics of an adapted transmission protocol based on the characterization, the characterization comprising a schedule of one or more attributes of each of the one or more ambient transmissions as a function of time, the adapted transmission protocol being for use by the security token to transmit authentication information, and the adapted transmission protocol being configured for decreasing a likelihood of interference by the one or more ambient transmissions with reception of an authentication transmission from the security token; -
the security token being configured to transmit an authentication transmission containing authentication information in accordance with the adapted transmission protocol; and the secured device being further configured to receive the authentication transmission from the security token, to authenticate the security token based on the authentication information; and
, in response to a request for access, to transmit a signal to a controller indicating the request is authentic. - View Dependent Claims (18, 19, 20)
-
Specification