Proximity authentication system
First Claim
1. A communication system comprising:
- an wireless proximity reader configured to receive an RF signal from a wireless token located within a defined proximity to the proximity reader and configured to extract information from the received RF signal; and
a wireless network interface coupled to receive the information from the proximity reader and send the information over a wireless network.
5 Assignments
0 Petitions
Accused Products
Abstract
Access to secured services may be controlled based on the proximity of a wireless token to a computing device through which access to the secured services is obtained. An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of the computing device. A user'"'"'s credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token so that assurance may be provided to a service provider that the credentials came from a token that was proximate to the computing device. An RFID reader, cryptographic processing components and a wireless network controller may be implemented on a single chip in a mobile device.
250 Citations
91 Claims
-
1. A communication system comprising:
-
an wireless proximity reader configured to receive an RF signal from a wireless token located within a defined proximity to the proximity reader and configured to extract information from the received RF signal; and
a wireless network interface coupled to receive the information from the proximity reader and send the information over a wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of controlling access to a service comprising:
-
verifying whether a wireless token is within a defined proximity to a processing device;
authenticating information associated with the wireless token; and
providing the authenticated information to a service provider. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method of controlling access to a service comprising:
-
receiving an RF signal from a proximate wireless token;
obtaining information from the RF signal;
authenticating the information from the RF signal; and
providing the authenticated information to a service provider. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A integrated circuit comprising:
-
a wireless proximity reader configured to receive an RF signal from a wireless token located within a defined proximity to the integrated circuit;
at least one lead that is only routed within the integrated circuit for coupling the wireless proximity reader to a wireless network interface; and
a wireless network interface coupled to receive the information from the wireless proximity reader and provide the information to a port on the integrated circuit to send the information over a wireless network. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A communication system comprising:
-
a wireless proximity reader configured to receive an RF signal from a wireless token located within a defined proximity to the wireless proximity reader and configured to extract information from the received RF signal; and
a key management component coupled to receive the information from the wireless proximity reader and send the information to a service provider. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
-
68. A method of providing access to a service comprising:
-
receiving an RF signal from a proximate wireless token;
obtaining information from the RF signal;
authenticating the information to a key management component; and
providing, by the key management component, access to a service. - View Dependent Claims (69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 85, 86, 87, 88, 89, 90, 91)
-
-
82. An integrated circuit comprising:
-
a wireless proximity reader configured to receive an RF signal from a wireless token located within a defined proximity to the wireless proximity reader and configured to extract information from the received RF signal; and
at least one connection within the integrated circuit for coupling the wireless proximity reader to a wireless network interface; and
a key management component coupled to receive the information from the wireless proximity reader and provide the information to a port on the integrated circuit to send the information to a service provider. - View Dependent Claims (83, 84)
-
Specification