GB2418759A - System access - Google Patents

System access Download PDF

Info

Publication number
GB2418759A
GB2418759A GB0421606A GB0421606A GB2418759A GB 2418759 A GB2418759 A GB 2418759A GB 0421606 A GB0421606 A GB 0421606A GB 0421606 A GB0421606 A GB 0421606A GB 2418759 A GB2418759 A GB 2418759A
Authority
GB
United Kingdom
Prior art keywords
computer system
access information
user
transceiver
transmitter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0421606A
Other versions
GB0421606D0 (en
Inventor
Thomas Lederer
Werner Schneider
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Priority to GB0421606A priority Critical patent/GB2418759A/en
Publication of GB0421606D0 publication Critical patent/GB0421606D0/en
Publication of GB2418759A publication Critical patent/GB2418759A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A computer system 7 permits access upon receipt of relevant security access information transmitted to it from a user portable transmitter 11. Specifically, the transmitter 11 is a blue-tooth enabled mobile telephone but it could also be a personal digital assistant (PDA) or other portable device.

Description

24 1 8759
SYSTEM ACCESS APPARATUS
This invention relates to a system access apparatus and method, particularly, but not exclusively for enabling access to a s computer.
It is important to prevent unauthorized access to computers.
This requirement is one which is employed in nearly all office and even home environments. Typically, access is controlled by requiring to the entry of a password and, usually, a user identifier before the computer may be used. Most users find this an undesirable prelude before they can start work and it is one that may have to be carried out a number of times during a working day. If the computer is not. . used for a predetermined time the security may be re-applied.... :.
Is preventing access until the password and username is re-entered.
Some more cavalier users will seeks to avoid this requirement by bypassing the security set-up by re-configuring the computer to eliminate the need to enter a password or by increasing the delay..
before security is re-applied. Thus, it is possible for a security policy : to be broken down in an organization by users actively circumventing the policy.
The present invention arose in an attempt to make system access less onerous to users.
According to the invention there is provided a computer system configured to require verification of access information before allowing use of the computer system, a receiver for receiving access information and providing the received access information to the computer system for verification, a user portable wireless transmitter for transmitting user specific access information such that when the user specific access information is transmitted it is received and, if verified, permits access to the system.
By providing a user portable transmitter for transmitting user specific access information a more convenient security policy may be to implemented. Instead of the user having to input the access information at a keyboard, it is conveniently transmitted to the computer system. ....
Preferably, the access information is transmitted when the Is transmitter is within the proximity of the computer system. Most preferred, is that the transmitter automatically transmits the access information when within the proximity of the computer system. In this way, the computer system may be ready for use when the user..
approaches the system by, for example, entering the room where the computer system is located. Alternatively, the transmission may be triggered by a user action such as pressing of a button.
The described embodiment utilises a mobile telephone with a blue-tooth capability transmitting access information.
A specific embodiment of the invention will now be described by way of example only with reference to the drawing in which: - 2 - Figure 1 shows a computer system in accordance with the invention; and Figure 2 is a message flow diagram for the computer system of figure 1.
As is shown in figurer, a computer system 1 includes a microcomputer 2 with a visual display unit 3 connected to a base unit 4. A keyboard 5 and a mouse 6 are also connected to enable user to input to the microcomputer. Also connected to the computer system 1 via a USB port, is a blue-tooth transmission transceiver 7. The transceiver 7 has a reception range of a few metres as indicated by....
the arc 8. ...
Is A user 9 has a mobile telephone 10 including a blue-tooth transceiver 11. ....
The blue-tooth transceiver 7 periodically transmits a notification..
signal advertising that a unit with blue-tooth capability is located in the go vicinity. When the user 9 enters the room where the computer system 2 is located and falls within the reception range, blue-tooth transceiver 11 responds to the notification signal.
At this point reference should be made to figure 2 which shows the flow of messages between the two transceivers 7, 1 1. Lines 12 represents the air interface between the units. Initially, the transceiver 7 sends out the notification messages 13. These are separated by a time interval of one second but the interval may be different or different for different times of day. The user enters the range 8 and the transceiver 11 receives to the notification with a message 14 indicating "I am a security token". The transceiver 7 s responds with a message 15 "provide username". The transceiver 11 responds with message 16 indicating "username = "Fred"".
Safe receipt of this information is acknowledged by an acknowledge message 17 that username = "Fred". This is followed to by a request 18 "provide password". The password "ABC 1234*" is returned in message 19 and acknowledged by transceiver 7 in message 20. A message 21 indicating the end of the log-on process..... se..
is sent by the transceiver 7. An acknowledge message 22 is sent, back in response.
The transceiver 7 then sends the username and password via the USB port to be read by a log-on application running on the computer system. If the username and password are the required.. :.
Ones for operation the user is logged on and is able to use the ho computer system 2 if desired.
If the username and password are incorrect then the computer system 2 remains in standby mode.
us It will be appreciated that the user may move about the room engaging in various activities without using the computer system 2 or only using the system for part of the time. The system may be configured to return to a standby mode if not used for a period of time in which case the transceiver 7 will return to the first stage transmitting notification messages 13. However, in this embodiment the user remains logged-on and the transceiver 7 sends periodic s messages 23. If the transceiver 11 is within range, that is, the user is in the room, it responds with a message 24 indicating the transceiver 11 is still present. If no reply is received after four of the messages 24 the transceiver 7 sends a message via the USB to the application and the user is "logged-off". The transceiver 7 then starts to transmitting periodic notification messages 13.
Whilst the described embodiment refers to a computer system, ;, in the form of a desk-top computer it could be applied to computer.
systems to permit access control or other functions.
The security access information may be held on a smart card such as the SIM card used in the mobile telephone. s l

Claims (4)

1. A computer system configured to require verification of access information before allowing use of the computer system, a receiver s for receiving access information transmitted to it over a wireless link and providing the received access information to the computer system, for verification, and a user portable transmitter for transmitting user specific access information to the receiver for verification by the computer system.
2. A computer system as claimed in claim 1 wherein the receiver and transmitter operate in accordance with the blue-tooth standard. *
3. A computer system substantially as hereinbefore described with Is reference to, and as illustrated by, the drawing.
4. A user portable transmitter for use in a system as claimed in..
any preceding claim. . - 6
GB0421606A 2004-09-29 2004-09-29 System access Withdrawn GB2418759A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0421606A GB2418759A (en) 2004-09-29 2004-09-29 System access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0421606A GB2418759A (en) 2004-09-29 2004-09-29 System access

Publications (2)

Publication Number Publication Date
GB0421606D0 GB0421606D0 (en) 2004-10-27
GB2418759A true GB2418759A (en) 2006-04-05

Family

ID=33397436

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0421606A Withdrawn GB2418759A (en) 2004-09-29 2004-09-29 System access

Country Status (1)

Country Link
GB (1) GB2418759A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2434903A (en) * 2006-01-31 2007-08-08 Motorola Inc Wireless authentication module including a memory holding user personal information
US10055567B2 (en) 2014-05-30 2018-08-21 Apple Inc. Proximity unlock and lock operations for electronic devices

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000031608A2 (en) * 1998-11-24 2000-06-02 Telefonaktiebolaget Lm Ericsson (Publ) Mobile telephone auto pc logon
US20020124175A1 (en) * 2001-03-02 2002-09-05 Seiko Epson Corporation Data processing system utilizing discrete operating device
EP1283474A1 (en) * 2000-03-23 2003-02-12 Tietech Co., Ltd Method and apparatus for personal identification
EP1291748A2 (en) * 2001-09-11 2003-03-12 Alcatel Electronic device capable of wirelessly transmitting a password that can be used to unlock/lock a password protected electronic device
US20030199267A1 (en) * 2000-11-22 2003-10-23 Fujitsu Limited Security system for information processing apparatus
WO2004070591A1 (en) * 2003-02-03 2004-08-19 Patentfabriken Ab Wireless security system
GB2400196A (en) * 2003-04-02 2004-10-06 Nec Technologies Restricting access to a mobile phone, laptop etc. using an authorization procedure involving a separate transceiver

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000031608A2 (en) * 1998-11-24 2000-06-02 Telefonaktiebolaget Lm Ericsson (Publ) Mobile telephone auto pc logon
EP1283474A1 (en) * 2000-03-23 2003-02-12 Tietech Co., Ltd Method and apparatus for personal identification
US20030199267A1 (en) * 2000-11-22 2003-10-23 Fujitsu Limited Security system for information processing apparatus
US20020124175A1 (en) * 2001-03-02 2002-09-05 Seiko Epson Corporation Data processing system utilizing discrete operating device
EP1291748A2 (en) * 2001-09-11 2003-03-12 Alcatel Electronic device capable of wirelessly transmitting a password that can be used to unlock/lock a password protected electronic device
WO2004070591A1 (en) * 2003-02-03 2004-08-19 Patentfabriken Ab Wireless security system
GB2400196A (en) * 2003-04-02 2004-10-06 Nec Technologies Restricting access to a mobile phone, laptop etc. using an authorization procedure involving a separate transceiver

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2434903A (en) * 2006-01-31 2007-08-08 Motorola Inc Wireless authentication module including a memory holding user personal information
GB2434903B (en) * 2006-01-31 2008-11-26 Motorola Inc Module Including A Memory Holding User Personal Informatioon And A Method Of Transfer Of The Information
US10055567B2 (en) 2014-05-30 2018-08-21 Apple Inc. Proximity unlock and lock operations for electronic devices
US10546113B2 (en) 2014-05-30 2020-01-28 Apple Inc. Proximity unlock and lock operations for electronic devices
US11055392B2 (en) 2014-05-30 2021-07-06 Apple Inc. Proximity unlock and lock operations for electronic devices
US11741210B2 (en) 2014-05-30 2023-08-29 Apple Inc. Proximity unlock and lock operations for electronic devices

Also Published As

Publication number Publication date
GB0421606D0 (en) 2004-10-27

Similar Documents

Publication Publication Date Title
US6594762B1 (en) Methods and devices enabling displays of electronic devices based on separation thereof
US8353002B2 (en) Chaining information card selectors
US20030034877A1 (en) Proximity detection for access control
US7657287B2 (en) Mobile station in a mobile communication system and method for accessing a service and/or a data record in the mobile station's standby mode
USRE50053E1 (en) Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time
US20050076242A1 (en) Wireless access management and control for personal computing devices
CN109155750B (en) Communication method and device
US11159536B2 (en) Secure access with trusted proximity device
US20070037566A1 (en) Prohibiting radio frequency transmissions in a restricted environment
CN105656948A (en) Account login method and device
US9723471B2 (en) Method, mobile device and computer program product for triggering an event of interest based on communications established with nearby wireless devices
CN108604265A (en) The method and terminal device of outline management application program usage time
US20070043950A1 (en) Target apparatus, certification device, and certification method
US20190026452A1 (en) Method for Associating Application Program with Biometric Feature, Apparatus, and Mobile Terminal
CN111866885A (en) Verification information sharing method and device and electronic equipment
JP4270398B2 (en) System and method for displaying a secure status indicator on a display
WO2023030265A1 (en) Control method and electronic device
CN105893826B (en) Message display method based on finger print information and intelligent terminal
EP1746775A1 (en) Connection of a portable terminal to a server
US11196736B2 (en) Systems and methods for location-aware two-factor authentication
CN110225513B (en) Dynamic packet access for mobile devices
GB2418759A (en) System access
CN117411655A (en) Equipment decryption control method and device, electronic equipment and storage medium
CN107995150B (en) Identity verification method and device
CN109565463B (en) Method, device and terminal for processing short message verification code

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)