Secure authentication of a user to a system and secure operation thereafter
First Claim
Patent Images
1. A method for providing secure authentication of a user to a system and secure operation of the system thereafter, the method comprising:
- authenticating a user to the system directly or via a proximity device;
authenticating the proximity device to a receiver in the system;
upon successful authentication, initiating operation of the system;
intermittently communicating between the proximity device and the receiver to verify whether the proximity device is within continued proximity of the system; and
if the proximity device has not authenticated the user after a predetermined number of attempts, garbling authentication algorithms stored in the proximity device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and devices for providing secure authentication of a user to a machine and/or system and secure operation of the machine and/or system thereafter are provided. A representative method, amount others, includes: authenticating a user to a system directly or via a proximity device; authenticating the proximity device to a receiver in the system; upon successful authentication, initiating operation of the system; and intermittently communicating between the proximity device and the receiver to verify whether the proximity device is within continued proximity of the system.
95 Citations
23 Claims
-
1. A method for providing secure authentication of a user to a system and secure operation of the system thereafter, the method comprising:
-
authenticating a user to the system directly or via a proximity device; authenticating the proximity device to a receiver in the system; upon successful authentication, initiating operation of the system; intermittently communicating between the proximity device and the receiver to verify whether the proximity device is within continued proximity of the system; and if the proximity device has not authenticated the user after a predetermined number of attempts, garbling authentication algorithms stored in the proximity device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for user authentication to a machine and secure operation of the machine thereafter, the system comprising:
-
a receiver coupled to, or integrated with, the machine; and a proximity device, comprising; means for authenticating a user to the proximity device; means for authenticating the proximity device to the receiver; means for, upon successful authentication, intermittently communicating between the proximity device and the receiver to verify whether the proximity device is within proximity of the machine; and if the user cannot be authenticated after a predetermined number of attempts, means for garbling authentication algorithms stored in the proximity device. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A device for providing authentication of a user to a system and for providing secure operation of the system thereafter, the device comprising:
-
memory for storing identification information of at least a first user; an interface for authenticating a user; an interface for authenticating the device to a receiver integrated with the system; logic configured to intermittently communicate with the receiver upon successful authentication; and logic configured to garble authentication protocols upon a predetermined number of failed attempts at authenticating the user. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method for providing secure authentication to operate a vehicle, the method comprising:
-
authenticating a user to a proximity device; authenticating the proximity device to a receiver of a vehicle, the receiver integrated within the vehicle; garbling sensitive information stored in the proximity device if the proximity device has not authenticated the user after a predetermined number of attempts; upon successful authentication, initiating operation of the vehicle; and intermittently communicating between the proximity device and the receiver to verify whether the proximity device is within continued proximity of the vehicle. - View Dependent Claims (22, 23)
-
Specification