Processing

Please wait...

Settings

Settings

Goto Application

1. WO2013049190 - AUTHENTICATION WITH SECONDARY APPROVER

Publication Number WO/2013/049190
Publication Date 04.04.2013
International Application No. PCT/US2012/057319
International Filing Date 26.09.2012
IPC
G06F 21/40 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
40by quorum, i.e. whereby two or more security principals are required
G06F 21/35 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
34involving the use of external additional devices, e.g. dongles or smart cards
35communicating wirelessly
G06F 21/36 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
36by graphic or iconic representation
CPC
G06F 21/35
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
34involving the use of external additional devices, e.g. dongles or smart cards
35communicating wirelessly
G06F 21/36
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
36by graphic or iconic representation
G06F 21/40
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
40by quorum, i.e. whereby two or more security principals are required
G06Q 10/10
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
10Administration; Management
10Office automation, e.g. computer aided management of electronic mail or groupware
H04L 63/083
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
083using passwords
H04W 12/068
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements; Authentication; Protecting privacy or anonymity
06Authentication
068using credential vaults, e.g. password manager applications or one time password [OTP] applications
Applicants
  • APPLE INC. [US]/[US]
Inventors
  • COTTERILL, Stephen, Hayden
Agents
  • VINCENT, Lester J.
Priority Data
13/248,87229.09.2011US
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) AUTHENTICATION WITH SECONDARY APPROVER
(FR) AUTHENTIFICATION AVEC APPROBATEUR SECONDAIRE
Abstract
(EN) Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first device transmits an authorization request signal to the second device or to a server in the wireless network. The second device, having received the authorization request, prompts an authorized user to give authorization to the first device by inputting an authentication key such as a password or gesture on the second device. Upon verification of the authentication key, an authorization signal may be wirelessly transmitted to the first device, permitting access to the restricted content or functions on the first device. In some embodiments, the second device may be alerted to an authorization request and may select a request for authorization from a selectable queue of requests.
(FR) L'invention concerne des techniques pour accorder l'accès à un contenu à emploi restreint dans un premier dispositif depuis un deuxième dispositif via un réseau sans fil. Dans un mode de réalisation, le premier dispositif transmet un signal de demande d'autorisation au deuxième dispositif ou à un deuxième serveur dans un réseau sans fil. Le deuxième dispositif, après avoir reçu la demande d'autorisation, sollicite un utilisateur autorisé d'accorder une autorisation au premier dispositif par l'introduction d'une clé d'authentification telle qu'un mot ou un geste de passe dans le deuxième dispositif. Après vérification de la clé d'authentification, un signal d'autorisation peut être transmis sans fil au premier dispositif de manière à permettre l'accès au contenu ou aux fonctions d'emploi restreint dans le premier dispositif. Dans certains modes de réalisation, le deuxième dispositif peut être averti d'une demande d'autorisation et sélectionner une demande pour autorisation dans une file d'attente de demandes sélectionnable.
Latest bibliographic data on file with the International Bureau