Mobile authentication using a wearable device
First Claim
Patent Images
1. A method comprising:
- determining a first security token value based on a closeness of a possession of a first security token system by a user, the closeness of the possession including a measure of a connectedness between the first security token system and the user, the measure of connectedness between the first security token system and the user being greater if the first security token system is a wearable computing device than if the first security token system is a non-wearable computing device;
determining a second security token value based on a closeness of a possession of a second security token system to the user, the closeness of the possession including a measure of a connectedness between the second security token system and the user, the measure of connectedness between the second security token system and the user being greater if the second security token system is the wearable computing device than if the second security token system is the non-wearable computing device;
associating the first security token value with the first security token system;
associating the second security token value with the second security token system;
detecting an attempt by the user to access a protected system; and
providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing a user with an option to access a protected system by satisfying a reduced security measure is disclosed. An attempt by the user to access the protected system is detected. It is detected that a first security token system is within a first proximity to the protected system. Based on the detecting of the attempt by the user to access the protected system and the detecting that the first security token system is within the first proximity, the user is provided with the option to access the protected system by satisfying the reduced security measure.
-
Citations
14 Claims
-
1. A method comprising:
-
determining a first security token value based on a closeness of a possession of a first security token system by a user, the closeness of the possession including a measure of a connectedness between the first security token system and the user, the measure of connectedness between the first security token system and the user being greater if the first security token system is a wearable computing device than if the first security token system is a non-wearable computing device; determining a second security token value based on a closeness of a possession of a second security token system to the user, the closeness of the possession including a measure of a connectedness between the second security token system and the user, the measure of connectedness between the second security token system and the user being greater if the second security token system is the wearable computing device than if the second security token system is the non-wearable computing device; associating the first security token value with the first security token system; associating the second security token value with the second security token system; detecting an attempt by the user to access a protected system; and providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
-
at least one hardware processor; at least one module implemented by the at least one hardware processor, the at least one module configured to, at least; determine a first security token value based on a closeness of a possession of a first security token system by a user, the closeness of the possession including a measure of a connectedness between the first security token system and the user, the measure of connectedness between the first security token system and the user being greater if the first security token system is a wearable computing device than if the first security token system is a non-wearable computing device; determine a second security token value based on a closeness of a possession of a second security token system to the user, the closeness of the possession including a measure of a connectedness between the second security token system and the user, the measure of connectedness between the second security token system and the user being greater if the second security token system is the wearable computing device than if the second security token system is the non-wearable computing device; associate the first security token value with the first security token system; associate the second security token value with the second security token system; detect an attempt by the user to access a protected system; and provide the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory machine readable medium embodying a set of instructions that, when executed by at least one processor, causes the at least one processor to perform operations, the operations comprising:
-
determining a first security token value based on a closeness of a possession of a first security token system by a user, the closeness of the possession including a measure of a connectedness between the first security token system and the user, the measure of connectedness between the first security token system and the user being greater if the first security token system is a wearable computing device than if the first security token system is a non-wearable computing device; determining a second security token value based on a closeness of a possession of a second security token system to the user, the closeness of the possession including a measure of a connectedness between the second security token system and the user, the measure of connectedness between the second security token system and the user being greater if the second security token system is the wearable computing device than if the second security token system is the non-wearable computing device; associating the first security token value with the first security token system; associating the second security token value with the second security token system; detecting an attempt by the user to access a protected system; and providing the user with an option to access the protected system by satisfying a reduced security measure, the providing based on a determining that a combined value of the first security token value and the second security token value transgresses a threshold security token value, the providing of the user with the option to access the protected system by satisfying the reduced security measure being performed by a processor. - View Dependent Claims (12, 13, 14)
-
Specification