GB2418759A - System access - Google Patents
System access Download PDFInfo
- Publication number
- GB2418759A GB2418759A GB0421606A GB0421606A GB2418759A GB 2418759 A GB2418759 A GB 2418759A GB 0421606 A GB0421606 A GB 0421606A GB 0421606 A GB0421606 A GB 0421606A GB 2418759 A GB2418759 A GB 2418759A
- Authority
- GB
- United Kingdom
- Prior art keywords
- computer system
- access information
- user
- transceiver
- transmitter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000012795 verification Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
A computer system 7 permits access upon receipt of relevant security access information transmitted to it from a user portable transmitter 11. Specifically, the transmitter 11 is a blue-tooth enabled mobile telephone but it could also be a personal digital assistant (PDA) or other portable device.
Description
24 1 8759
SYSTEM ACCESS APPARATUS
This invention relates to a system access apparatus and method, particularly, but not exclusively for enabling access to a s computer.
It is important to prevent unauthorized access to computers.
This requirement is one which is employed in nearly all office and even home environments. Typically, access is controlled by requiring to the entry of a password and, usually, a user identifier before the computer may be used. Most users find this an undesirable prelude before they can start work and it is one that may have to be carried out a number of times during a working day. If the computer is not. . used for a predetermined time the security may be re-applied.... :.
Is preventing access until the password and username is re-entered.
Some more cavalier users will seeks to avoid this requirement by bypassing the security set-up by re-configuring the computer to eliminate the need to enter a password or by increasing the delay..
before security is re-applied. Thus, it is possible for a security policy : to be broken down in an organization by users actively circumventing the policy.
The present invention arose in an attempt to make system access less onerous to users.
According to the invention there is provided a computer system configured to require verification of access information before allowing use of the computer system, a receiver for receiving access information and providing the received access information to the computer system for verification, a user portable wireless transmitter for transmitting user specific access information such that when the user specific access information is transmitted it is received and, if verified, permits access to the system.
By providing a user portable transmitter for transmitting user specific access information a more convenient security policy may be to implemented. Instead of the user having to input the access information at a keyboard, it is conveniently transmitted to the computer system. ....
Preferably, the access information is transmitted when the Is transmitter is within the proximity of the computer system. Most preferred, is that the transmitter automatically transmits the access information when within the proximity of the computer system. In this way, the computer system may be ready for use when the user..
approaches the system by, for example, entering the room where the computer system is located. Alternatively, the transmission may be triggered by a user action such as pressing of a button.
The described embodiment utilises a mobile telephone with a blue-tooth capability transmitting access information.
A specific embodiment of the invention will now be described by way of example only with reference to the drawing in which: - 2 - Figure 1 shows a computer system in accordance with the invention; and Figure 2 is a message flow diagram for the computer system of figure 1.
As is shown in figurer, a computer system 1 includes a microcomputer 2 with a visual display unit 3 connected to a base unit 4. A keyboard 5 and a mouse 6 are also connected to enable user to input to the microcomputer. Also connected to the computer system 1 via a USB port, is a blue-tooth transmission transceiver 7. The transceiver 7 has a reception range of a few metres as indicated by....
the arc 8. ...
Is A user 9 has a mobile telephone 10 including a blue-tooth transceiver 11. ....
The blue-tooth transceiver 7 periodically transmits a notification..
signal advertising that a unit with blue-tooth capability is located in the go vicinity. When the user 9 enters the room where the computer system 2 is located and falls within the reception range, blue-tooth transceiver 11 responds to the notification signal.
At this point reference should be made to figure 2 which shows the flow of messages between the two transceivers 7, 1 1. Lines 12 represents the air interface between the units. Initially, the transceiver 7 sends out the notification messages 13. These are separated by a time interval of one second but the interval may be different or different for different times of day. The user enters the range 8 and the transceiver 11 receives to the notification with a message 14 indicating "I am a security token". The transceiver 7 s responds with a message 15 "provide username". The transceiver 11 responds with message 16 indicating "username = "Fred"".
Safe receipt of this information is acknowledged by an acknowledge message 17 that username = "Fred". This is followed to by a request 18 "provide password". The password "ABC 1234*" is returned in message 19 and acknowledged by transceiver 7 in message 20. A message 21 indicating the end of the log-on process..... se..
is sent by the transceiver 7. An acknowledge message 22 is sent, back in response.
The transceiver 7 then sends the username and password via the USB port to be read by a log-on application running on the computer system. If the username and password are the required.. :.
Ones for operation the user is logged on and is able to use the ho computer system 2 if desired.
If the username and password are incorrect then the computer system 2 remains in standby mode.
us It will be appreciated that the user may move about the room engaging in various activities without using the computer system 2 or only using the system for part of the time. The system may be configured to return to a standby mode if not used for a period of time in which case the transceiver 7 will return to the first stage transmitting notification messages 13. However, in this embodiment the user remains logged-on and the transceiver 7 sends periodic s messages 23. If the transceiver 11 is within range, that is, the user is in the room, it responds with a message 24 indicating the transceiver 11 is still present. If no reply is received after four of the messages 24 the transceiver 7 sends a message via the USB to the application and the user is "logged-off". The transceiver 7 then starts to transmitting periodic notification messages 13.
Whilst the described embodiment refers to a computer system, ;, in the form of a desk-top computer it could be applied to computer.
systems to permit access control or other functions.
The security access information may be held on a smart card such as the SIM card used in the mobile telephone. s l
Claims (4)
1. A computer system configured to require verification of access information before allowing use of the computer system, a receiver s for receiving access information transmitted to it over a wireless link and providing the received access information to the computer system, for verification, and a user portable transmitter for transmitting user specific access information to the receiver for verification by the computer system.
2. A computer system as claimed in claim 1 wherein the receiver and transmitter operate in accordance with the blue-tooth standard. *
3. A computer system substantially as hereinbefore described with Is reference to, and as illustrated by, the drawing.
4. A user portable transmitter for use in a system as claimed in..
any preceding claim. . - 6
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0421606A GB2418759A (en) | 2004-09-29 | 2004-09-29 | System access |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0421606A GB2418759A (en) | 2004-09-29 | 2004-09-29 | System access |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0421606D0 GB0421606D0 (en) | 2004-10-27 |
GB2418759A true GB2418759A (en) | 2006-04-05 |
Family
ID=33397436
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0421606A Withdrawn GB2418759A (en) | 2004-09-29 | 2004-09-29 | System access |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2418759A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2434903A (en) * | 2006-01-31 | 2007-08-08 | Motorola Inc | Wireless authentication module including a memory holding user personal information |
US10055567B2 (en) | 2014-05-30 | 2018-08-21 | Apple Inc. | Proximity unlock and lock operations for electronic devices |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000031608A2 (en) * | 1998-11-24 | 2000-06-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile telephone auto pc logon |
US20020124175A1 (en) * | 2001-03-02 | 2002-09-05 | Seiko Epson Corporation | Data processing system utilizing discrete operating device |
EP1283474A1 (en) * | 2000-03-23 | 2003-02-12 | Tietech Co., Ltd | Method and apparatus for personal identification |
EP1291748A2 (en) * | 2001-09-11 | 2003-03-12 | Alcatel | Electronic device capable of wirelessly transmitting a password that can be used to unlock/lock a password protected electronic device |
US20030199267A1 (en) * | 2000-11-22 | 2003-10-23 | Fujitsu Limited | Security system for information processing apparatus |
WO2004070591A1 (en) * | 2003-02-03 | 2004-08-19 | Patentfabriken Ab | Wireless security system |
GB2400196A (en) * | 2003-04-02 | 2004-10-06 | Nec Technologies | Restricting access to a mobile phone, laptop etc. using an authorization procedure involving a separate transceiver |
-
2004
- 2004-09-29 GB GB0421606A patent/GB2418759A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000031608A2 (en) * | 1998-11-24 | 2000-06-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile telephone auto pc logon |
EP1283474A1 (en) * | 2000-03-23 | 2003-02-12 | Tietech Co., Ltd | Method and apparatus for personal identification |
US20030199267A1 (en) * | 2000-11-22 | 2003-10-23 | Fujitsu Limited | Security system for information processing apparatus |
US20020124175A1 (en) * | 2001-03-02 | 2002-09-05 | Seiko Epson Corporation | Data processing system utilizing discrete operating device |
EP1291748A2 (en) * | 2001-09-11 | 2003-03-12 | Alcatel | Electronic device capable of wirelessly transmitting a password that can be used to unlock/lock a password protected electronic device |
WO2004070591A1 (en) * | 2003-02-03 | 2004-08-19 | Patentfabriken Ab | Wireless security system |
GB2400196A (en) * | 2003-04-02 | 2004-10-06 | Nec Technologies | Restricting access to a mobile phone, laptop etc. using an authorization procedure involving a separate transceiver |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2434903A (en) * | 2006-01-31 | 2007-08-08 | Motorola Inc | Wireless authentication module including a memory holding user personal information |
GB2434903B (en) * | 2006-01-31 | 2008-11-26 | Motorola Inc | Module Including A Memory Holding User Personal Informatioon And A Method Of Transfer Of The Information |
US10055567B2 (en) | 2014-05-30 | 2018-08-21 | Apple Inc. | Proximity unlock and lock operations for electronic devices |
US10546113B2 (en) | 2014-05-30 | 2020-01-28 | Apple Inc. | Proximity unlock and lock operations for electronic devices |
US11055392B2 (en) | 2014-05-30 | 2021-07-06 | Apple Inc. | Proximity unlock and lock operations for electronic devices |
US11741210B2 (en) | 2014-05-30 | 2023-08-29 | Apple Inc. | Proximity unlock and lock operations for electronic devices |
Also Published As
Publication number | Publication date |
---|---|
GB0421606D0 (en) | 2004-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6594762B1 (en) | Methods and devices enabling displays of electronic devices based on separation thereof | |
USRE50053E1 (en) | Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time | |
US20030034877A1 (en) | Proximity detection for access control | |
US20050076242A1 (en) | Wireless access management and control for personal computing devices | |
CN109155750B (en) | Communication method and device | |
US11159536B2 (en) | Secure access with trusted proximity device | |
US20040248550A1 (en) | Mobile station in a mobile communication system and method for accessing a service and/or data set in the stand-by- mode of the mobile station | |
JP2009505568A (en) | Prohibit radio frequency transmission in restricted environments | |
US9723471B2 (en) | Method, mobile device and computer program product for triggering an event of interest based on communications established with nearby wireless devices | |
CN105656948A (en) | Account login method and device | |
US11017066B2 (en) | Method for associating application program with biometric feature, apparatus, and mobile terminal | |
CN108604265A (en) | The method and terminal device of outline management application program usage time | |
KR20110132392A (en) | User challenge using information based on geography or user identity | |
US20070043950A1 (en) | Target apparatus, certification device, and certification method | |
CN111866885A (en) | Verification information sharing method and device and electronic equipment | |
WO2023030265A1 (en) | Control method and electronic device | |
CN110035183B (en) | Information sharing method and terminal | |
EP1746775B1 (en) | Connection of a portable terminal to a server | |
US20200259823A1 (en) | Systems and methods for location-aware two-factor authentication | |
CN113300944A (en) | Friend adding method and device and electronic equipment | |
CN117411655A (en) | Equipment decryption control method and device, electronic equipment and storage medium | |
GB2418759A (en) | System access | |
CN110225513B (en) | Dynamic packet access for mobile devices | |
CN107995150B (en) | Identity verification method and device | |
CN109565463B (en) | Method, device and terminal for processing short message verification code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |