Securing access to an application service based on a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07865731

ABSTRACT:
A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token. The system may be configured to provide secured access to the application service when the proximity token validates the communication and to prevent secured access to the application service when the proximity token does not validate the communication.

REFERENCES:
patent: 5638444 (1997-06-01), Chou
patent: 6088450 (2000-07-01), Davis
patent: 6175922 (2001-01-01), Wang
patent: 6515575 (2003-02-01), Kataoka
patent: 6570610 (2003-05-01), Kipust
patent: 6999589 (2006-02-01), Cato et al.
patent: 7107246 (2006-09-01), Wang
patent: 2003/0005300 (2003-01-01), Noble et al.
patent: 2003/0159040 (2003-08-01), Hashimoto et al.
patent: 2004/0103312 (2004-05-01), Messerges
patent: 2004/0143515 (2004-07-01), Kawasaki
patent: 1 283 474 (2003-02-01), None
patent: WO 01/43129 (2001-06-01), None
patent: 02/091704 (2002-11-01), None
patent: 03/009619 (2003-01-01), None
“802.11,” http://www.webopedia.com/TERM/8/802—11.html, printed from the Internet April 10, 2003, 3 pgs.
“Bluetooth,” http://www.webopedia.com/TERM/b/bluetooth.html, printed from the Internet Apr. 10, 2003, 2 pgs.
Bums, Jim, “Selecting an Appropriate EAP Method for Your Wireless LAN,” http://www.meetinghousedata.com/MDC—EAP—White—Paper.pdf, printed from the Internet Apr. 10, 2003, 8 pgs.
Chan, Michael, “Why Won't My Wireless Cell Phone Talk to My Xbox?” http://www.internetnews.com/wireless/article.php/1457431, printed from the Internet Apr. 10, 2003, 3 pgs.
Dashevsky, Jane, et al., “SIM Trust Parameters: Mobile Service Technologies,” ftp://download.intel.com/labs/wireless/download/sim.pdf, printed from the Internet Apr. 10, 2003, copyright 2003 Intel Corporation, 59 pgs.
“Embedded Intel® Architecture Reference Design for Communic Appliances,” http://www.intel.com/platforms/applied/eiacomm/papers/apprefdes.htm, printed from the Internet Apr. 10, 2003, 4 pgs.
Foerster, Jeff, et al., “Ultra-Wideband Technology for Short- or Medium-Range Wireless Communications,” http://developer.intel.com/technology/itj/q22001/pdf/art—4.pdf,Intel Technology Journal, May 8, 2001, 11 pgs.
Geier, Jim, “Minimizing WLAN Security Threats,” http://www.80211-planet.com/tutorials/article.php/1457211, printed from the Internet Apr. 10, 2003, 4 pgs.
“IBM Research: Personal Area Network,” http://domino.research.ibm.com/comm/bios.nsf/pages/pan.html, printed from the Internet Apr. 10, 2003, 2 pgs.
“Microsoft Windows 2000 Server: Smart Card Logon,” http://www.microsoft.com/singapore/downloads/sclogonwp.document, printed from the Internet Apr. 10, 2003, 21 pgs.
Monson, Heidi, “Bluetooth Technology and Implications,” http://www.sysopt.com/articles/bluetooth/, printed from the Internet Apr. 10, 2003, 3 pgs.
Monson, Heidi, “Bluetooth Technology and Implications,” http://www.sysopt.com/articles/bluetooth/index2.html, printed from the Internet Apr. 10, 2003, 4 pgs.
Pesonen, Lauri, “GSM Interception,” http://www.dja.unisa.it/ads.dir/corso-security/www/CORSO-9900/a5/Netsec
etsec.html, printed from the Internet Apr. 8, 2003, 16 pgs.
“Shared Wireless Access Protocol,” http://www.webopedia.com/TERM/S/Shared—WAP.html, printed from the Internet Apr. 10, 2003, 1 pg.
Smart Card Alliance, “Secure Personal Identification Systems: Policy Process and Technology Choices for a Privacy-Sensitive Solution,” http://www.smartcardalliance.org/pdf/alliance—activities/Secure—ID—White—Paper.pdf, printed from the Internet Apr. 10, 2003, copyright 2002 Smart Card Alliance, Inc., 15 pgs.
Sorenson, Dustin, “Smart-Card Devices and Applications,” http://itpapers.zdnet.com/thankyou.aspx?&sortby=comp&scid=423&docid=11252&view=11252, printed from the Internet Apr. 10, 2003, 11 pgs.
“WAP,” http://www.webopedia.com/TERM/W/WAP.html, printed from the Internet Apr. 10, 2003, 3 pgs.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Securing access to an application service based on a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Securing access to an application service based on a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Securing access to an application service based on a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2729104

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.