throbber
(19)
`
`(12)
`
`Europäisches Patentamt
`
`European Patent Office
`
`Office européen des brevets
`
`*EP001536306A1*
`EP 1 536 306 A1
`
`(11)
`
`EUROPEAN PATENT APPLICATION
`
`(43) Date of publication:
`01.06.2005 Bulletin 2005/22
`
`(21) Application number: 04023384.3
`
`(22) Date of filing: 30.09.2004
`
`(84) Designated Contracting States:
`AT BE BG CH CY CZ DE DK EE ES FI FR GB GR
`HU IE IT LI LU MC NL PL PT RO SE SI SK TR
`Designated Extension States:
`AL HR LT LV MK
`
`(30) Priority: 30.09.2003 US 507586 P
`13.09.2004 US 609537 P
`
`(71) Applicant: Broadcom Corporation
`Irvine, California 92618-7013 (US)
`
`(54)
`
`Proximity authentication system
`
`(57)
`Access to secured services may be controlled
`based on the proximity of a wireless token to a comput-
`ing device through which access to the secured services
`is obtained. An authorized user may be provided access
`to a service only when a wireless token assigned to the
`user is in the proximity of the computing device. A user's
`credential may be stored on an RFID token and an RFID
`reader may be implemented within a security boundary
`on the computing device. Thus, the credential may be
`passed to the security boundary without passing
`through the computing device via software messages or
`applications. The security boundary may be provided,
`
`(51) Int Cl.7: G06F 1/00
`
`(72) Inventors:
`• Buer, Mark
`Gilbert, AZ 85296 (US)
`• Frank, Edward H.
`Atherton, CA 94027 (US)
`• Seshadri, Nambirajan
`Irvine, CA 92612 (US)
`
`(74) Representative: Jehle, Volker Armin, Dipl.-Ing.
`Patentanwälte
`Bosch, Graf von Stosch, Jehle,
`Flüggenstrasse 13
`80639 München (DE)
`
`in part, by incorporating the RFID reader onto the same
`chip as a cryptographic processing component. Once
`the information is received by the RFID reader it may be
`encrypted within the chip. As a result, the information
`may never be presented in the clear outside of the chip.
`The cryptographic processing component may crypto-
`graphically encrypt/sign the credential received from the
`token so that assurance may be provided to a service
`provider that the credentials came from a token that was
`proximate to the computing device. An RFID reader,
`cryptographic processing components and a wireless
`network controller may be implemented on a single chip
`in a mobile device.
`
`Printed by Jouve, 75001 PARIS (FR)
`
`EP1 536 306A1
`
`Page 1 of 25
`
`GOOGLE EXHIBIT 1005
`
`

`

`1
`
`EP 1 536 306 A1
`
`2
`
`Description
`
`CROSS-REFERENCE TO RELATED APPLICATION
`(S)
`
`[0001] This application claims the benefit of U.S. Pro-
`visional Patent Application No.
`, filed
`September 13, 2004, entitled PROXIMITY AUTHENTI-
`CATION SYSTEM, Attorney Docket No. 53492/SDB/
`B600, and U.S. Provisional Patent Application No.
`60/507,586, filed September 30, 2003, the disclosures
`of which are hereby incorporated by reference herein.
`
`TECHNICAL FIELD
`
`[0002] This application relates to data communication
`systems and, more specifically, to techniques for au-
`thenticating proximity of a wireless token in a communi-
`cation system.
`
`BACKGROUND
`
`[0003] A variety of security techniques are known for
`protecting information in and controlling the operation of
`a computing device such as a personal computer
`("PC"), a server or a mobile device. For example, phys-
`ical and/or cryptographic techniques may be employed
`to control access to the computing device and to data
`stored in the computing device.
`[0004] Physical security techniques may include lo-
`cating the computing device in a secure location, locking
`the computing device in an enclosure, protecting inte-
`grated circuits (i.e., chips) from invasive monitoring by
`encapsulating the chips in, for example, an epoxy.
`[0005] Cryptographic techniques may include one or
`more of encryption, decryption, authentication, signing
`and verification. In some applications data encryption
`and decryption techniques may be used to prevent un-
`authorized applications or persons from accessing data
`stored in the computing device. For example, security
`passwords that are used to restrict access a PC may be
`stored on the PC in an encrypted form. The operating
`system may then decrypt password when it needs to
`compare it with a password typed in by a user.
`[0006]
`In some applications authentication tech-
`niques may be used to verify that a given set of data is
`authentic. For example, when a server receives a mes-
`sage from a remote client, authentication information
`associated with the message may used to verify that the
`message is from a specific source. In this way, the serv-
`er may ensure that only authorized clients access the
`applications and data provided by the server.
`[0007]
`In practice, there may be circumstances under
`which the process of sending secret credentials such as
`a password or cryptographic key may be compromised.
`For example, when a user uses a computing device to
`access a secured service, the user may first need to en-
`ter the secret credentials into the computing device. The
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`2
`
`computing device may then forward these credentials
`to a service provider that then determines whether the
`user is authorized to use the requested service.
`[0008]
`In the event the computing device has been
`comprised by a hacker or a computer virus, an unau-
`thorized person may gain access to these credentials.
`As a result, an unauthorized person may be able to ac-
`cess the secured service. Serious consequences may
`result when the secured service includes sensitive in-
`formation such as financial data or personal information.
`Accordingly, a need exists for improved techniques for
`providing access to secured services.
`
`SUMMARY
`
`[0009] The invention relates to a system and method
`for authenticating the proximity of a wireless token to a
`computing device. For convenience, an embodiment of
`a system constructed or a method practiced according
`to the invention will be referred to herein simply as an
`"embodiment."
`[0010]
`In one aspect, the invention relates to a system
`and method for providing access to a secured service
`based on a user's proximity to a proximity reader. Once
`the proximity is authenticated the user may then be al-
`lowed to access the secured service.
`[0011]
`In some embodiments an authorized user is
`provided access to a service only when a wireless token
`assigned to the user is in the proximity of a computing
`device through which access to the secured services is
`obtained. In this way, a reasonable assumption may be
`made that the authorized user is in fact using the com-
`puting device to request the service. In contrast, if the
`request was being made by a hacker or a computer vi-
`rus, access may be denied since the token may not be
`in the proximity of the computing device.
`[0012]
`In some embodiments a user's credential are
`stored on an RFID token and an RFID reader is imple-
`mented within a security boundary on the computing de-
`vice. In this way, the credential may be passed to the
`security boundary without passing through the comput-
`ing device via software messages or applications. As a
`result, the credentials may not be intercepted by a hack-
`er or computer virus that may have compromised the
`software executing on the computing system.
`[0013]
`In some embodiments the security boundary
`may be provided, in part, using tamper resistant and/or
`tamper evident hardware. Thus, in the event the com-
`puter was physically tampered with in an attempt to
`compromise the security of the security boundary, such
`tampering may be ineffective or it may be evident to the
`user. In the latter case, the user may then take appro-
`priate steps to re-secure the system.
`[0014]
`In some embodiments, the RFID reader is in-
`corporated onto the same chip as a cryptographic
`processing component. In this way, once the information
`from the RFID token is received by the RFID reader it
`may be encrypted within the chip. As a result, the infor-
`
`Page 2 of 25
`
`

`

`3
`
`EP 1 536 306 A1
`
`4
`
`mation may never be presented in the clear (e.g., unen-
`crypted) outside of the chip. Accordingly, the information
`may only be compromised by a clandestine RFID reader
`or by inspecting the internal contents of the chip. In con-
`ventional commercial settings, these scenarios may be
`unlikely. Accordingly, a system constructed according to
`the invention may provide improved access control for
`secured services.
`[0015]
`In some embodiments, a cryptographic
`processing component may cryptographically encrypt
`and/or sign credentials received from a token. Thus,
`when a service provider receives the credentials, a high
`level of assurance may be provided to the effect that the
`credentials came from a token that was proximate to the
`particular computing device.
`[0016]
`In some embodiments an RFID reader, a cryp-
`tographic processing component and one or more wire-
`less network controller(s) may be implemented on a sin-
`gle chip in a mobile device. This may provide a cost ef-
`fective and secure mechanism to limit access to the
`wireless network(s). In this case, network access may
`only be provided to the mobile device when a token is
`proximate to the mobile device and when that token has
`been assigned to an authorized user of that mobile de-
`vice and the network(s).
`[0017] According to an aspect of the invention, a com-
`munication system comprises:
`
`5
`
`10
`
`15
`
`20
`
`25
`
`a Bluetooth media access controller.
`[0026] Advantageously, the wireless network inter-
`face uses the information to provide authentication to
`the wireless network.
`[0027] Advantageously, the system comprises a serv-
`ice processor coupled to receive the information sent
`over the wireless network and configured to provide ac-
`cess to a service in response to the information.
`[0028] Advantageously, the system comprises a wire-
`less access point adapted to receive the information
`sent over the wireless network and provide the informa-
`tion to a service provider.
`[0029] Advantageously, the system comprises a wire-
`less access point adapted to receive the information
`sent over the wireless network and provide access to
`the wireless network in response to the information.
`[0030] Advantageously, the information comprises a
`password or key.
`[0031] Advantageously,
`RFID token comprising:
`
`the system comprises an
`
`a data memory for storing the information;
`an RF circuit coupled to the data memory for gen-
`erating a signal according to the information; and
`an antenna coupled to receive the signal from the
`RF circuit and adapted to transmit the signal to the
`wireless proximity reader.
`
`an wireless proximity reader configured to receive
`an RF signal from a wireless token located within a
`defined proximity to the proximity reader and con-
`figured to extract information from the received RF
`signal; and
`a wireless network interface coupled to receive the
`information from the proximity reader and send the
`information over a wireless network.
`
`[0018] Advantageously, the system comprises a se-
`curity boundary within which the information is extracted
`and received.
`[0019] Advantageously, the wireless proximity reader
`is an RFID reader.
`[0020] Advantageously, the system comprises an au-
`thentication processor configured to authenticate the in-
`formation sent over the wireless network.
`[0021] Advantageously, the system comprises a cryp-
`tographic processor configured to encrypt or authenti-
`cate the information sent over the wireless network.
`[0022] Advantageously, the cryptographic processor
`uses a key to cryptographically sign the information that
`is sent over the wireless network.
`[0023] Advantageously, the wireless network inter-
`face supports at least one of 802.11 and Bluetooth.
`[0024] Advantageously, the wireless network inter-
`face comprises at least one of an 802.11 media access
`controller and a Bluetooth media access controller.
`[0025] Advantageously, the wireless network inter-
`face comprises an 802.11 media access controller and
`
`[0032] According to an aspect of the invention, a
`method of controlling access to a service comprises:
`
`30
`
`verifying whether a wireless token is within a de-
`fined proximity to a processing device;
`authenticating information associated with the wire-
`less token; and
`providing the authenticated information to a service
`provider.
`
`[0033] Advantageously, the method comprises estab-
`lishing a security boundary for the verifying, authenticat-
`ing and providing.
`[0034] Advantageously, at least a portion of the secu-
`rity boundary comprises a cryptographic boundary.
`[0035] Advantageously, at least a portion of the secu-
`rity boundary comprises an integrated circuit.
`[0036] Advantageously, authenticating comprises
`cryptographically signing the information with a key.
`[0037] Advantageously,
`the authenticated informa-
`tion comprises a response to a challenge from the serv-
`ice provider.
`[0038] Advantageously, providing comprises encrypt-
`ing data sent to the service provider.
`[0039] Advantageously,
`the method comprises re-
`questing access to a service from a service provider.
`[0040] Advantageously,
`the method comprises re-
`ceiving a challenge from the service provider.
`[0041] Advantageously, the service provider provides
`access to a service in response to the authenticated in-
`
`35
`
`40
`
`45
`
`50
`
`55
`
`3
`
`Page 3 of 25
`
`

`

`5
`
`EP 1 536 306 A1
`
`6
`
`formation.
`[0042] Advantageously, the service provider provides
`access to a data network in response to the authenticat-
`ed information.
`[0043] Advantageously, the service provider provides
`access to at least one of an 802.11 network and a Blue-
`tooth network.
`[0044] Advantageously, the service provider provides
`access to an 802.11 network and a Bluetooth network.
`[0045] Advantageously, the service provider provides
`access to encrypted data in response to the authenti-
`cated information.
`[0046] Advantageously, the service provider provides
`a key in response to the authenticated information.
`[0047] Advantageously,
`the information comprises
`credentials associated with a user of the token.
`[0048] Advantageously, an RFID proximity reader
`verifies whether the wireless token is within the defined
`proximity to the wireless proximity reader.
`[0049] According to an aspect of the invention, a
`method of controlling access to a service comprises:
`
`receiving an RF signal from a proximate wireless
`token;
`obtaining information from the RF signal;
`authenticating the information from the RF signal;
`and
`providing the authenticated information to a service
`provider.
`
`[0050] Advantageously, the method comprises estab-
`lishing a security boundary for the obtaining, authenti-
`cating and providing.
`[0051] Advantageously, authenticating comprises
`cryptographically signing the information with a key.
`[0052] Advantageously, providing comprises encrypt-
`ing the signed information.
`[0053] Advantageously,
`the method comprises re-
`questing access to a service from a service provider.
`[0054] Advantageously,
`the method comprises re-
`ceiving a challenge from the service provider in re-
`sponse to the request.
`[0055] Advantageously,
`the authenticated informa-
`tion comprises a response to the challenge.
`[0056] Advantageously, the service provider provides
`access to a service in response to the authenticated in-
`formation.
`[0057] Advantageously, the RF signal is an RFID sig-
`nal.
`[0058] Advantageously,
`the information comprises
`credentials associated with a user of the token.
`[0059] According to an aspect of the invention, an in-
`tegrated circuit comprises:
`
`a wireless proximity reader configured to receive an
`RF signal from a wireless token located within a de-
`fined proximity to the integrated circuit;
`at least one lead that is only routed within the inte-
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`4
`
`grated circuit for coupling the wireless proximity
`reader to a wireless network interface; and
`a wireless network interface coupled to receive the
`information from the wireless proximity reader and
`provide the information to a port on the integrated
`circuit to send the information over a wireless net-
`work.
`
`[0060] Advantageously, the integrated circuit com-
`prises a security boundary.
`[0061] Advantageously, the wireless proximity reader
`is an RFID reader.
`[0062] Advantageously, the integrated circuit com-
`prises a cryptographic processor configured to encrypt
`or authenticate the information sent over the wireless
`network.
`[0063] Advantageously, the cryptographic processor
`uses a key to cryptographically sign the information that
`is sent over the wireless network.
`[0064] Advantageously, the wireless network inter-
`face comprises at least one of an 802.11 media access
`controller and a Bluetooth media access controller.
`[0065] Advantageously, the wireless network inter-
`face comprises an 802.11 media access controller and
`a Bluetooth media access controller.
`[0066] Advantageously, the wireless network inter-
`face uses the information to provide authentication to
`the wireless network.
`[0067] Advantageously, the information comprises a
`password or key.
`[0068] According to an aspect of the invention, a com-
`munication system comprises:
`
`a wireless proximity reader configured to receive an
`RF signal from a wireless token located within a de-
`fined proximity to the wireless proximity reader and
`configured to extract information from the received
`RF signal; and
`a key management component coupled to receive
`the information from the wireless proximity reader
`and send the information to a service provider.
`
`[0069] Advantageously, the system comprises a se-
`curity boundary within which the information is extracted
`and received.
`[0070] Advantageously, the key management compo-
`nent comprises a trusted platform module.
`[0071] Advantageously, a user is authenticated to the
`trusted platform module by moving the wireless token
`within the defined proximity to the wireless proximity
`reader.
`[0072] Advantageously, the trusted platform module
`provides access to a protected service after the user is
`authenticated.
`[0073] Advantageously, the trusted platform module
`provides access to encrypted data after the user is au-
`thenticated.
`[0074] Advantageously, the trusted platform module
`
`Page 4 of 25
`
`

`

`7
`
`EP 1 536 306 A1
`
`8
`
`enables use of protected keys after the user is authen-
`ticated.
`[0075] Advantageously, the system comprises a net-
`work interface wherein the trusted platform module pro-
`vides access to a network via the network interface after
`the user is authenticated.
`[0076] Advantageously, the network interface com-
`prises a wireless interface.
`[0077] Advantageously, the network interface com-
`prises at least one of an 802.11 network interface and a
`Bluetooth network interface.
`[0078] Advantageously, the network interface com-
`prises an 802.11 network interface and a Bluetooth net-
`work interface.
`[0079] Advantageously, the system comprises a serv-
`ice provider configured to provide access to data and a
`service.
`[0080] Advantageously, the system comprises a serv-
`ice provider configured to supply cryptographic keys.
`[0081] Advantageously, the wireless proximity reader
`is included within a boundary of the key management
`component.
`[0082] Advantageously, the wireless proximity reader
`is an RFID reader.
`[0083] According to an aspect of the invention, a
`method of providing access to a service comprises:
`
`receiving an RF signal from a proximate wireless
`token;
`obtaining information from the RF signal;
`authenticating the information to a key manage-
`ment component; and
`providing, by the key management component, ac-
`cess to a service.
`
`[0084] Advantageously, the method comprises estab-
`lishing a security boundary for the receiving, obtaining,
`authenticating and providing.
`[0085] Advantageously, at least a portion of the secu-
`rity boundary comprises a cryptographic boundary.
`[0086] Advantageously, at least a portion of the secu-
`rity boundary comprises an integrated circuit.
`[0087] Advantageously, the method comprises au-
`thenticating the information and providing the authenti-
`cated information to a service provider.
`[0088] Advantageously, authenticating the informa-
`tion comprises cryptographically signing the information
`with a key.
`[0089] Advantageously, the key management compo-
`nent comprises a trusted platform module.
`[0090] Advantageously, the trusted platform module
`enables key usage after the user is authenticated.
`[0091] Advantageously, the trusted platform module
`enables access to processing resources after the user
`is authenticated.
`[0092] Advantageously, the trusted platform module
`enables access to data network services after the user
`is authenticated.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`5
`
`[0093] Advantageously, the RF signal is an RFID sig-
`nal.
`[0094] Advantageously,
`the information comprises
`credentials associated with a user of the token.
`[0095] Advantageously,
`the service comprises at
`least one of 802.11 network access and Bluetooth net-
`work access.
`[0096] Advantageously, the service comprises 802.11
`network access and Bluetooth network access.
`[0097] According to an aspect of the invention, an in-
`tegrated circuit comprises:
`
`a wireless proximity reader configured to receive an
`RF signal from a wireless token located within a de-
`fined proximity to the wireless proximity reader and
`configured to extract information from the received
`RF signal; and
`at least one connection within the integrated circuit
`for coupling the wireless proximity reader to a wire-
`less network interface; and
`a key management component coupled to receive
`the information from the wireless proximity reader
`and provide the information to a port on the integrat-
`ed circuit to send the information to a service pro-
`vider.
`
`[0098] Advantageously, the integrated circuit com-
`prises a security boundary within which the information
`is extracted and received.
`[0099] Advantageously, the wireless proximity reader
`is an RFID reader.
`[0100] Advantageously, the wireless proximity reader
`is included within a boundary of the key management
`component.
`[0101] Advantageously, the key management compo-
`nent comprises a trusted platform module.
`[0102] Advantageously, the wireless proximity reader
`is included within a boundary of the trusted platform
`module.
`[0103] Advantageously, the integrated circuit com-
`prises a network interface wherein the trusted platform
`module provides access to a network via the network
`interface after the user is authenticated.
`[0104] Advantageously, the network interface com-
`prises a wireless interface.
`[0105] Advantageously, the wireless network inter-
`face comprises at least one of an 802.11 network inter-
`face and a Bluetooth network interface.
`[0106] Advantageously, the wireless network inter-
`face comprises an 802.11 network interface and a Blue-
`tooth network interface.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0107] These and other features, aspects and advan-
`tages of the present invention will be more fully under-
`stood when considered with respect to the following de-
`tailed description, appended claims and accompanying
`
`Page 5 of 25
`
`

`

`9
`
`EP 1 536 306 A1
`
`10
`
`drawings, wherein:
`
`FIG. 1 is a simplified block diagram of one embod-
`iment of a proximity-based authentication system
`constructed in accordance with the invention;
`FIG. 2 is a flow chart of one embodiment of proxim-
`ity-based authentication operations that may be
`performed in accordance with the invention;
`FIG. 3 is a simplified block diagram of one embod-
`iment of a proximity-based authentication system
`constructed in accordance with the invention;
`FIG. 4 is a flow chart of one embodiment of proxim-
`ity-based authentication operations that may be
`performed in accordance with the invention;
`FIG. 5 is a simplified block diagram of one embod-
`iment of a proximity-based network authentication
`system constructed in accordance with the inven-
`tion;
`FIG. 6 is a simplified block diagram of one embod-
`iment of a proximity-based wireless network au-
`thentication system constructed in accordance with
`the invention;
`FIG. 7 is a flow chart of one embodiment of proxim-
`ity-based network authentication operations that
`may be performed in accordance with the invention;
`FIG. 8 is a simplified block diagram of one embod-
`iment of proximity-based authentication for a trust-
`ed platform module constructed in accordance with
`the invention;
`FIG. 9 is a flow chart of one embodiment of proxim-
`ity-based authentication operations for a trusted
`platform module that may be performed in accord-
`ance with the invention;
`FIG. 10 is a simplified block diagram of one embod-
`iment of an integrated circuit including a trusted
`platform module constructed in accordance with the
`invention; and
`FIG. 11 is a simplified block diagram of one embod-
`iment of proximity-based authentication for a trust-
`ed platform module constructed in accordance with
`the invention.
`
`[0108]
`In accordance with common practice the vari-
`ous features illustrated in the drawings may not be
`drawn to scale. Accordingly, the dimensions of the var-
`ious features may be arbitrarily expanded or reduced for
`clarity. In addition, some of the drawings may be simpli-
`fied for clarity. Thus, the drawings may not depict all of
`the components of a given apparatus or method. Finally,
`like reference numerals denote like features throughout
`the specification and figures.
`
`DETAILED DESCRIPTION
`
`[0109] The invention is described below, with refer-
`ence to detailed illustrative embodiments. It will be ap-
`parent that the invention may be embodied in a wide
`variety of forms, some of which may be quite different
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`6
`
`from those of the disclosed embodiments. Consequent-
`ly, the specific structural and functional details disclosed
`herein are merely representative and do not limit the
`scope of the invention.
`[0110] Figure 1 illustrates one embodiment of a sys-
`tem 100 where selected services may be provided to a
`user via a computing device only when a wireless token
`assigned to a user is proximate to the computing device.
`Operations of the system 100 will be explained in more
`detail in conjunction with the flowchart of Figure 2.
`[0111] As represented by block 202 in Figure 2 an ac-
`cess device 102 (Figure 1) such as a computer includes
`components that may be used to determine whether a
`wireless token 104 assigned to a user or users is prox-
`imate to the access device 102. For example, a wireless
`proximity reader 106 may be configured to receive sig-
`nals 108 (e.g., RF signals) from the wireless proximity
`token 104. The signals 108 may include information that
`uniquely identifies the wireless proximity token 104. In
`addition, this information may include one or more cre-
`dentials (e.g., a password) that may be used to access
`a secured service provided by a service provider 110.
`[0112] The determination of proximity between the to-
`ken 104 and the reader 106 may be established using
`a variety of mechanisms depending on the application.
`In some embodiments, the token will not generate sig-
`nals until it is within a given distance of the reader. This
`may be accomplished, for example, by using a relatively
`passive token that intercepts signals transmitted by the
`reader and transmits signals in response to the received
`signals. Different distances between the token 104 and
`the reader 106 may be defined as indicative of proximity
`depending on the requirements of the application and,
`in some cases, characteristics of the operating environ-
`ment.
`[0113] As represented by block 204, the access de-
`vice 102 may request access to a service from the serv-
`ice provider 110 by sending a signal over a communica-
`tion media 112. Depending upon the particular applica-
`tion, the communication media 112 may comprise, for
`example, electric wires, optical cables or air.
`[0114] Typically, access to the service will be initiated
`by the user's interaction with the access device 102. For
`example, the user may use a keyboard or pointing de-
`vice (e.g., a computer mouse) to request the service. In
`conjunction with this the user may be asked to input a
`password and/or provide a biometric (e.g., a fingerprint)
`to a biometric reader to further verify the authenticity of
`the user. In this way, access to a service may be restrict-
`ed until the user satisfies one or more verification que-
`ries including, for example, what the user knows (e.g.,
`a password), what the user possesses (e.g., a token)
`and who the user is (e.g., a physical or biometric char-
`acteristic).
`[0115]
`In some embodiments, the access device 102
`may automatically request a predefined service once
`the user places the token 104 proximate the access de-
`vice 102. For example, the access device 102 may in-
`
`Page 6 of 25
`
`

`

`11
`
`EP 1 536 306 A1
`
`12
`
`clude a database (not shown) that matches a given to-
`ken (or information from the token) with one or more de-
`fault services. Thus, when a token associated with de-
`fault services approaches the access device 102, the
`access device 102 may automatically request the serv-
`ices from the service provider 110.
`[0116] As represented by block 206, the access de-
`vice 102 may send authentication-related information to
`the service provider 110 to indicate that the token 104
`is proximate to the access device 102. For example, the
`access device 102 may include an authentication com-
`ponent 116 such that the determination of whether the
`token 104 is proximate the access device 102 is per-
`formed in a secure manner. In addition, the information
`provided by the token may be maintained within the ac-
`cess device 102 in a secure manner. For example, the
`information may only pass between the reader 106 and
`the authentication component 114 via a connection 116
`within a common integrated circuit.
`[0117]
`In addition, the authentication component 114
`may be in secure communication with the service pro-
`vider 110. This may be accomplished, for example, by
`placing the authentication component 114 and the serv-
`ice provider 110 on the same integrated circuit or within
`secured hardware. In addition, a cryptographically se-
`cured communication channel may be established be-
`tween the authentication component 114 and the serv-
`ice provider 110.
`[0118]
`In some embodiments, the authentication in-
`formation may include information from the token. In the
`case where the communications over the media 112
`may be cryptographically secured, the authentication
`component 114 may process (e.g., encrypt or sign) the
`information before sending it to the service provider 110.
`Since communications from the access device 102 may
`be trusted in this example, the authentication compo-
`nent 114 thereby provides a cryptographically reliable
`authentication that the information is from a specific to-
`ken that is proximate that particular access device. In
`other words the encryption or cryptographic signing of
`the information may provide the necessary authentica-
`tion.
`[0119] After the service provider 110 has received an
`authenticated indication that the token is proximate the
`access device 102, the service provider 110 may then
`enable access to the requested service (block 208). This
`process may involve verifying that the information sent
`from the token 104 includes a credential associated with
`an authorized user and or access device.
`[0120] As used herein the term service may include,
`for example, access to data and/or a data processing
`service. Thus, a service may enable an access device
`to, for example, read or write data in a data memory,
`access encrypted data, use cryptographic keys, gain ac-
`cess to cryptographic material such as security associ-
`ations and keys, access a web page, access a data net-
`work or access a processing application.
`[0121] As used herein the term data may include any
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`7
`
`information that may be accessed by a computing de-
`vice including, for example, data files, passwords and
`cryptographic security associations including keys.
`[0122] As used herein the term access may include,
`for example, acquiring, using, invoking, etc. Thus, data
`may be accessed by providing a copy of the data to the
`access device. Data also may be accessed by enabling
`the access device to manipulate or use the data. As an
`example of the latter, once a user has been authorized
`to access a service a trusted platform module may use
`keys to perform operations for the user. For a data net-
`work, access may include, for example, sending and/or
`receiving data over the network. For a processing appli-
`cation access may include, for example, invoking, inter-
`acting with or using the application or loading the appli-
`cation onto the access device.
`[0123] A service provider may comprise hardware
`and/or software that facilitate providing a service. For
`example, a service provider may consist of a processing
`system that processes requests for service, verifies
`whether the requester is authorized to access the serv-
`ice and provides or facilitates the requested access.
`[0124]
`In practice, a service provider (e.g.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket