Browse Prior Art Database

Method and Apparatus for Authentication Tokens with Limited Charge Capabilities Disclosure Number: IPCOM000248035D
Publication Date: 2016-Oct-19
Document File: 3 page(s) / 152K

Publishing Venue

The Prior Art Database


A multi-function device that also functions as an authentication token may lose this critical function when battery levels are low or depleted, potentially creating significant inconvenience for the user. Disclosed are methods of entering a critical mode upon a low battery level to alleviate this problem.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 53% of the total text.

Page 01 of 3

1. Title of Invention

Method and Apparatus for Authentication Tokens with Limited Charge Capabilities

2. Application / Relation to Current Projects

Field of the Invention: Give both general and specific descriptions of the field to which the invention relates.

Contextual intelligence, Security,



Background: Describe the problem that is to be solved by the invention. Be precise in defining what the problem is, including any necessary technical details or issues that are addressed by the invention.

One of the key weaknesses with authentication tokens is battery life. Many tokens, smart cards for example, have a passive RFID tag, meaning that they do not require a battery.

But, when we begin to talk about using a headset or other wearable as an authentication token, it is assumed that such a multi-purpose device will have a battery life ranging anywhere from a few hours to a few days.


Previous Solutions: Describe what solutions to this problem have been tried before, and why they are inadequate. Also describe previous known solutions to similar or related problems.

Unclear - purpose-built devices can leverage watch batteries, limited user interfaces and passive tags.

The obvious solution is to ignore the issue.


Description of the Invention: Describe in detail how you intend to solve the problem. Provide both an overall description and specifics of each element of the invention. Attach diagrams, flow charts, pictures, test results, etc. Use extra pages if necessary. Note which elements you believe to be novel as well as those you think are conventional. Describe any alternative ways of building and operating the invention.

In the first embodiment of this invention, one can imagine a user demonstrating presence (with a button press or similar), which initiates the second-factor authentication success flow. There are a few areas of novelty in this simple concept.

1. This could be done when the device is off.

2. The device could leverage multiple listeners for user intent - those could change based on battery level. Or, perhaps disabling listeners based on battery level is a better way to describe it.

For context, here is how the WC2 works today:


Page 02 of 3

The points that bear describing are that in our conventional flow, there is a bi-directional flow between two bonded devices.

Further, the user interaction is a confirmation with multiple outcomes

Because our devices are aware of their...