Securing access to an application service based on a proximity token
First Claim
1. A system for providing secured access to an application service, the system comprising:
- a security token configured to communicate with the application service and to perform a first element of a cryptographic technique; and
a proximity token associated with the security token and configured to perform a second element of the cryptographic technique to validate a communication between the application service and the security token, the proximity token being operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token. The system may be configured to provide secured access to the application service when the proximity token validates the communication and to prevent secured access to the application service when the proximity token does not validate the communication.
110 Citations
47 Claims
-
1. A system for providing secured access to an application service, the system comprising:
-
a security token configured to communicate with the application service and to perform a first element of a cryptographic technique; and
a proximity token associated with the security token and configured to perform a second element of the cryptographic technique to validate a communication between the application service and the security token, the proximity token being operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer program for providing secured access to an application service, the computer program comprising:
-
a security token code segment configured to cause a security computer to communicate with the application service, and to cause the security computer to perform a first element of a cryptographic technique; and
a proximity token code segment associated with the security token code segment and configured to cause a proximity computer to perform a second element of the cryptographic technique to validate a communication between the security computer and the application service, the proximity token code segment being operable to cause the proximity computer to validate the communication only when the proximity computer is located within a predetermined validation distance from the security computer or the application service. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A method for providing secured access to an application service, the method comprising:
-
configuring a security token to communicate with the application service, and to perform a first element of a cryptographic technique; and
configuring a proximity token associated with the security token to perform a second element of the cryptographic technique to validate a communication between the security token and the application service, including configuring the proximity token to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification