Access method for wireless authentication login system
First Claim
1. An access method for a wireless authentication login system that allows a user to login to a computer system via a wireless authentication device, the access method comprising:
- entering within a sensing range of the computer system, wherein the wireless authentication device enters the sensing range of an authentication module of the computer system;
generating an access request message, wherein the authentication module of the computer system senses the wireless authentication device within the sensing range and generating the access request message;
transmitting an authentication request message, wherein the authentication module transmits the authentication request message to the wireless authentication device;
receiving a set of access codes, wherein the authentication module receives the set of access codes from the wireless authentication device;
processing an authentication procedure; and
logging into the computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
An access method that a user can use to log into a computer system via a wireless authentication device. The access method includes: the wireless authentication device enters within the sensing range of an authentication module of the system. The authentication module of the system senses the wireless authentication device and generates access request message. The authentication module transmits an authentication request message to the wireless authentication device. The authentication module receives a set of access codes from the wireless authentication device. An authentication procedure is processed, allowing the system to be accessed by the user.
29 Citations
19 Claims
-
1. An access method for a wireless authentication login system that allows a user to login to a computer system via a wireless authentication device, the access method comprising:
-
entering within a sensing range of the computer system, wherein the wireless authentication device enters the sensing range of an authentication module of the computer system;
generating an access request message, wherein the authentication module of the computer system senses the wireless authentication device within the sensing range and generating the access request message;
transmitting an authentication request message, wherein the authentication module transmits the authentication request message to the wireless authentication device;
receiving a set of access codes, wherein the authentication module receives the set of access codes from the wireless authentication device;
processing an authentication procedure; and
logging into the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An access method for a wireless authentication login computer system comprising:
-
entering within an sensing range of the computer system, wherein the wireless authentication device that a user possesses enters the sensing range of an authentication module of the computer system;
generating an access request message, wherein the authentication module of the computer system senses the wireless authentication device and generating the access request message;
transmitting an authentication request message, wherein the authentication module transmits the authentication request message to the wireless authentication device;
receiving a set of access codes, wherein the authentication module receives the set of access codes from the wireless authentication device;
comparing the set of access codes with a user'"'"'s information;
judging whether the set of access codes is valid;
judging whether the user'"'"'s information is valid;
providing a wireless connection relationship between the wireless authentication device and the authentication module; and
logging into the computer system. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification