System and method for mobile identity protection for online user authentication
First Claim
1. A method of authenticating an entity based on a wireless device associated with the entity and configured to generate a wireless signal, the method comprising the steps of:
- detecting the wireless device entering into proximity of an electronic device configured to provide the entity, upon authentication of the entity, access to use of an application requiring secure access;
obtaining from the wireless signal a unique identifier associated with the wireless device;
obtaining authentication information based on the unique identifier;
generating an authentication result authenticating the entity based on at least one of the unique identifier associated with the wireless device and authentication information based on the unique identifier; and
enabling the authenticated entity to use, with a device other than the wireless device, the application requiring secure access, wherein the authentication information and the entity'"'"'s unique identifier are securely stored in a portable device.
2 Assignments
0 Petitions
Accused Products
Abstract
An automated system and method for authenticating entities or individuals attempting to access a computer application, network, system or device using a wireless device is provided. The system employs one or more short-range wireless interfaces (e.g. BLUETOOTH or Wi-Fi) or long-range wireless interfaces (e.g. cellular or WiMAX) to detect the presence or location of the wireless device and it'"'"'s proximity to the secure system to be accessed. The wireless device incorporates a unique identifier and secure authentication key information associated with the user of the wireless device. An authentication result is generated and may be used for a variety of applications. The application may process the result and determine the degree of access for which the entity or individual is allowed.
65 Citations
22 Claims
-
1. A method of authenticating an entity based on a wireless device associated with the entity and configured to generate a wireless signal, the method comprising the steps of:
-
detecting the wireless device entering into proximity of an electronic device configured to provide the entity, upon authentication of the entity, access to use of an application requiring secure access; obtaining from the wireless signal a unique identifier associated with the wireless device; obtaining authentication information based on the unique identifier; generating an authentication result authenticating the entity based on at least one of the unique identifier associated with the wireless device and authentication information based on the unique identifier; and enabling the authenticated entity to use, with a device other than the wireless device, the application requiring secure access, wherein the authentication information and the entity'"'"'s unique identifier are securely stored in a portable device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. At least one non-transitory computer-readable medium having computer-executable instructions that, when executed by at least one processing device, enable the at least one processing device to performing a method of authenticating an entity based on a wireless device associated with the entity and configured to generate a wireless signal, the method comprising the steps of:
-
detecting the wireless device entering into proximity of an electronic device configured to provide the entity, upon authentication of the entity, access to use of an application requiring secure access; obtaining from the wireless signal a unique identifier associated with the wireless device; obtaining authentication information based on the unique identifier; generating an authentication result authenticating the entity based on at least one of the unique identifier associated with the wireless device and authentication key information based on the unique identifier; and enabling the authenticated entity to use, with a device other than the wireless device, the application requiring secure access, wherein a portable memory device is used to securely store the authentication information and the entity'"'"'s unique identifier. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification