Method for changing authentication for a legacy access interface
First Claim
Patent Images
1. A non-transitory, computer readable medium storing instructions that when executed by a processor cause it to perform a method for changing authentication for a legacy access interface utilizing an access adapter and at least one Bluetooth-enabled device, the method comprising:
- by the access adapter;
detecting a user action or the presence of an object corresponding to a user request within a predetermined proximity of the access adapter;
automatically scanning Bluetooth devices within a pre-determined Bluetooth proximity of the access adapter;
determining if a Bluetooth-enabled device that has at least one stored digital key and that is authorized for access is within the pre-determined Bluetooth proximity of the access adapter;
transmitting a transaction request corresponding to a found Bluetooth-enabled device to the found Bluetooth-enabled device or to a database;
and the method further comprising;
by the found Bluetooth-enabled device;
obtaining the transaction request;
obtaining a user authorization;
authorizing the transaction request using an authorization application;
and the method further comprising;
by the access adapter;
automatically obtaining an access code corresponding to the found Bluetooth-enabled device from the found Bluetooth-enabled device or from the database;
performing an action selected from an action group consisting of;
automatically providing the access code directly from the access adapter to the legacy access interface, automatically keying in the access code to the legacy access interface, and automatically sending a Radio Frequency Identification signal comprising the access code to the legacy access interface;
and the method further comprising;
by the legacy access interface;
granting access to a user upon a successful verification of the access code.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for changing authentication for a legacy access interface using an access adapter and a token device. The method enables to change authentication factors based on context and allows secure multi-user sharing of legacy applications.
118 Citations
20 Claims
-
1. A non-transitory, computer readable medium storing instructions that when executed by a processor cause it to perform a method for changing authentication for a legacy access interface utilizing an access adapter and at least one Bluetooth-enabled device, the method comprising:
-
by the access adapter; detecting a user action or the presence of an object corresponding to a user request within a predetermined proximity of the access adapter; automatically scanning Bluetooth devices within a pre-determined Bluetooth proximity of the access adapter; determining if a Bluetooth-enabled device that has at least one stored digital key and that is authorized for access is within the pre-determined Bluetooth proximity of the access adapter; transmitting a transaction request corresponding to a found Bluetooth-enabled device to the found Bluetooth-enabled device or to a database; and the method further comprising;
by the found Bluetooth-enabled device;obtaining the transaction request; obtaining a user authorization; authorizing the transaction request using an authorization application; and the method further comprising;
by the access adapter;automatically obtaining an access code corresponding to the found Bluetooth-enabled device from the found Bluetooth-enabled device or from the database; performing an action selected from an action group consisting of; automatically providing the access code directly from the access adapter to the legacy access interface, automatically keying in the access code to the legacy access interface, and automatically sending a Radio Frequency Identification signal comprising the access code to the legacy access interface; and the method further comprising;
by the legacy access interface;granting access to a user upon a successful verification of the access code.
-
-
2. A system for changing authentication for a legacy access interface, the system comprising a Bluetooth-enabled device and an access adapter hardware, the access adapter hardware comprising a processor, a proximity sensor, a Bluetooth transceiver, a WI-FI transceiver or a cellular transceiver, and a digital emulator;
-
the proximity sensor is configured to detect the presence of an object corresponding to a user request within a predetermined proximity of the access adapter hardware; the Bluetooth transceiver is configured to scan Bluetooth devices within a pre-determined Bluetooth proximity of the access adapter hardware; the WI-FI transceiver or cellular transceiver or Bluetooth transceiver is configured to transmit a transaction request corresponding to a found Bluetooth-enabled device that is authorized for access and that has at least one stored digital key, to the found Bluetooth-enabled device or to a database; the found Bluetooth-enabled device is configured to request a user authorization and to authorize the transaction request using an authorization application; the access adapter hardware is configured to automatically obtain an access code corresponding to the found Bluetooth-enabled device from the found Bluetooth-enabled device or from the database and to perform an action to enable access to a user at the legacy access interface, the action is selected from an action group consisting of; automatically provide the access code directly from the access adapter hardware to the legacy access interface, automatically key in the access code to the legacy access interface device, and automatically send a Radio Frequency Identification signal comprising the access code to the legacy access interface device.
-
-
3. A method for changing authentication for a legacy access interface utilizing an access adapter and at least one Bluetooth-enabled device, the method comprising:
-
by the access adapter, the access adapter comprising hardware, software, or a combination of hardware and software; detecting a user action or the presence of an object corresponding to a user request within a predetermined proximity of the access adapter; automatically scanning Bluetooth devices within a pre-determined Bluetooth proximity of the access adapter; determining if a Bluetooth-enabled device that has at least one stored digital key and that is authorized for access is within the pre-determined Bluetooth proximity of the access adapter; transmitting a transaction request corresponding to a found Bluetooth-enabled device to the found Bluetooth-enabled device or to a database; and the method further comprising;
by the found Bluetooth-enabled device;obtaining the transaction request; obtaining a user authorization; authorizing the transaction request using an authorization application; and the method further comprising;
by the access adapter;automatically obtaining an access code corresponding to the found Bluetooth-enabled device from the found Bluetooth-enabled device or from the database; performing an action selected from an action group consisting of; automatically providing the access code directly from the access adapter to the legacy access interface, automatically keying in the access code to the legacy access interface, and automatically sending a Radio Frequency Identification signal comprising the access code to the legacy access interface; and the method further comprising;
by the legacy access interface;granting access to a user upon a successful verification of the access code. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification