Mobile-device-based trust computing
First Claim
Patent Images
1. A method comprising:
- by a verification authority, receiving access data from an application on a mobile device of a particular one of a plurality of users, the access data functioning as a digital certificate and comprising authentication data associated with a shared device and a digital credential associated with the mobile device, the shared device being different from the mobile device and configured for use by at least the plurality of users;
by the verification authority, authenticating the access data based on a comparison of the access data with verification data stored by the verification authority; and
by the verification authority, transmitting to the shared device the digital certificate signed by the verification authority in response to the authentication, the signed digital certificate providing the particular user access to the shared device.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes receiving access data from an application on a mobile device of a particular user. The access data includes authentication data associated with a shared device and a digital credential associated with the mobile device. The shared device is configured for use by at least a number users. The method also includes authenticating the access data based on a comparison of the access data with verification data stored by the verification authority; and transmitting to the shared device a digital certificate signed by the verification authority in response to the authentication. The signed digital certificate provides the particular user access to the shared device.
13 Citations
20 Claims
-
1. A method comprising:
-
by a verification authority, receiving access data from an application on a mobile device of a particular one of a plurality of users, the access data functioning as a digital certificate and comprising authentication data associated with a shared device and a digital credential associated with the mobile device, the shared device being different from the mobile device and configured for use by at least the plurality of users; by the verification authority, authenticating the access data based on a comparison of the access data with verification data stored by the verification authority; and by the verification authority, transmitting to the shared device the digital certificate signed by the verification authority in response to the authentication, the signed digital certificate providing the particular user access to the shared device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer-readable non-transitory storage media embodying logic configured when executed to:
-
receive access data from an application on a mobile device of a particular one of a plurality of users, the access data functioning as a digital certificate and comprising authentication data associated with a shared device and a digital credential associated with the mobile device, the shared device being different from the mobile device and configured for use by at least the plurality of users; authenticate the access data based on a comparison of the access data with verification data stored by the verification authority; and transmit to the shared device the digital certificate signed by the verification authority in response to the authentication, the signed digital certificate providing the particular user access to the shared device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A device comprising:
-
a processor coupled to a storage; and one or more computer-readable non-transitory storage media coupled to the processor and embodying logic configured when executed to; receive access data from an application on a mobile device of a particular one of a plurality of users, the access data functioning as a digital certificate and comprising authentication data associated with a shared device and a digital credential associated with the mobile device, the shared device being different from the mobile device and configured for use by at least the plurality of users; authenticate the access data based on a comparison of the access data with verification data stored by the verification authority; and transmit to the shared device the digital certificate signed by the verification authority in response to the authentication, the signed digital certificate providing the particular user access to the shared device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification