Two-factor user authentication using near field communication
First Claim
1. A computer-implemented method, comprising:
- storing, at a computing device including one or more processors, a first password and a first identifier at a memory of the computing device;
receiving, at the computing device, a first request from a user to transition the computing device from a locked state to an unlocked state;
scanning, at the computing device, a device via a short-range wireless communication medium to obtain a second identifier from the device; and
transitioning, at the computing device, from the locked state to the unlocked state based on comparisons between (i) the first password stored at the memory and a second password input by the user via a user interface of the computing device and (ii) the first identifier stored at the memory and the second identifier obtained by scanning the device via the short-range wireless communication medium.
2 Assignments
0 Petitions
Accused Products
Abstract
A user is authenticated to a mobile computing device using an NFC tag. The NFC tag may be initially associated when an NFC reader of the device senses the NFC tag and wirelessly retrieves a tag identifier from the tag. The tag identifier is stored for subsequent retrieval. The authentication process begins after receiving a valid password and then positioning the device proximate the object such that the NFC reader of the device retrieves the tag identifier from the NFC tag without receiving input at the mobile computing device. In the event that the retrieved tag identifier matches the stored tag identifier, the mobile computing device is unlocked and the user may access the mobile computing device. If the retrieved tag identifier does not match the stored tag identifier, the user is not authenticated and the mobile computing device remains locked.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
storing, at a computing device including one or more processors, a first password and a first identifier at a memory of the computing device; receiving, at the computing device, a first request from a user to transition the computing device from a locked state to an unlocked state; scanning, at the computing device, a device via a short-range wireless communication medium to obtain a second identifier from the device; and transitioning, at the computing device, from the locked state to the unlocked state based on comparisons between (i) the first password stored at the memory and a second password input by the user via a user interface of the computing device and (ii) the first identifier stored at the memory and the second identifier obtained by scanning the device via the short-range wireless communication medium. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing device, comprising:
-
a memory configured to store a first password and a first identifier; and a user interface configured to receive a first request from a user to transition the computing device from a locked state to an unlocked state; a scanner configured to (i) scan a device via a short-range wireless communication medium in response to receiving the first request and (ii) receive a second identifier corresponding to the device via the scanning; and one or more processors configured to transition the computing device from the locked state to the unlocked state based on comparisons between (i) the first password stored at the memory and a second password input by the user via the user interface and (ii) the first identifier stored at the memory and the second identifier obtained by scanning the device via the short-range wireless communication medium. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer readable medium storing instructions that, when executed by one or more processors of a computing device, causes the computing device to perform operations comprising:
-
storing a first password and a first identifier at a memory of the computing device; receiving a first request from a user to transition the computing device from a locked state to an unlocked state; scanning a device via a short-range wireless communication medium to obtain a second identifier from the device; and transitioning from the locked state to the unlocked state based on comparisons between (i) the first password stored at the memory and a second password input by the user via a user interface of the computing device and (ii) the first identifier stored at the memory and the second identifier obtained by scanning the device via the short-range wireless communication medium.
-
Specification