Browse Prior Art Database

Purging security credentials stored inside a wearable device when the wearable device is removed from the body Disclosure Number: IPCOM000234039D
Publication Date: 2014-Jan-08
Document File: 4 page(s) / 2M

Publishing Venue

The Prior Art Database


Disclosed is a system to increase the security of a wearable device. The system allows the processor in the wearable device to automatically identify when it has been physically separated from the wearer so that the security tokens held in the wearable device are automatically erased.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 4

Purging security credentials stored inside a wearable device when the wearable device is removed from the body

Portable client devices (e.g., cell phones, tablet computers, laptop computers, etc.) often store sensitive information that must be secured . This is commonly done with alphanumeric passwords, which must be manually entered into the device each time the information in the device is to be accessed (i.e., unlocked).

There are two problems with this approach. First, it can become quite annoying to have to continually re-enter the password and, second, often portable devices are used in areas prone to "shoulder surfing", video surveillance, etc., thus allowing the passwords to be compromised. Various biometric approaches (e.g., fingerprint, face recognition, voice recognition, etc.) have been attempted, but these rely on recognition technologies that often fail in practice.

This article is related to the class of solutions that address the problem by replacing the manual entry of a password ("something known" to the user) with an electronic token

transmitted by a wearable device ("an item held" by the user). These solutions are more reliable; however, if the user loses the "item held", then security is at great risk, as the finder of the wearable device now has a live "key".

The solution disclosed here addresses the "lost key" problem using a combination of techniques. The first time the user authenticates to the secured device (e.g., enters a password on a cell phone), the secured device transmits an electronic token to a second (wearable) device (e.g., a smart watch) which stores the token for later use. The next time the user wishes to authenticate to the secured device , the user simply triggers the wearable device (e.g., push...