Wireless token device
First Claim
1. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
- detect a first computing device as substantially collocated with a wireless token device, using a short-range wireless communication network;
establish a connection between the first computing device and the token device over the short-range wireless network;
generate, at the token device, authentication data from a globally unique user identifier (GUUID) stored in secure memory of the token device, wherein the GUUID is assigned to a particular user; and
send the authentication data to the first computing device from the token device over the short-range wireless network, wherein the authentication data comprises first authentication data based on the GUUID to authenticate the particular user at the first computing device and further comprises second authentication data based on the GUUID to authenticate the first computing device to a storage device remote from the first computing device and token device,wherein full access to the second authentication data by the first computing device is restricted and is to be forwarded by the first computing device to authenticate the first computing device to the storage device, authentication of the particular user permits data stored on the storage device to be accessed through the first computing device and presented on a user interface of the first computing device, and access to the data is restricted to a subset of users including the particular user.
10 Assignments
0 Petitions
Accused Products
Abstract
A first computing device is detected as substantially collocated with a wireless token device, using a short-range wireless communication network and a connection is established between the first computing device and the token device over the short-range wireless network. Authentication data is sent to the first computing device from the token device over the short-range wireless network to authenticate the token device at the first computing device. Authentication of the token device permits data accessible through the first computing device to be made available to a holder of the token device and to be presented on a user interface of the first computing device. In some instances, the wireless token device may otherwise lack user interfaces for presenting the data itself.
126 Citations
20 Claims
-
1. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
detect a first computing device as substantially collocated with a wireless token device, using a short-range wireless communication network; establish a connection between the first computing device and the token device over the short-range wireless network; generate, at the token device, authentication data from a globally unique user identifier (GUUID) stored in secure memory of the token device, wherein the GUUID is assigned to a particular user; and send the authentication data to the first computing device from the token device over the short-range wireless network, wherein the authentication data comprises first authentication data based on the GUUID to authenticate the particular user at the first computing device and further comprises second authentication data based on the GUUID to authenticate the first computing device to a storage device remote from the first computing device and token device, wherein full access to the second authentication data by the first computing device is restricted and is to be forwarded by the first computing device to authenticate the first computing device to the storage device, authentication of the particular user permits data stored on the storage device to be accessed through the first computing device and presented on a user interface of the first computing device, and access to the data is restricted to a subset of users including the particular user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
detect a wireless token device as substantially collocated with a particular computing device, using a short-range wireless communication network; establish a connection between the particular computing device and the token device over the short-range wireless network; receive authentication data at the first computing device from the token device over the short-range wireless network, wherein the authentication data is associated with a particular user and generated at the wireless token device from a globally unique user identifier assigned to the particular user and stored securely at the wireless token device; authenticate the particular user based on the received authentication data; and present particular data on a user interface of the particular computing device based on the authentication to the token device, wherein the particular data is restricted to a subset of users including the particular user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
detecting a first computing device as substantially collocated with a wireless token device, using a short-range wireless communication network; establishing a connection between the first computing device and the token device over the short-range wireless network; generating, at the token device, authentication data from a globally unique user identifier (GUUID) stored in secure memory of the token device, wherein the GUUID is assigned to a particular user; and sending the authentication data to the first computing device from the token device over the short-range wireless network, wherein the authentication data comprises first authentication data based on the GUUID to authenticate the particular user at the first computing device and further comprises second authentication data based on the GUUID to authenticate the first computing device to a storage device remote from the first computing device and token device, wherein full access to the second authentication data by the first computing device is restricted and is to be forwarded by the first computing device to authenticate the first computing device to the storage device, authentication of the particular user permits data stored on the storage device to be accessed through the first computing device and presented on a user interface of the first computing device, and access to the data is restricted to a subset of users including the particular user.
-
-
19. A wireless token apparatus comprising:
-
a processor device; a memory element comprising secure memory; a short-range wireless network adapter adapted to; detect a first computing device as substantially collocated with the apparatus, using a short-range wireless communication network; establish a connection between the first computing device and the apparatus over the short-range wireless network; and an authentication broker adapted to; identify a globally unique user identifier assigned to a particular user, wherein the globally unique user identifier is stored in the secure memory of the wireless token apparatus; generate authentication data from the globally unique user identifier, wherein the authentication data comprises first and second authentication data and the second authentication data is obscured to restrict full access to the second authentication data to a remote data store; and send the authentication data to the first computing device over the short-range wireless network, wherein the first authentication data is to be used to authenticate the particular user at the first computing device and the second authentication data is to be used to authenticate the first computing device to the data store, wherein full access to the second authentication data by the first computing device is restricted and is to be forwarded by the first computing device to authenticate the first computing device to the storage device, authentication of the particular user permits data stored on the storage device to be accessed through the first computing device and presented on a user interface of the first computing device, and access to the data is restricted to a subset of users including the particular user. - View Dependent Claims (20)
-
Specification