Method and system for access to secure resources
First Claim
Patent Images
1. A method for an external device to gain access to a secure area of a resource, comprising:
- transmitting from the external device to the resource a signal that identifies the external device as capable of authentication;
receiving by the external device from the resource an initiation of communication with the resource;
responding by the external device to the initiation of communication by transmitting to the resource a listing of a plurality of authentication mechanisms that the external device is capable of performing, the authentication mechanisms each being a device for identifying an attribute of a user of the external device;
receiving by the external device from the resource an indication of a particular combination of two or more authentication mechanisms selected from the listing of the plurality of authentication mechanisms is adequate to gain access to the secure area;
receiving by the external device from the resource a first request for use of a first authentication mechanism selected from the listing of the plurality of authentication mechanisms;
performing authentication using the first authentication mechanism at the external device;
transmitting a first token from the external device to the resource, the first token representing a result of the first authentication mechanism;
receiving by the external device from the resource another request for use of another authentication mechanism selected from the listing of the plurality of authentication mechanisms;
performing authentication using the second authentication mechanism at the external device;
repeating the transmitting a token step and receiving another request step until transmittal of the combination of authentication mechanisms is completed; and
gaining access to the secure area in response to acceptance of the two or more of the tokens by the resource.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for accessing secured resources using a portable device. When a user with such a portable device is within close proximity to a locked door or other secured resource, a verification process can be automatically initiated on the device. The user verification could utilize all the input and sensor methods on the device. Once the identification process has successfully completed, an access code can be transmitted to the locked door or device via wired or wireless network. This allows for reduced electronics required at these locked doors and allows for more dynamic security measures.
-
Citations
18 Claims
-
1. A method for an external device to gain access to a secure area of a resource, comprising:
-
transmitting from the external device to the resource a signal that identifies the external device as capable of authentication; receiving by the external device from the resource an initiation of communication with the resource; responding by the external device to the initiation of communication by transmitting to the resource a listing of a plurality of authentication mechanisms that the external device is capable of performing, the authentication mechanisms each being a device for identifying an attribute of a user of the external device; receiving by the external device from the resource an indication of a particular combination of two or more authentication mechanisms selected from the listing of the plurality of authentication mechanisms is adequate to gain access to the secure area; receiving by the external device from the resource a first request for use of a first authentication mechanism selected from the listing of the plurality of authentication mechanisms; performing authentication using the first authentication mechanism at the external device; transmitting a first token from the external device to the resource, the first token representing a result of the first authentication mechanism; receiving by the external device from the resource another request for use of another authentication mechanism selected from the listing of the plurality of authentication mechanisms; performing authentication using the second authentication mechanism at the external device; repeating the transmitting a token step and receiving another request step until transmittal of the combination of authentication mechanisms is completed; and gaining access to the secure area in response to acceptance of the two or more of the tokens by the resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for a resource to grant access to a secure area of the resource to an external device, comprising:
-
receiving at the resource a signal from the external device that identifies itself as capable of authentication; initiating a communication from the resource with the external device; receiving from the external device a list of a plurality of authentication mechanisms that the external device is capable of performing, the authentication mechanisms each for identifying an attribute of a user of the external device; transmitting to the external device a first request for use of a first authentication mechanism selected from the plurality of authentication mechanisms; receiving from the external device a first authentication token for the first authentication mechanism in response to the first request, the first authentication token being a result of authentication at the external device using the first authentication mechanism at the external device; transmitting to the external device a second request for use of a second authentication mechanism selected from the plurality of authentication mechanisms; receiving from the external device a second authentication token for the second authentication mechanism in response to the second request, the second authentication token being a result of authentication at the external device using the second authentication mechanism at the external device; and granting to the external device access to the secure area based upon acceptability of the authentication tokens received in response to the first request and the second request. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A portable device for gaining access to a secure area of a resource, comprising:
-
a transmitter to transmit a signal from the portable device to the resource that identifies a listing of a plurality of authentication mechanisms that the portable device is capable of performing for identifying an attribute of a user; a receiver to receive at the portable device from the resource an initiation of a communication with the resource; a controller to respond to the received initiation of the communication by transmitting to the resource two or more authentication tokens to the resource, the authentication tokens being a result of authentication at the portable device using corresponding two or more authentication mechanisms of the portable device; wherein the receiver receives from the resource a first request for use of a first authentication mechanism selected by the resource from the plurality of authentication mechanisms and, in response, the transmitter transmits to the resource a first authentication token, the first authentication token representing a result of authentication at the portable device using the first authentication mechanism; wherein the receiver receives from the resource a second request for use of a second authentication mechanism selected by the resource from the plurality of authentication mechanisms and, in response, the transmitter transmits to the resource a second authentication token, the second authentication token representing a result of authentication at the portable device using the second authentication mechanism; and wherein the portable device gains access to the secure area in response to the resource receiving transmittal of the authentication tokens in response to the first request and the second request. - View Dependent Claims (16)
-
-
17. An authentication unit of a resource for granting access to a secure area of the resource to an external device, comprising:
-
a receiver to receive a signal from the external device that identifies the external device as capable of authentication; a communicator to initiate a communication from the resource with the external device; wherein the receiver receives from the external device a list of a plurality of authentication mechanisms that the external device is capable of performing, the authentication mechanisms each for identifying an attribute of a user of the external device; a transmitter to transmit to the external device a first request to the external device for use of a first authentication token, corresponding to a first authentication mechanism selected by the authentication unit from the list of the plurality of authentication mechanisms, the first authentication token representing a result of authentication at the external device using the first corresponding authentication mechanism of the external device; wherein the receiver receives the first authentication token from the external device in response to the first request; wherein the transmitter then transmits to the external device a second request to the external device for use of a second authentication token corresponding to a second authentication mechanism selected by the authentication unit from the list of the plurality of authentication mechanisms, the second authentication token representing a result of authentication at the external device using the second corresponding authentication mechanism of the external device; wherein the receiver receives from the external device the second authentication token in response to the second request; and an authenticator to grant the external device access to the secure area based upon acceptability of the authentication tokens received in response to the first request and the second request. - View Dependent Claims (18)
-
Specification