System and method to authenticate users to computer systems
First Claim
1. A method for use with a computer system containing information, the method comprising the steps of:
- a. providing a separate portable security device for each of a plurality of computer users;
b. providing a terminal including a display screen for presenting information to computer users where the terminal is separate from the portable security devices;
c. communicating system authentication protocol information from at least one of the security devices to the computer system;
d. authenticating the at least one of the security devices with the computer system using the authentication protocol information;
e. upon successful completion of the authenticating step, initiating a first access by the computer user associated with the at least one of the security devices to the computer system via the terminal;
f. creating, sending, and storing a reauthentication code to the at least one of the security devices, where the reauthentication code is related to a time limit;
g. logging the computer user off the terminal; and
h. initiating a second access by the computer user associated with the at least one of the security devices to the computer system via the terminal by communicating the reauthentication code to the computer system from the security device and when the reauthentication code is within the time limit allowing the second access, the step of initiating the second access by the computer user to the computer system further including verifying that the reauthentication code includes a neighborhood identifier that matches a neighborhood identifier of the terminal that the computer user is attempting to use to access the computer system.
3 Assignments
0 Petitions
Accused Products
Abstract
A system utilizing a personal security device to provide access to a computer terminal where the personal security device includes circuitry and transceiver components for transmitting identification information and exchanging other digital information with a computer terminal and other compatible devices and the personal security device establishes a communication link with a computer terminal to allow a user to logon to the terminal so that when a user leaves the computer terminal, the communication link is terminated, causing the computer terminal to lock the keyboard, blank the monitor, and/or logoff the user if the communication link is not restored within a sufficient time period and also allowing the personal security device to facilitate subsequent computer access within a time range by providing time related access codes to the terminal that can be used to reestablish computer terminal access.
193 Citations
47 Claims
-
1. A method for use with a computer system containing information, the method comprising the steps of:
-
a. providing a separate portable security device for each of a plurality of computer users; b. providing a terminal including a display screen for presenting information to computer users where the terminal is separate from the portable security devices; c. communicating system authentication protocol information from at least one of the security devices to the computer system; d. authenticating the at least one of the security devices with the computer system using the authentication protocol information; e. upon successful completion of the authenticating step, initiating a first access by the computer user associated with the at least one of the security devices to the computer system via the terminal; f. creating, sending, and storing a reauthentication code to the at least one of the security devices, where the reauthentication code is related to a time limit; g. logging the computer user off the terminal; and h. initiating a second access by the computer user associated with the at least one of the security devices to the computer system via the terminal by communicating the reauthentication code to the computer system from the security device and when the reauthentication code is within the time limit allowing the second access, the step of initiating the second access by the computer user to the computer system further including verifying that the reauthentication code includes a neighborhood identifier that matches a neighborhood identifier of the terminal that the computer user is attempting to use to access the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 46)
-
-
19. A method for use with a computer system containing information, the method comprising the steps of:
-
a. providing a terminal including a display screen for presenting information to the computer user where the terminal is separate from the security device; b. communicating system authentication protocol information from the security device to the computer system; c. authenticating the security device with the computer system using the authentication protocol information; d. upon successful completion of the authenticating step, initiating a first access by the computer user to the computer system via the terminal; e. storing a reauthentication code in the computer system and associating the code with user identification information associated with the computer user; f. logging the computer user off the computer system; g. initiating a second access between the computer system and the computer user via the terminal by using the security device to communicate at least a portion of system authentication protocol information to the computer system, the computer system determining that access is to be provided by using the at least a portion of system authentication protocol information to retrieve the reauthorization code and determining that the code allows access, where the step of initiating the second access is only performed when the reauthentication code includes a neighborhood identifier that matches a neighborhood identifier of the terminal the computer user is attempting to use to access the computer system; and h. the security device receiving a computer system identifier and positively matching the computer system identifier to a trusted computer system identifier prior to authenticating the security device with the computer system. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 47)
-
-
35. A method of initiating access between a computer user having a security device and a computer system containing information, the method comprising the steps of:
-
a. providing a first terminal including a display screen for presenting information to the computer user where the first terminal is separate from the security device; b. communicating system authentication protocol information from the security device to the computer system at a first time; c. authenticating the security device with the computer system using the authentication protocol information; d. upon successful completion of the authenticating step, initiating a first access by the computer user to the computer system via the first terminal; e. creating and storing a reauthentication code that is related to a time limit; f. logging the computer user off the first terminal; g. facilitating a second access by the computer user to the computer system via the first terminal using the reauthentication code at a second time that is within the time limit; h. providing a second terminal where a neighborhood terminal is selected from a list including the first terminal and the second terminal; i. presenting the security device at the neighborhood computer terminal and obtaining the authentication code at a third time subsequent to the second time; j. determining that the third time is subsequent to the time limit; and k. where the third time is subsequent to the time limit, granting access to the computer system only after the user provides authentication protocol information via the neighborhood computer terminal and the provided information is matched to stored system authentication protocol information. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
Specification