Claims
- 1. A system for authentication, comprising:
at least one hand-held token operable to generate at least one acoustic signal, the token being associated with a key identifier; plural verifiers configured for receiving the acoustic signal and in response thereto accessing respective data structures representing identities of authorized tokens to selectively grant access to respective components; and means coupled to the token and/or coupled to at least one verifier for adding the key identifier to the data structure associated with the verifier.
- 2. The system of claim 1, wherein the means for adding includes:
means for inputting an addition request to the verifier; means for causing the verifier to transmit a first audible signal; and means on the token operable by a user to transmit the key identifier in an acoustic signal.
- 3. The system of claim 2, further comprising means for transmitting an acknowledgement audible signal from the verifier to signal that the key identifier has been successfully added to the data structure.
- 4. The system of claim 1, wherein the data structure is a list.
- 5. The system of claim 1, wherein the key identifier is a public key of a private key/public key pair.
- 6. A system for authentication, comprising:
at least one hand-held token operable to generate at least one acoustic signal, the token being associated with a key identifier; plural verifiers configured for receiving the acoustic signal and in response thereto accessing respective data structures representing identities of authorized tokens to selectively grant access to respective components; and means coupled to the token and/or coupled to at least one verifier for removing the key identifier from the data structure associated with the verifier.
- 7. The system of claim 6, wherein the means for removing includes:
means on the token for inputting a removal request to the verifier; and means for removing the key identifier from the data structure in response to the removal request.
- 8. The system of claim 6, wherein the means for removing includes:
means for retrieving a recording of the key identifier; and means accessing the recording for removing the key identifier from the data structure.
- 9. The system of claim 6, wherein the means for removing includes:
means for associating an audio label with the token; and means for facilitating removal of the key identifier from the list based on the audio label.
- 10. The system of claim 6, wherein the data structure is a list.
- 11. The system of claim 6, wherein the key identifier is a public key of a private key/public key pair.
- 12. A method for authentication, comprising:
transmitting a public key identifier associated with a token in an acoustic signal to a verifier; adding the key identifier to a data structure accessible to the verifier, the data structure representing identities of authorized tokens; generating at least one acoustic signal from the token, the signal being associated with a private key identifier; and receiving the acoustic signal at the verifier and in response thereto accessing the data structure to selectively grant access to a component.
- 13. The method of claim 12, further comprising:
inputting an acoustic addition request to a verifier; and causing the verifier to transmit a first audible signal to signal verifier readiness to receive the public key identifier.
- 14. The method of claim 13, further comprising transmitting an acknowledgement audible signal from the verifier to signal that the public key identifier has been successfully added to the data structure.
- 15. The method of claim 12, wherein the data structure is a list.
- 16. A method for authentication, comprising:
adding at least one key identifier to a data structure accessible to a verifier, the key identifier identifying a hand-held token; selectively granting access to at least one component associated with the verifier in response to acoustic authorization signals from the token; and removing the key identifier from the data structure.
- 17. The method of claim 16, comprising:
inputting a removal request to the verifier, using the token; removing the key identifier from the data structure in response to the removal request.
- 18. The method of claim 16, comprising:
retrieving a recording of the key identifier; and accessing the recording to remove the key identifier from the data structure.
- 19. The method of claim 16, comprising:
associating at least one label with the token; providing the label to the verifier; and removing the key identifier from the list using the label.
- 20. The method of claim 16, wherein the data structure is a list.
- 21. The method of claim 16, wherein the key identifier is a public key of a private key/public key pair.
- 22. An authentication system, comprising:
at least one token configured for generating at least first and second acoustic signals, each signal being generated at least in part using a private key of the token; a first verifier configured for receiving acoustic signals and granting authorization to the user upon receipt of the first acoustic signal but not upon receipt of the second acoustic signal; and a second verifier configured for receiving acoustic signals and granting authorization to the user upon receipt of the second acoustic signal but not upon receipt of the first acoustic signal.
- 23. The system of claim 22, wherein each verifier accesses a data structure representing authorized tokens, each verifier accessing public keys in the list to verify at least portions of acoustically-transmitted messages.
- 24. The system of claim 22, wherein the token includes first and second activation elements operable by a user of the token to generate the respective first and second acoustic signals.
- 25. The system of claim 22, wherein the token includes:
a single activation element; plural private keys; and means for transmitting a user-selected one of the keys when the activation element is operated.
- 26. A method for selectively granting authorization to a bearer of a token to one of plural verifiers, comprising:
establishing a keyword for each verifier; gaining authorization access from a verifier by:
speaking the keyword associated with the verifier; operating at least one activation element on the token to generate an acoustic authorization request receivable by the verifier; and selectively granting authorization based on the keyword and acoustic authorization request.
- 27. The method of claim 26, wherein the acoustic authorization request is generated at least in part using at least one private key of a public key/private key pair.
- 28. An authorization system, comprising:
plural hand-held tokens each generating a unique acoustic authorization request, the tokens being stackably engageable with each other.
RELATED APPLICATIONS
[0001] This application is related to co-pending U.S. patent application Ser. No. 10/077,365, filed Feb. 15, 2002, for an invention entitled “Method and Apparatus for Simplified Audio Authentication”, is related to co-pending U.S. patent application Ser. No. 09/611,569, filed Jul. 7, 2000, for an invention entitled “Method and Apparatus for Simplified Audio Authentication”, and to co-pending U.S. provisional patent application serial No. 60/380,651, filed May 15, 2002, for an invention entitled “System and Method for Managing Sonic Token Verifiers”, all of which are incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60380651 |
May 2002 |
US |