Method and apparatus for controlling access to a computer system
First Claim
Patent Images
1. A method of accessing a computer system comprising:
- authenticating a user to a mobile phone, wherein authenticating comprises receiving a password from the user, and comparing the password to information stored in a protected memory region in the mobile phone, wherein authenticating the user includes performing voice recognition of the user'"'"'s voice;
when the user is authenticated, establishing a short-range, wireless communication link between the mobile phone and the computer system;
transmitting information from the computer system to the mobile phone via the wireless communication link to indicate the computer system having a limited access;
automatically transmitting an access code from the mobile phone to the computer system via the link, the access code generated using data stored in the protected memory region in the mobile phone; and
granting the user further access to the computer system in response to receiving the access code.
1 Assignment
0 Petitions
Accused Products
Abstract
For one embodiment, a short-range, wireless communication link, such as a Bluetooth link, is established between a mobile phone and a computer system. The mobile phone transmits an access code via the link to the computer system. The access code is generated using data stored in the subscriber identity module (SIM) in the mobile phone. Access to the computer system is granted in response to receiving the access code. In this manner, the SIM is used not only to identify the user during cellular phone calls (or other long-range, wireless communication) but also to authenticate the user and to gain access to a computer system.
284 Citations
16 Claims
-
1. A method of accessing a computer system comprising:
-
authenticating a user to a mobile phone, wherein authenticating comprises receiving a password from the user, and comparing the password to information stored in a protected memory region in the mobile phone, wherein authenticating the user includes performing voice recognition of the user'"'"'s voice;
when the user is authenticated, establishing a short-range, wireless communication link between the mobile phone and the computer system;
transmitting information from the computer system to the mobile phone via the wireless communication link to indicate the computer system having a limited access;
automatically transmitting an access code from the mobile phone to the computer system via the link, the access code generated using data stored in the protected memory region in the mobile phone; and
granting the user further access to the computer system in response to receiving the access code. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-readable medium comprising a plurality of instructions readable therefrom, the instructions, when executed by a computer system, cause the computer system to perform operations comprising:
-
establishing a short-range, wireless communication link with a mobile device, wherein said establishing includes authenticating a user of the mobile device using voice recognition, wherein the user of the mobile device is authenticated by comparing a password from the user with data stored in a subscriber identity module (SIM) of the mobile device;
transmitting information to the mobile device, via the link, indicating that access to the computer system is limited;
receiving an access code automatically transmitted by the mobile device via the link, wherein data used to generate the access code is stored in the SIM;
and granting the user further access to the computer system in response to receiving the access code. - View Dependent Claims (8, 9, 10)
-
-
11. A method, comprising:
-
from a mobile device, authenticating a user to the mobile device, wherein authenticating comprises receiving a password from the user, and comparing the password to information stored in a protected memory region in the mobile device, wherein said authenticating includes authenticating the user of the mobile device using voice recognition;
when the user is authenticated, establishing a short-range, wireless communication link between the mobile device and a computer system;
from the computer system and via the wireless communication link, transmitting information to the mobile device indicating access to the computer system is limited;
from the mobile device, automatically transmitting an access code to the computer system via the wireless communication link; and
from the computer system, verifying the access code received from the mobile device, and when the access code is verified granting the user further access to the computer system. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification