Portable authentication device
First Claim
1. A non-transitory computer readable medium storing processor-executable instructions for authenticating a user of a user device to a remote system, the program instructions, when executed by a processor, perform a method comprising:
- verifying the user as an authorized user of a portable authentication device connected to the user device wherein the user device is selected from a telephony device and a computer;
detecting a dialed telephone number generated by the telephony device connected to a telephony interface of the portable authentication device;
detecting a requested universal resource indicator generated by the computer connected to a computer interface, distinct from the telephony interface, of the portable authentication device;
comparing a currently detected destination with previously detected destinations stored in a log file, wherein the currently detected destination is selected from the dialed telephone number and the requested universal resource indicator;
in response to determining no match between the currently detected destination and the previously detected destinations;
storing the currently detected destination in the log file;
recording authentication data provided by the user device to the currently detected destination;
storing the authentication data to the non-transitory computer readable medium;
in response to determining the match between the currently detected destination and the previously detected destinations;
retrieving the authentication data associated with the currently detected destination; and
providing the authentication data to the remote system.
1 Assignment
0 Petitions
Accused Products
Abstract
In one aspect, a disclosed portable authentication device (PAD) includes a processor, storage media, an interface for enabling communication with an external information handling system (IHS), e.g., a computer or a telephony device, and executable instructions embedded in the storage media, for automated authentication. The embedded instructions include instructions for enabling a user to store authentication information, e.g., use ID and password information, corresponding to an IHS destination, e.g., a telephone number of an interactive voice response system or an IP address of a web server. If the PAD recognizes the current destination, the PAD may respond to an assertion of a keypad control element by making authorization information corresponding to the current destination available to the user or providing the authorization information directly to the current destination. The PAD may include one or more telephony interface(s), e.g., RJ-11 jack(s) and one or more computer interfaces, e.g., USB connector(s).
-
Citations
11 Claims
-
1. A non-transitory computer readable medium storing processor-executable instructions for authenticating a user of a user device to a remote system, the program instructions, when executed by a processor, perform a method comprising:
-
verifying the user as an authorized user of a portable authentication device connected to the user device wherein the user device is selected from a telephony device and a computer; detecting a dialed telephone number generated by the telephony device connected to a telephony interface of the portable authentication device; detecting a requested universal resource indicator generated by the computer connected to a computer interface, distinct from the telephony interface, of the portable authentication device; comparing a currently detected destination with previously detected destinations stored in a log file, wherein the currently detected destination is selected from the dialed telephone number and the requested universal resource indicator; in response to determining no match between the currently detected destination and the previously detected destinations; storing the currently detected destination in the log file; recording authentication data provided by the user device to the currently detected destination; storing the authentication data to the non-transitory computer readable medium; in response to determining the match between the currently detected destination and the previously detected destinations; retrieving the authentication data associated with the currently detected destination; and providing the authentication data to the remote system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of authenticating a user to a remote system, the method comprising:
-
verifying the user as an authorized user of a portable authentication device connected to a user device, wherein the user device is selected from a telephony device and a computer; detecting a dialed telephone number generated by the telephony device connected to a telephony interface of the portable authentication device; detecting a requested universal resource indicator generated by the computer connected to a computer interface, distinct from the telephony interface, of the portable authentication device; comparing a currently detected destination with previously detected destinations stored in a log file, wherein the currently detected destination is selected from the dialed telephone number and the requested universal resource indicator; in response to determining no match between the currently detected destination and the previously detected destinations; storing the currently detected destination in the log file; recording authentication data provided by the user device to the currently detected destination; and in response to determining the match between the currently detected destination and the previously detected destinations; retrieving the authentication data associated with the currently detected destination; and providing the authentication data to the remote system. - View Dependent Claims (8, 9, 10, 11)
-
Specification