Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method to dynamically retrieve secure access information from a cloud server

IP.com Disclosure Number: IPCOM000209800D
Publication Date: 2011-Aug-16
Document File: 1 page(s) / 85K

Publishing Venue

The IP.com Prior Art Database

Abstract

This article discusses the idea about how users could use near field communication technology techniques and methods to access the authentication information to access secure locations from a cloud server.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 62% of the total text.

Page 01 of 1

Method to dynamically retrieve secure access information from a cloud server


Near field communication, or NFC, is a set of short-range wireless technologies, typically requiring a distance of 4 cm or less. NFC operates at 13.56 MHz and at rates ranging from 106 kbit/s to 848 kbit/s. NFC always involves an initiator and a target; the initiator actively generates an RF field that can power a passive target. This enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or cards that do not require batteries. NFC peer-to-peer communication is also possible, where both devices are powered.

Currently there are no methods to securely store RF IDs used in badge readers or other similar device across the cloud on a server based database. This allows the secured token to be accessed in only one location preventing anyone stealing the NFC or RF device from gaining access. The secure data is stored remotely on a server on a cloud and the phone basically communicates as a client to that server and had multiple functions like it can serve as a secured access badge . This is more secure than carrying the secured access badge as the phone is passcode protected. Using this method, users can dynamically access any additional access privileges from the Cloud server since these privileges do not have to be transferred to individual clients.

The method described here covers storing secure keys remotely. It uses a time stipulated method of getting activa...