Wireless token authentication
First Claim
1. At least one machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
- receive, from a first computing device, first authentication data based on data received by the first computing device from a wireless token device over a wireless connection between the first computing device and the wireless token device and based at least in part on the wireless token device being in proximity to the first computing device, wherein the first authentication data is associated with a first user and is to be used to authenticate the first user to a particular computing session hosted remote from the first computing device;
authenticate the first computing device for use by the first user in the particular computing session based on the received first authentication data;
permit the first computing device to consume resources of the particular computing session based on the first authentication data;
receive, from a second computing device, second authentication data based on data received by the second computing device from the wireless token device over a wireless connection between the second computing device and the wireless token device and based at least in part on the wireless token device being in proximity to the second computing device, wherein the second authentication data is associated with the first user;
authenticate the second computing device for use by the particular user in the particular computing session based on the received second authentication data; and
permit the second computing device to consume resources of the particular computing session based on the second authentication data,wherein the particular computing session is associated with the first user and is to persist during a transition from use of the first computing device to use of the second computing device by the first user.
10 Assignments
0 Petitions
Accused Products
Abstract
Authentication data is received, from a first computing device, based on data received by the first computing device from a wireless token device, the authentication data used to authenticate a first user to a particular computing session hosted remote from the first computing device. The first computing device is authenticated to the particular computing session based on the received authentication data. The first computing device is permitted to consume resources of the particular computing session. In some instances, the data received by the first computing device from the wireless token device includes the authentication data.
137 Citations
22 Claims
-
1. At least one machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
receive, from a first computing device, first authentication data based on data received by the first computing device from a wireless token device over a wireless connection between the first computing device and the wireless token device and based at least in part on the wireless token device being in proximity to the first computing device, wherein the first authentication data is associated with a first user and is to be used to authenticate the first user to a particular computing session hosted remote from the first computing device; authenticate the first computing device for use by the first user in the particular computing session based on the received first authentication data; permit the first computing device to consume resources of the particular computing session based on the first authentication data; receive, from a second computing device, second authentication data based on data received by the second computing device from the wireless token device over a wireless connection between the second computing device and the wireless token device and based at least in part on the wireless token device being in proximity to the second computing device, wherein the second authentication data is associated with the first user; authenticate the second computing device for use by the particular user in the particular computing session based on the received second authentication data; and permit the second computing device to consume resources of the particular computing session based on the second authentication data, wherein the particular computing session is associated with the first user and is to persist during a transition from use of the first computing device to use of the second computing device by the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method comprising:
-
receiving, from a first computing device, first authentication data forwarded by the first computing device from a wireless token device to a server device hosting a particular computing session, the first authentication data associated with a first user and used to authenticate the first user to the particular computing session, wherein the first authentication data was received by the first computing device from the wireless token device over a wireless communication channel and based at least in part on the wireless token device being in proximity to the first computing device; authenticating the first computing device for use by the first user in the particular computing session based on the received first authentication data; permitting the first computing device to consume resources of the particular computing session based on the first authentication data; receiving, from a second computing device, second authentication data based on data received by the second computing device from the wireless token device over a wireless connection between the second computing device and the wireless token device and based at least in part on the wireless token device being in proximity to the second computing device, wherein the second authentication data is associated with the first user; authenticating the second computing device for use by the particular user in the particular computing session based on the received second authentication data; and permitting the second computing device to consume resources of the particular computing session based on the second authentication data, wherein the particular computing session is associated with the first user and persists during a transition from use of the first computing device to use of the second computing device by the first user.
-
-
22. A system comprising:
-
at least one processor device; at least one memory element; and a session manager, adapted when executed by the at least one processor device to; manage hosting of a particular computing session; receive, from a first computing device, first authentication data forwarded by the first computing device from a wireless token device, the first authentication data to be used to authenticate a first user to the particular computing session, wherein the first authentication data is associated with a first user and was received by the first computing device from the wireless token device over a wireless communication channel and based at least in part on the wireless token device being in proximity to the first computing device; authenticate the first computing device for use by the first user in the particular computing session based on the received first authentication data; permit the first computing device to consume resources of the particular computing session based on the first authentication data; receive, from a second computing device, second authentication data based on data received by the second computing device from the wireless token device over a wireless connection between the second computing device and the wireless token device and based at least in part on the wireless token device being in proximity to the second computing device, wherein the second authentication data is associated with the first user; authenticate the second computing device for use by the particular user in the particular computing session based on the received second authentication data; and permit the second computing device to consume resources of the particular computing session based on the second authentication data, wherein the particular computing session is associated with the first user and is to persist during a transition from use of the first computing device to use of the second computing device by the first user.
-
Specification