Trusted device
First Claim
1. A trusted device comprising:
- authentication circuitry configured to authenticate with an authentication operation a user having physical possession of said trusted device and thereby switch said trusted device to an authenticated state;
retention monitoring circuitry configured to monitor physical possession of said trusted device by said user following said authentication operation and to switch said trusted device out of said authenticated state if said trusted device is not in physical possession of said user;
communication triggering circuitry configured to detect a request to establish communication received from a target device that is one of a plurality of different target devices; and
communication circuitry configured to communicate with said target device if said trusted device is in said authenticated state.
2 Assignments
0 Petitions
Accused Products
Abstract
A trusted device, such as a wristwatch 2, is provided with authentication circuitry 26, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry 32 monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry 38 is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry 40 is used to communicate with that target device using an authenticated identity of the user.
33 Citations
30 Claims
-
1. A trusted device comprising:
-
authentication circuitry configured to authenticate with an authentication operation a user having physical possession of said trusted device and thereby switch said trusted device to an authenticated state; retention monitoring circuitry configured to monitor physical possession of said trusted device by said user following said authentication operation and to switch said trusted device out of said authenticated state if said trusted device is not in physical possession of said user; communication triggering circuitry configured to detect a request to establish communication received from a target device that is one of a plurality of different target devices; and communication circuitry configured to communicate with said target device if said trusted device is in said authenticated state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 27, 28)
-
- 25. The trusted device as claimed in 24, wherein said communication with said one or more levels of further devices uses credentials stored in said trusted devices.
-
29. A trusted device comprising:
-
authentication means for authenticating with an authentication operation a user having physical possession of said trusted device and thereby switch said trusted device to an authenticated state; retention monitoring means for monitoring physical possession of said trusted device by said user following said authentication operation and for switching said trusted device out of said authenticated state if said trusted device is not in physical possession of said user; communication triggering means for detecting a request to establish communication received from a target device that is one of a plurality of different target devices; and communication means for communicating with said target device if said trusted device is in said authenticated state.
-
-
30. A method of trusted processing comprising the steps of:
-
authenticating, using authentication circuitry, with an authentication operation a user having physical possession of said trusted device and thereby switch said trusted device to an authenticated state; monitoring, using retention monitoring circuitry, physical possession of said trusted device by said user following said authentication operation and switching said trusted device out of said authenticated state if said trusted device is not in physical possession of said user; detecting, using communication triggering circuitry, a request to establish communication received from a target device that is one of a plurality of different target devices; and communicating, using communication circuitry, with said target device if said trusted device is in said authenticated state.
-
Specification