Researchers Submit Patent Application, “Strong Authentication Via Distributed Stations”, for Approval (USPTO 20240087693): Patent Application
2024 APR 02 (NewsRx) -- By a
No assignee for this patent application has been made.
News editors obtained the following quote from the background information supplied by the inventors: “In a busy healthcare environment, such as a hospital, clinicians roam frequently among patients, floors and buildings. Each time a clinician reaches a new location, she may require access to patient information or other medical data maintained by the facility (or elsewhere). That data may be accessed via a local, typically shared workstation, or via a handheld wireless device, such as a “smart phone” or tablet capable of hosting applications and establishing telecommunications, Internet and/or local intranet connections.
“In particular, medical institutions from hospitals to physician practice groups to testing centers maintain diverse electronic medical records (EMR) systems, which collectively form the healthcare information backbone. EMR systems allow clinicians access to medical information maintained in various back-end systems. The typical workflow when a physician interacts with a patient involves first logging onto the computer system, then launching and logging into one or more EMR applications, selecting the right patient record, verifying that the record matches the patient, reviewing results (often from different sources), checking up on medical references, entering orders or prescriptions (e.g., using computerized physician order entry (CPOE) applications and ePrescribing), and/or charting patient progress. All of these activities may involve the same patient but different applications, and in some cases multiple separate applications for a single patient-specific activity.
“Moreover, healthcare records are protected by strict privacy laws (such as the Health Insurance Portability and Accountability Act, or HIPAA), regulatory regimes, and institutional access policies. Accordingly, when a clinician moves from place to place, he may be required to log on to a new terminal or device, and because of data-access restrictions, the log-on procedure may involve cumbersome and/or multiple authentication modalities.
“Indeed, for some highly sensitive transactions, a properly authenticated and logged-in user may be asked to re-authenticate using a stronger form of authentication. For example, the user may be asked to provide a fingerprint to a reader complying with Federal Information Processing Standard (FIPS) Publication 201-2, a one-time token or a smart card in order to satisfy an institutional policy or regulatory requirement. Particularly in an environment where nodes can be moved, and where users may access system resources using a personal wireless phone or tablet lacking sophisticated authentication modalities, the user may confront the need to search quickly, in stressful circumstances, for an available workstation with the appropriate authentication capability.”
As a supplement to the background information on this patent application, NewsRx correspondents also obtained the inventor’s summary information for this patent application: “In various embodiments, authentication stations are distributed within a facility, particularly in spaces where mobile devices are predominantly used-e.g., in a hospital’s emergency department. Each such station includes a series of authentication devices, ideally spanning the range of possible modalities required of users, e.g., a FIPS-compliant fingerprint reader, a proximity-card reader, a smart-card reader, a vein reader, an iris scanner, a soft token application, etc. The mobile device may run an application (“app”) for locating the nearest such station and, in some embodiments, pair wirelessly with the station so that authentication thereon will accord the user access to the desired resource via her mobile device. The authentication stations may be dedicated, stand-alone devices (e.g., deployed as kiosks). But in some embodiments, if a nearby workstation or other network node is not presently in use and has the needed authentication modality, the user may be guided to that node.
“Accordingly, in a first aspect, the invention relates to a method of authentication and log-on to access a secure resource via a computer network. In various embodiments, the method comprises the steps of sending, via a computational device, an access request to a secure resource via a network; receiving, from the secure resource, a user authentication requirement involving an authentication modality; locating, via a mobile device, a nearest authentication station supporting the authentication modality; establishing wireless communication between the mobile device and the authentication station; obtaining, by the authentication station using the authentication modality, authentication credentials from a user; causing transmission of the authentication credentials to the authentication server; receiving, by the authentication station, an authentication confirmation from the authentication server and, via multiple-party communication among the mobile device, the authentication station, the computational device, and the secure resource, according access to the secure resource via the computational device.
“The mobile device may be the computational device or may be different from, but in wireless communication with, the computational device. In various embodiments, the step of establishing wireless communication between the mobile device and the authentication station comprises claiming, by the mobile device, the authentication station until the authentication credentials have been received by the authentication station.
“The multiple-party communication may comprise wirelessly communicating, by the authentication station via a secure link, the obtained authentication credentials to the wireless device, and wirelessly communicating, by the wireless device via a secure link, the authentication credentials to the authentication server. In one example of this flow the computational device is different from the wireless device, and the method further comprises wirelessly communicating, by the authentication station to the wireless device via a secure link, a token indicating acceptance of the obtained authentication credentials, and wirelessly communicating, by the wireless device via a secure link, the token to the computational device, whereby access to the secure resource is accorded to the computational device.
“In some embodiments, the multiple-party communication comprises wirelessly communicating, by the wireless device via a secure link to the authentication server, the authentication credentials and session data identifying a session between an application running on the wireless device and the secure resource; and causing, by the authentication server, the computational device to be accorded access to the secure resource over the session.
“The method may further comprise displaying, by the mobile device, a map showing a current location of the mobile device and a location of the authentication station.
“In another aspect, the invention pertains to a system for facilitating authentication and log-on to access a secure resource via a computer network using an authentication modality. In various embodiments, the system comprises a network, a plurality of authentication stations, a computational device configured for requesting access to a secure resource via the network but lacking the authentication modality, and a mobile device comprising a processor and a memory storing an application. The application, when executed by the processor as a running process, causes the mobile device to identify a nearest one of the authentication stations supporting the authentication modality and establish wireless communication therewith. The identified authentication station is configured to (i) receive, using the authentication modality, authentication credentials from a user, (ii) transmit the authentication credentials to the authentication server, and (iii) receive an authentication confirmation from the authentication server. The mobile device, the authentication station, the computational device, and the secure resource, are configured for multiple-party communication whereby access is accorded to the secure resource via the computational device.
“The mobile device may be the computational device or may be different from, but in wireless communication with, the computational device. The mobile device may be configured to wirelessly claim the identified authentication station until the authentication credentials have been received by the authentication station.
“In some embodiments, the multiple-party communication comprises wireless communication by the authentication station of the obtained authentication credentials to the wireless device via a secure link, and wireless communication by the wireless device of the authentication credentials to the authentication server via a secure link. For example, the computational device may be different from the wireless device and the multiple-party communication may further comprise wireless communication by the authentication station to the wireless device via a secure link of a token indicating acceptance of the obtained authentication credentials. The wireless device is configured to use the token to obtain access to the secure resource.
“In some embodiments, the multiple-party communication comprises wireless communication, by the wireless device via a secure link to the authentication server, of the authentication credentials and session data identifying a session between an application running on the wireless device and the secure resource, and the authentication server is configured to accord the computational device access to the secure resource over the session.
“In some embodiments, the mobile device further comprises a display and a mapping application which, when executed by the processor as a running process, causes a map showing a current location of the mobile device and a location of the authentication station to appear on the display.
“These and other objects, along with advantages and features of the present invention herein disclosed, will become more apparent through reference to the following description, the accompanying drawings, and the claims. Furthermore, it is to be understood that the features of the various embodiments described herein are not mutually exclusive and may exist in various combinations and permutations. Reference throughout this specification to “one example,” “an example,” “one embodiment,” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the example is included in at least one example of the present technology. Thus, the occurrences of the phrases “in one example,” “in an example,” “one embodiment,” or “an embodiment” in various places throughout this specification are not necessarily all referring to the same example. Furthermore, the particular features, routines, steps, or characteristics may be combined in any suitable manner in one or more examples of the technology. As used herein, the terms “approximately” and “substantially” mean±10%, and in some embodiments, ±5%.”
The claims supplied by the inventors are:
“1.-16. (canceled)
“17. A method of authentication and log-on to access a secure resource via a computer network, the method comprising the steps of: sending, via a computational device, an access request to a secure resource from a user via a network; receiving, from the secure resource, a user authentication requirement involving an authentication modality, wherein the computational device does not support the authentication modality and cannot be solely utilized to satisfy the user authentication requirement; locating, via a mobile device, an authentication station supporting the authentication modality; and displaying, on the mobile device, a location of the authentication station.
“18. The method of claim 17, wherein displaying the location of the authentication station comprises displaying, on the mobile device, a map showing the location of the authentication station.
“19. The method of claim 18, wherein the map shows a current location of the mobile device.
“20. The method of claim 18, wherein the map shows a current location of the computational device.
“21. The method of claim 17, wherein the mobile device is the computational device.
“22. The method of claim 17, wherein the mobile device is different from the computational device.
“23. The method of claim 22, wherein the mobile device is in wireless communication with the computational device.
“24. The method of claim 17, further comprising claiming the authentication station via the mobile device, thereby preventing use thereof except by the user sending the access request to the secure resource.
“25. The method of claim 17, further comprising establishing a secure connection between the mobile device and the authentication station.
“26. A mobile device for facilitating authentication for a user to access a secure resource via a computer network using an authentication modality, wherein connected to the computer network are a plurality of authentication stations, an authentication server different from the authentication stations, and a computational device (i) configured for requesting access to the secure resource via the computer network and (ii) lacking the authentication modality, the mobile device comprising: a processor; a display; and a memory storing an application, the application, when executed by the processor as a running process after the computational device requests access to the secure resource, causing the mobile device to: identify one or more of the authentication stations supporting the authentication modality and configured to receive authentication credentials from the user using the authentication modality, and show, on the display, a location of at least one said identified authentication station.
“27. The mobile device of claim 26, wherein the application causes the mobile device to show the location of the at least one said identified authentication station by showing, on the display, a map of the location.
“28. The mobile device of claim 27, wherein the map shows a current location of the mobile device.
“29. The mobile device of claim 27, wherein the map shows a current location of the computational device.
“30. The mobile device of claim 27, wherein the application causes the mobile device to claim at least one said identified authentication station, thereby preventing use thereof except by the user.
“31. The mobile device of claim 27, wherein the application causes the mobile device to establish a secure connection between the mobile device and the at least one said identified authentication station.
“32. A mobile device for facilitating authentication for a user to access a secure resource, using an authentication modality, via a computer network connected a plurality of authentication stations and an authentication server different from the authentication stations, wherein the mobile device lacks the authentication modality and is configured for requesting access to the secure resource via the computer network, the mobile device comprising: a processor; a display; and a memory storing an application, the application, when executed by the processor as a running process after the user requests access to the secure resource, causing the mobile device to: identify one or more of the authentication stations supporting the authentication modality and configured to receive authentication credentials from the user using the authentication modality, and show, on the display, a location of at least one said identified authentication station.
“33. The mobile device of claim 32, wherein the application causes the mobile device to show the location of the at least one said identified authentication station by showing, on the display, a map of the location.
“34. The mobile device of claim 33, wherein the map shows a current location of the mobile device.
“35. The mobile device of claim 32, wherein the application causes the mobile device to claim at least one said identified authentication station, thereby preventing use thereof except by the user.
“36. The mobile device of claim 32, wherein the application causes the mobile device to establish a secure connection between the mobile device and the at least one said identified authentication station.”
For additional information on this patent application, see: ULLRICH,
(Our reports deliver fact-based news of research and discoveries from around the world.)
New Vision Science Findings Has Been Reported by Investigators at University of Wisconsin (Factors Influencing Eye Screening Adherence Among Latinx Patients With Diabetes: a Qualitative Study): Science – Vision Science
Vanguard buying sprawling University City campus that Centene abandoned. What we know. [The Charlotte Observer]
Advisor News
Annuity News
Health/Employee Benefits News
Life Insurance News