AU2015243008A1 - Authentication of remote computing device using serial number - Google Patents
Authentication of remote computing device using serial number Download PDFInfo
- Publication number
- AU2015243008A1 AU2015243008A1 AU2015243008A AU2015243008A AU2015243008A1 AU 2015243008 A1 AU2015243008 A1 AU 2015243008A1 AU 2015243008 A AU2015243008 A AU 2015243008A AU 2015243008 A AU2015243008 A AU 2015243008A AU 2015243008 A1 AU2015243008 A1 AU 2015243008A1
- Authority
- AU
- Australia
- Prior art keywords
- computing device
- remote computing
- subset
- electronic documentation
- program product
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 71
- 238000003860 storage Methods 0.000 claims abstract description 35
- 230000004044 response Effects 0.000 claims abstract description 19
- 238000004590 computer program Methods 0.000 claims description 22
- 238000004891 communication Methods 0.000 claims description 11
- 231100000647 material safety data sheet Toxicity 0.000 claims description 4
- 238000012549 training Methods 0.000 claims description 4
- 230000008859 change Effects 0.000 claims description 3
- 230000015654 memory Effects 0.000 description 37
- 238000007726 management method Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 239000004065 semiconductor Substances 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000004883 computer application Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000003814 drug Substances 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention provides a method of accessing centrally stored electronic documentation or subset thereof on a remote computing device comprising: receiving a unique identification number from the remote computing device; sending a unique serial identification for storage on the remote computing device; sending a file listing available electronic documentation or subset thereof to the remote computing device in response to receipt of the unique serial identification from the remote computing device; sending a session token to the remote computing device in response to a request for the electronic documentation or subset thereof and the unique serial identification; and sending the electronic documentation or subset thereof for viewing and/or storage on the remote computing device to the remote computing device in response to receipt of a validated session token and a request for the electronic documentation or subset thereof. a'CD Cj) CjTe C.' 0 )a ) (D- CN 0 U) UC a' CD 1(D -) C a' > (D CI- (0 0c & c nu 0l CU) 0 cl) > 0- cn CLu Cl) Cl) Cl ) CD) a' U) Cl)) 0 0l I) (1 0 00 a'n 0- a'ua a' ) a'e( 0 0 ( 3 a'3% () -u 0 a)) 0 U)L--0U L.. L. U)U.U M 7 )l
Description
P/00/011 Regulation 3.2 AUSTRALIA Patents Act 1990 COMPLETE SPECIFICATION FOR A STANDARD PATENT ORIGINAL Name of Applicant: CUEDRIVE PTY LTD Actual Inventor: Bevan Barry EAGLE Address for Service: Houlihan 2 , Level 1, 70 Doncaster Road, Balwyn North, Victoria 3104, Australia Invention Title: AUTHENTICATION OF REMOTE COMPUTING DEVICE USING SERIAL NUMBER The following statement is a full description of this invention, including the best method of performing it known to the Applicant: 1 2 TITLE AUTHENTICATION OF REMOTE COMPUTING DEVICE USING SERIAL NUMBER FIELD OF THE INVENTION [001] The present invention relates to a method and system for authenticating a computing device using a serial number. More particularly, this invention relates to a method and system in which a serial number is used to authenticate a computing device to allow access to centrally stored information. BACKGROUND TO THE INVENTION [002] Business and other types of information are often stored on a central server for access by remotely located computing devices. For various reasons, often it is desirable to limit access to the information to authorized users. Conventionally a user log-in process, requiring a user to enter a username and password and/or a biometric is used to control access. [003] W02013/162837, the publication of patent application PCT/US2013/034983, is directed to sharing and synchronizing electronically stored files among and between cloud entities and personal computing devices. Files are copied from personal computing devices to the cloud or from device to device via the cloud and files created on the cloud may be viewed from links stored on a device or stored on the device. The stored file may have a resource ID. [004] CN103546545, the publication of Chinese patent application CN20131461587, teaches a safety communication method including transmitting acquired (i) geological location information, (ii) acquired equipment information and (iii) an acquired authentication serial number to a cloud server from a terminal on the basis of cloud computing; enabling the cloud server to receive (i), (ii) and (iii) which are transmitted by the terminal on the basis of cloud computing; enabling the cloud server to compare the received (i), (ii) and (iii) to stored corresponding information and determining, on the basis of the cloud computing, permission of local information processing equipment at a location where the terminal is positioned. [005] CN102624709, the publication of Chinese patent application CN2012145239, discloses a divulgence prevention method based on Bluetooth for a cloud architecture. A user digital certificate is manufactured according to a serial number of a memory card of a mobile phone and stored in the memory card of the mobile phone and a cloud shared 3 authentication database in an encrypted file; when the cloud shared file needs to be used, Bluetooth of the mobile phone is firstly connected with Bluetooth of a computer; after the matching succeeds, when a user visits a cloud server, the Bluetooth of the mobile phone and the Bluetooth of the computer can produce respective operation results; an operation result of the server is compared with a response result returned by the mobile phone; and if the operation result of the server is the same as the response result returned by the mobile phone, the user is regarded as a legal user and successfully logs in to be authenticated. [006] CN 102509034, the publication of Chinese patent application CN20111291431, is directed to a software license control device that has a software license generator, a software license file and a cloud computing operating system. The invention provides a software protection method which can overcome the defects of methods using a serial number, network authentication, hardware encryption and the like, can be widely applied to protection of software products, such as the cloud computing operating system and the like. [007] US20130097085, the publication of U.S. patent application 13/706,039 is directed to certifying genuine goods, such as, pharmaceuticals, from counterfeit ones. An apparatus is described for authentication of an item or a label by storing unique random serial numbers or codes in a remote secure storage that can be used to authenticate the item or the label, generating a pointer to each stored unique random serial number/code and storing the generated pointer(s) in a client data storage. During or prior to a production run of the item(s) or label(s), the generated pointer(s) are sent from the client data storage to one or more media devices, the generated pointer(s) are obtained from the media device using a post-content manager, the unique random serial number(s)/code(s) are obtained from the server via the post-content manager using the generated pointer(s), the obtained unique random serial number(s)/code(s) are sent to the media device, and the received unique random serial number(s)/code(s) are imprinted on the item(s) or the label(s) using the media device. [008] US2011153512, the publication of U.S. patent application 13/038,304, is also directed to detecting counterfeit pharmaceuticals. According to this publication, unique random serial numbers or codes are imprinted on labels. [009] CN103592875, the publication of Chinese patent application CN2013154881, is directed to a resource management system provided with a mobile terminal and applied 4 to a cloud file store comprising a compact shelf system, a file calling system, a server and the mobile terminal, wherein the server stores electronic files containing contents which are the same as the contents of the compact shelf system. [0010] There remains a need for improved methods of authenticating computing devices. SUMMARY OF THE INVENTION [0011] The present invention is broadly directed to a method and system for authenticating a computing device using a serial number. [0012] In a broad form, the present invention relates to a method and system in which a serial number is used to authenticate a computing device to allow access to centrally stored information. [0013] A preferred advantage of the method and device of the present invention is that the centrally stored information, or at least a subset thereof, is accessible to the computing device without a user log-in. [0014] In a first aspect, the present invention provides a method of accessing centrally stored electronic documentation or subset thereof on a remote computing device comprising: receiving a unique identification number from the remote computing device; sending a unique serial identification for storage on the remote computing device; sending a file listing available electronic documentation or subset thereof to the remote computing device in response to receipt of the unique serial identification from the remote computing device; sending a session token to the remote computing device in response to a request for the electronic documentation or subset thereof and the unique serial identification; and sending the electronic documentation or subset thereof for viewing and/or storage on the remote computing device to the remote computing device in response to receipt of a validated session token and a request for the electronic documentation or subset thereof. [0015] In a second aspect, the present invention provides a system for accessing 5 centrally stored electronic documentation or subset thereof on a remote computing device, the system comprising: the remote computing device for providing a unique identification number to a server computer; the server computer for sending a unique serial identification for storage on the remote computing device; the server computer for sending a file listing available electronic documentation or subset thereof to the remote computing device and for sending a session token to the remote computing device in response to a request for the electronic documentation or subset thereof and the unique serial identification; and the server computer for sending the electronic documentation or subset thereof for viewing and/or storage on the remote computing device to the remote computing device in response to receipt of a validated session token and a request for the electronic documentation or subset thereof. [0016] In a third aspect, the present invention provides a computer program product comprising: a computer usable medium and computer readable program code embodied on said computer usable medium for accessing centrally stored electronic documentation or subset thereof on a remote computing device, the computer readable code comprising: computer readable program code devices (i) configured to cause the remote computing device to send a unique identification number to a server computer; computer readable program code devices (ii) configured to cause the remote computing device to receive a unique serial identification from the server computer; computer readable program code devices (iii) configured to cause the remote computing device to receive a file listing available electronic documentation or subset thereof to the remote computing device in response to sending the unique serial identification to the server computer; and computer readable program code devices (iv) configured to cause the remote computing device to receive the electronic documentation or subset thereof for viewing and/or storage in response to receipt by the server computer of a request for the electronic documentation or subset thereof and a validated session token to thereby access the centrally stored electronic documentation or subset thereof on the remote 6 computing device. [0017] In one embodiment of any above aspect, the electronic documentation or subset thereof comprises emergency or other time-critical documentation. The emergency documentation or subset thereof may comprise evacuation protocols; safety data sheets; procedures and/or protocols; contact information; medical treatment information; building plans; surrounding services; and/or maps. [0018] The other time-critical documentation may comprise company procedures; company policies; rosters; work schedules; presentations; and/or training videos. [0019] The emergency or other time-critical documentation may also comprise documents for essential service providers such as, fire fighters; paramedics; truck drivers; miners; and/or security personal, including police. [0020] In another embodiment of any above aspect, when the electronic documentation is stored on the remote computing device it is encrypted. [0021] In yet another embodiment of any above aspect, the request for the electronic documentation or subset thereof comprises the unique serial identification. The unique serial identification comprised in the request may be entered by a user onto the remote computing device accessing the server computer or provided to the server computer by a user administrator. [0022] In another embodiment of any above aspect, the remote computing device comprises a personal computing device such as a smart phone or tablet. [0023] In yet another embodiment of any above aspect, the serial number may be associated with one or more access level. The access level may comprise selectable read and/or edit permission. [0024] In still another embodiment of any above aspect, the serial number may be used as an identification to permit direct communication between two or more remote personal computing devices. [0025] In another embodiment of any above aspect, the server computer or an associated database comprises a file log of all changes to the electronic documentation. [0026] The method and system may further comprise submitting the unique serial identification as a search term to determine which personal computing device has been used to delete or change the file system or subset thereof.
7 [0027] In one embodiment of any above aspect, the remote computing device is mounted on a wall in a factory or other workplace for ease of accessibility. [0028] In another embodiment of any above aspect, the unique serial identification is used to prevent editing of the electronic documentation by more than one remote computing device at the same time. When a second remote computing device tries to display a file comprised within the electronic documentation that is currently being edited by another remote computing device a notification is displayed on the second remote computing device. The notification may comprise: "Device A is currently editing file b), would you like to chat with Device A, read only or forcefully edit." The present inventor has created this process to ensure two devices or users are not in the same file at one time. [0029] In yet another embodiment of any above aspect, the unique serial identification may be added to a list of remote computing devices permitted to access the electronic documentation or subset thereof. [0030] In still another embodiment of any above aspect, the unique serial identification may be removed from the list to remove access permission for the remote computing device. [0031] Where the terms "comprise", comprises", "comprising", "include", "includes", "included" or "including" are used in this specification, they are to be interpreted as specifying the presence of the stated features, integers, steps or components referred to, but not to preclude the presence or addition of one or more other feature, integer, step, component or group thereof. [0032] Further, any prior art reference or statement provided in the specification is not to be taken as an admission that such art constitutes, or is to be understood as constituting, part of the common general knowledge. BRIEF DESCRIPTION OF THE FIGURES [0033] In order that the present invention may be readily understood and put into practical effect, reference will now be made to the accompanying illustrations, wherein like reference numerals refer to like features and wherein: [0034] Figure 1: is a flowchart showing one embodiment of a method according to the invention. [0035] Figures 2A and 2B: are block diagrams showing one embodiment of a computer 8 system suitable for use with the present invention; [0036] Figure 3: is a flowchart showing another embodiment of a method according to the invention. DETAILED DESCRIPTION OF THE INVENTION [0037] The present invention relates to a method and system for authenticating a computing device using a serial number. More particularly, this invention relates to a method and system in which a serial number is used to authenticate a computing device to allow access to centrally stored information. [0038] The invention is at least partly predicated on the inventor's novel and inventive application of a serial number to authenticate a remote computing device without requiring a log-in. The authentication may be used to provide access to electronic documentation or a subset of electronic documentation stored on a central server computer. [0039] In one suitable aspect, the invention contemplates the application of the method and systems of the invention to provide access to emergency or other time-critical electronic documentation stored on a central server. [0040] The electronic documentation or subset thereof may comprise emergency or other time-critical documentation. The emergency documentation may comprise evacuation protocols; safety data sheets; procedures and/or protocols; contact information; medical treatment information; building plans; surrounding services; and/or maps. The other time-critical documentation may comprise company procedures, logistics, share trading; or auction bidding documentation. [0041] The other time-critical documentation may comprise company procedures; company policies; rosters; work schedules; presentations; logistics; share trading; auction bidding documentation; and/or training videos. [0042] The electronic documentation or subset thereof may also comprise documents for essential service providers such as, fire fighters; paramedics; truck drivers; miners; and/or security personal, including police. [0043] As used herein "manufacturer serial number (MSN") refers to a unique code assigned for identification of a single unit. The MSN may comprise letters or other non numeric characters as well as numeric characters. [0044] The following description refers to specific embodiments of the present 9 invention and is in no way intended to limit the scope of the present invention to those specific embodiments. [0045] The present invention is of significant advantage because it allows the electronic documentation or subset thereof, such as, emergency data, to be stored for all employees to read. [0046] According to the present invention, the serial number is used to set restrictions on the files each personal computing device can and can't access. For example, Device A would like to access folder a), and can do so, with read-only permission setup by the Administrator. In contrast, Device B has permissions to read and edit folder a), so a user of Device B can enter the edit mode of the application and move files as they please. [0047] The Administrator may be the company document controller or an Information Technology professional acting on instructions from the company document controller. [0048] Also of considerable advantage, the present invention allows the use of the unique serial identification as an identification to permit direct communication between the users of the remote computing devices. The direct communication may comprise voice or text communication. In one suitable embodiment, the direct communication is text communication. [0049] The present invention may keep a file log of all changes submitted to the system. The file log may be stored in the server computer or an associated database. The serial number may then be used to perform a search for which personal computing device has been used to delete or change the file system or subset thereof. [0050] In one particular advantageous application, the remote computing device may be mounted on a wall in a factory or other workplace for ease of accessibility. [0051] The unique serial identification may also used when a user is accessing the electronic documentation or subset thereof to ensure another user is not editing the same file. For example, Device A enters file b) and commences editing. While Device B would also like to enter and edit file b), instead of allowing access, a notification is displayed on Device B. The notification may comprise: "Device A is currently editing file b), would you like to chat with Device A, read only or forcefully edit." The present inventor has created this process to ensure two devices or users are not in the same file at one time. [0052] The present invention is of particular advantage to companies because when a 10 limited number of devices are purchased and given to a remote employee, the company has the confidence that the employee has all the information they need, and it is available to that employee in their remote location or anywhere else with a suitable network connection. [0053] Advantageously, this allows company procedures and polices to be available to the employee at all times and in all relevant locations. As such, rosters and work schedules can be made available, as well as, presentations and training video distribution. [0054] The unique serial identification may also used to remove access permission for the remote computing device. In the case where a remote computing device is stolen, a company administrator, or other user with appropriate permission, can remove the device from the list of devices with access permission and this immediately removes the file system from the device. [0055] FIG. 1 shows a flowchart illustrating the steps according to one embodiment of the method 100 of the invention. Method 100 may be used as a cloud authentication system to validate smartphone, tablet or other networked devices. Method 100 provides a working database able to synchronise information to the correct devices without a traditional user login. [0056] In step 102, remote computing device 200 sends a request for access to electronic documentation or subset thereof along with a unique identification number to the server computer 291. [0057] The unique identification number may comprise a serial number from manufacture or any unique identification number depending on the make and type of the remote computing device 200. In one suitable embodiment, the unique identification number comprises the manufacturer serial number (MSN). In another embodiment, when remote computing device 200 is a smartphone or tablet comprising a subscriber identification module (SIM), the unique identification number may comprise the international mobile subscriber identity (IMSI) or the integrated circuit card identifier (ICCID). [0058] When the unique identification number is received by server computer 291, in step 104, server computer 291 creates a unique serial identification and sends it for storage on remote computing device 200. The unique serial identification may also be 11 stored on server computer 291, or an associated database, and thereafter linked with the particular remote computing device 200 identified with the received unique identification number. [0059] The unique serial identification may be created from the unique identification number. This ensures the unique serial identification number stays with remote computing device 200 for its entire life. [0060] In one embodiment, the unique serial identification comprises a randomly generated twenty-two digit sequence that may comprise letters, numbers and characters. Each of the twenty-two digits may be placed individually. [0061] In one specific embodiment, the unique serial identification number is created using a constant number, a time, a random number and random text. For example, the unique serial identification may be created by: taking a constant number (eg: $constantid = 60); appending current Unix timestamp ie, time() and a random number between 1000 and 9999 with that constant number, for example $serialID $constantid.time().mt rand(1000, 9999); and appending a random text of six characters with the previously generated $serialID. The created serial identification number may have a format such as: 60140625592317560HIWYK. [0062] The unique serial identification may then be displayed on the screen of the remote computing device 200. [0063] In step 106 (not shown) the unique serial identification may then be entered into the users website account. When the unique serial identification is received, in step 108 (not shown), server computer 291 may then issue the information template to the device (file list). This level of access only allows viewing and browsing the list of files that are authenticated to the remote computing device 200. [0064] When the user of a remote computing device 200 requests to enter a file, the method may go into a fetch session. In step 110, the request and the unique serial identification are sent to server computer 291. Then in step 112 the server computer 291 sends back a token (session authentication serial).
12 [0065] In step 114 (not shown), this token may be validated by the remote computing device 200 and then in step 116 sent back to the server with the request for the user file. In step 116, if the token is verified by server computer 291, the server computer 291 will retrieve the file request and send it to remote computing device 200. [0066] The file request may be retrieved from a database linked locally to the server computer 291 or cloud storage 295. [0067] As will be known to a person of skill in the art, "cloud storage" is a model of data storage where the digital data is stored in logical pools, the physical storage may span multiple servers and locations. The physical infrastructure that provides cloud storage is typically owned and managed by a hosting company. [0068] Method 100 may also include a step of downloading a computer application onto remote computing device 200. The computer application may comprise computer readable code comprising computer readable program code devices configured to cause the remote computing device 200 to carry out the steps of method 100. [0069] One embodiment of a remote computing device 200 suitable for use in the present invention is shown in Figs. 2A and 2B. In the embodiment shown, remote computing device 200 comprises a computer module 201 comprising input devices such as a keyboard 202, a mouse pointer device 203, a scanner 226, an external hard drive 227, and a microphone 280; and output devices including a printer 215, a display device 214 and loudspeakers 217. In embodiments in which remote computing device 200 comprises a smartphone or tablet or other similar device, video display 214 comprises a touchscreen and input devices such as a keyboard 202, a mouse pointer device 203, a scanner 226 may not be required. When video display 214 comprises a touchscreen, it is both an input and output device. [0070] A Modulator-Demodulator (Modem) transceiver device 216 may be used by the computer module 201 for communicating to and from a communications network 220 via a connection 221. The network 220 may be a wide-area network (WAN), such as the Internet, a cellular telecommunications network, or a private WAN. Through the network 220, computer module 201 may be connected to other similar personal devices 290 or server computers 291. Where the connection 221 is a telephone line, the modem 216 may be a traditional "dial-up" modem. Alternatively, where the connection 221 is a high capacity (e.g.: cable) connection, the modem 216 may be a broadband modem. In many cases, a wireless modem may be used for wireless connection to network 220.
13 [0071] The computer module 201 typically includes at least one processor 205, and a memory 206 for example formed from semiconductor random access memory (RAM) and semiconductor read only memory (ROM). The module 201 also includes a number of input/output (1/0) interfaces including: an audio-video interface 207 that couples to the video display 214, loudspeakers 217 and microphone 280; an 1/0 interface 213 for the keyboard 202, mouse 203, scanner 226 and external hard drive 227; and an interface 208 for the external modem 216 and printer 215. In some implementations, modem 216 may be incorporated within the computer module 201, for example within the interface 208. The computer module 201 also has a local network interface 211 which, via a connection 223, permits coupling of the remote computing device 200 to a local computer network 222, known as a Local Area Network (LAN). [0072] As also illustrated, local network 222 may also couple to the wide network 220 via a connection 224, which would typically include a so-called "firewall" device or device of similar functionality. The interface 211 may be formed by an Ethernet circuit card, a Bluetooth wireless arrangement or an IEEE 802.11 wireless arrangement or other suitable interface. [0073] The 1/0 interfaces 208 and 213 may afford either or both of serial and parallel connectivity, the former typically being implemented according to the Universal Serial Bus (USB) standards and having corresponding USB connectors (not illustrated). [0074] Storage devices 209 are provided and typically include a hard disk drive (HDD) 210. Other storage devices such as, an external HD 227, a disk drive (not shown) and a magnetic tape drive (not shown) may also be used. An optical disk drive 212 is typically provided to act as a non-volatile source of data. Portable memory devices, such optical disks (e.g.: CD-ROM, DVD, Blu-Ray Disc), USB-RAM, external hard drives and floppy disks for example may be used as appropriate sources of data to the remote computing device 200. Another source of data to remote computing device 200 is provided by the at least one server computer 291 through network 220. [0075] The components 205 to 213 of the computer module 201 typically communicate via an interconnected bus 204 in a manner that results in a conventional mode of operation of remote computing device 200. In the embodiment shown in FIGS. 2A and 2B, processor 205 is coupled to system bus 204 through connections 218. Similarly, memory 206 and optical disk drive 212 are coupled to the system bus 204 by connections 219. Examples of remote computing device 200 on which the described 14 arrangements can be practiced include IBM-PC's and compatibles, Sun Sparc stations, Apple computers; smart phones; tablet computers or like a device comprising a computer module like computer module 201. [0076] Fig. 2B is a detailed schematic block diagram of processor 205 and a memory 234. The memory 234 represents a logical aggregation of all the memory modules, including the storage device 209 and semiconductor memory 206, which can be accessed by the computer module 201 in Fig. 2A. [0077] The methods of the invention may be implemented using remote computing device 200 wherein the methods may be implemented as one or more software application programs 233 executable within computer module 201. In particular, the steps of the methods of the invention may be effected by instructions 231 in the software carried out within the computer module 201 [0078] The software instructions 231 may be formed as one or more code modules, each for performing one or more particular tasks. The software 233 may also be divided into two separate parts, in which a first part and the corresponding code modules performs the method 100 of the invention and a second part and the corresponding code modules manage a graphical user interface between the first part and the user. [0079] The software 233 may be stored in a computer readable medium, including in a storage device of a type described herein. The software is loaded into the remote computing device 200 from the computer readable medium or through network 221 or 223, and then executed by remote computing device 200. In one example, the software is stored on server computer 290 or cloud 295 and downloaded onto remote computing device 200 from server computer 291 through network 220 or from cloud 295. In another example the software 233 is stored on storage medium 225 that is read by optical disk drive 212. Software 233 is typically stored in the HDD 210 or the memory 206. [0080] A computer readable medium having such software 233 or computer program recorded on it is a computer program product. The use of the computer program product in the remote computing device 200 preferably effects a device or apparatus for implementing the method 100 of the invention. [0081] In some instances, the software application programs 233 may be supplied to the user encoded on one or more disk storage medium 225 such as a CD-ROM, DVD or 15 Blu-Ray disc, and read via the corresponding drive 212, or alternatively may be read by the user from the networks 220 or 222. Still further, the software can also be loaded into the remote computing device 200 from other computer readable media. Computer readable storage media refers to any non-transitory tangible storage medium that provides recorded instructions and/or data to the computer module 201 or remote computing device 200 for execution and/or processing. Examples of such storage media include floppy disks, magnetic tape, CD-ROM, DVD, Blu-ray Disc, a hard disk drive, a ROM or integrated circuit, USB memory, a magneto-optical disk, or a computer readable card such as a PCMCIA card and the like, whether or not such devices are internal or external of the computer module 201. Examples of transitory or non-tangible computer readable transmission media that may also participate in the provision of software application programs 233, instructions 231 and/or data to the computer module 201 include radio or infra-red transmission channels as well as a network connection 221, 223, 234, to another computer or networked device 290, 291 and the Internet or an Intranet including email transmissions and information recorded on Websites and the like. [0082] The second part of the application programs 233 and the corresponding code modules mentioned above may be executed to implement one or more graphical user interfaces (GUIs) to be rendered or otherwise represented upon display 214. Through manipulation of, typically, keyboard 202, mouse 203 and/or screen 214 when comprising a touchscreen, a user of remote computing device 200 and the methods of the invention may manipulate the interface in a functionally adaptable manner to provide controlling commands and/or input to the applications associated with the GUI(s). Other forms of functionally adaptable user interfaces may also be implemented, such as an audio interface utilizing speech prompts output via loudspeakers 217 and user voice commands input via microphone 280. The manipulations including mouse clicks, screen touches, speech prompts and/or user voice commands may be transmitted via network 220 or 222. [0083] When the computer module 201 is initially powered up, a power-on self-test (POST) program 250 may execute. The POST program 250 is typically stored in a ROM 249 of the semiconductor memory 206. A hardware device such as the ROM 249 is sometimes referred to as firmware. The POST program 250 examines hardware within the computer module 201 to ensure proper functioning, and typically checks processor 16 205, memory 234 (209, 206), and a basic input-output systems software (BIOS) module 251, also typically stored in ROM 249, for correct operation. Once the POST program 250 has run successfully, BIOS 251 activates hard disk drive 210. Activation of hard disk drive 210 causes a bootstrap loader program 252 that is resident on hard disk drive 210 to execute via processor 205. This loads an operating system 253 into RAM memory 206 upon which operating system 253 commences operation. Operating system 253 is a system level application, executable by processor 205, to fulfill various high level functions, including processor management, memory management, device management, storage management, software application interface, and generic user interface. [0084] Operating system 253 manages memory 234 (209, 206) in order to ensure that each process or application running on computer module 201 has sufficient memory in which to execute without colliding with memory allocated to another process. Furthermore, the different types of memory available in the remote computing device 200 must be used properly so that each process can run effectively. Accordingly, the aggregated memory 234 is not intended to illustrate how particular segments of memory are allocated, but rather to provide a general view of the memory accessible by computer module 201 and how such is used. [0085] Processor 205 includes a number of functional modules including a control unit 239, an arithmetic logic unit (ALU) 240, and a local or internal memory 248, sometimes called a cache memory. The cache memory 248 typically includes a number of storage registers 244, 245, 246 in a register section storing data 247. One or more internal busses 241 functionally interconnect these functional modules. The processor 205 typically also has one or more interfaces 242 for communicating with external devices via the system bus 204, using a connection 218. The memory 234 is connected to the bus 204 by connection 219. [0086] Application program 233 includes a sequence of instructions 231 that may include conditional branch and loop instructions. Program 233 may also include data 232 which is used in execution of the program 233. The instructions 231 and the data 232 are stored in memory locations 228, 229, 230 and 235, 236, 237, respectively. Depending upon the relative size of the instructions 231 and the memory locations 228 230, a particular instruction may be stored in a single memory location as depicted by the instruction shown in the memory location 230. Alternately, an instruction may be 17 segmented into a number of parts each of which is stored in a separate memory location, as depicted by the instruction segments shown in the memory locations 228 and 229. [0087] In general, processor 205 is given a set of instructions 243 which are executed therein. The processor 205 then waits for a subsequent input, to which processor 205 reacts by executing another set of instructions. Each input may be provided from one or more of a number of sources, including data generated by one or more of the input devices 202, 203, or 214 when comprising a touchscreen, data received from an external source across one of the networks 220, 222, data retrieved from one of the storage devices 206, 209 or data retrieved from a storage medium 225 inserted into the corresponding reader 212. The execution of a set of the instructions may in some cases result in output of data. Execution may also involve storing data or variables to the memory 234. [0088] The disclosed arrangements use input variables 254 that are stored in the memory 234 in corresponding memory locations 255, 256, 257, 258. The described arrangements produce output variables 261 that are stored in the memory 234 in corresponding memory locations 262, 263, 264, 265. Intermediate variables 268 may be stored in memory locations 259, 260, 266 and 267. [0089] The register section 244, 245, 246, the arithmetic logic unit (ALU) 240, and the control unit 239 of the processor 205 work together to perform sequences of micro operations needed to perform "fetch, decode, and execute" cycles for every instruction in the instruction set making up the program 233. Each fetch, decode, and execute cycle comprises: (a) a fetch operation, which fetches or reads an instruction 231 from memory location 228, 229, 230; (b) a decode operation in which control unit 239 determines which instruction has been fetched; and (c) an execute operation in which the control unit 239 and/or the ALU 240 execute the instruction. [0090] Thereafter, a further fetch, decode, and execute cycle for the next instruction may be executed. Similarly, a store cycle may be performed by which the control unit 239 stores or writes a value to a memory location 232. [0091] Each step or sub-process in the methods of the invention may be associated with 18 one or more segments of the program 233, and may be performed by register section 244-246, the ALU 240, and the control unit 239 in the processor 205 working together to perform the fetch, decode, and execute cycles for every instruction in the instruction set for the noted segments of program 233. [0092] One or more other remote computing devices 290 may be connected to the communications network 220 as seen in Fig. 2A. Each such computer 290 may have a similar configuration to the computer module 201 and corresponding peripherals. [0093] One or more other server computer 291 may be connected to the communications network 220. These server computers 291 may respond to requests from the remote computing device 200 or other server computers to provide information. [0094] As shown in FIG. 2A, server computer 291, is connected, via connection 294, to cloud storage 295. The cloud storage may be used to store the electronic documentation or subset thereof. [0095] Method 100 may alternatively be implemented in dedicated hardware such as one or more integrated circuits performing the functions or sub functions of the described methods. Such dedicated hardware may include graphic processors, digital signal processors, or one or more microprocessors and associated memories. [0096] This method and system 200 allows the storage of electronic documentation or subset thereof, such as emergency procedures and safety data sheets, on a remote computing device 200 without user authentication. When the electronic documentation or subset thereof is sent to and stored on remote computing device 200, it may be encrypted so it can not be accessed using other applications running on device 200. [0097] The data is secure to keep on a server 291 or cloud 295 and accessible at the same time to the employees that need it, for example in an emergency. The authentication process of the present invention may be used right across the world to ensure employees have access to current emergency data within their work place. [0098] So that the invention may be readily understood and put into practical effect, the following non-limiting Examples are provided. EXAMPLES [0099] FIG. 3 shows a flowchart illustrating one embodiment of the implementation 300 of the present invention. In this example, implementation 300 begins with sign-up 301 19 which may include selection 302 of a package option. After this, a registration form may be completed 304 to allow access 305 to the customer user administration panel. [00100] The method 100 of the invention may be carried out as part of the device management 310. As shown, remote computing device 200 is provided with a unique serial identification. [00101] Device management 310 also allows the addition 311 of devices. The devices, including remote computing device 200, that may access the electronic documentation or subset thereof stored in a remote storage server administered by a third party. [00102] Throughout the specification the aim has been to describe the preferred embodiments of the invention without limiting the invention to any one embodiment or specific collection of features. It will therefore be appreciated by those of skill in the art that, in light of the instant disclosure, various modifications and changes can be made in the particular embodiments exemplified without departing from the scope of the present invention.
Claims (20)
1. A method of accessing centrally stored electronic documentation or subset thereof on a remote computing device comprising: receiving a unique identification number from the remote computing device; sending a unique serial identification for storage on the remote computing device; sending a file listing available electronic documentation or subset thereof to the remote computing device in response to receipt of the unique serial identification from the remote computing device; sending a session token to the remote computing device in response to a request for the electronic documentation or subset thereof and the unique serial identification; and sending the electronic documentation or subset thereof for viewing and/or storage on the remote computing device to the remote computing device in response to receipt of a validated session token and a request for the electronic documentation or subset thereof.
2. A system for accessing centrally stored electronic documentation or subset thereof on a remote computing device comprising: the remote computing device for providing a unique identification number to a server computer; the server computer for sending a unique serial identification for storage on the remote computing device; the server computer for sending a file listing available electronic documentation or subset thereof to the remote computing device and for sending a session token to the remote computing device in response to a request for the electronic documentation or subset thereof and the unique serial identification; and the server computer for sending the electronic documentation or subset thereof for viewing and/or storage on the remote computing device to the remote computing device in response to receipt of a validated session token and a request for the electronic 21 documentation or subset thereof.
3. A computer program product comprising: a computer usable medium and computer readable program code embodied on said computer usable medium for accessing centrally stored electronic documentation or subset thereof on a remote computing device, the computer readable code comprising: computer readable program code devices (i) configured to cause the remote computing device to send a unique identification number to a server computer; computer readable program code devices (ii) configured to cause the remote computing device to receive a unique serial identification from the server computer; computer readable program code devices (iii) configured to cause the remote computing device to receive a file listing available electronic documentation or subset thereof to the remote computing device in response to sending the unique serial identification to the server computer; and computer readable program code devices (iv) configured to cause the remote computing device to receive the electronic documentation or subset thereof for viewing and/or storage in response to receipt by the server computer of a request for the electronic documentation or subset thereof and a validated session token to thereby access the centrally stored electronic documentation or subset thereof on the remote computing device.
4. The method, system or computer program product according to any one of the preceding Claims wherein the electronic documentation or subset thereof comprises emergency or other time-critical documentation.
5. The method, system or computer program product according to any Claim 4 wherein the emergency documentation or subset thereof comprises evacuation protocols; safety data sheets; procedures and/or protocols; contact information; medical treatment information; building plans; surrounding services; and/or maps.
6. The method, system or computer program product according to Claim 4 wherein the other time-critical documentation comprises company procedures; company policies; rosters; work schedules; presentations; and/or training videos.
7. The method, system or computer program product according to Claim 4 wherein the emergency or other time-critical documentation also comprises documents for essential service providers such as, fire fighters; paramedics; truck drivers; miners; 22 and/or security personal, including police.
8. The method, system or computer program product according to any one of the preceding Claims wherein when the electronic documentation is stored on the remote computing device it is encrypted.
9. The method, system or computer program product according to any one of the preceding Claims wherein the request for the electronic documentation or subset thereof comprises the unique serial identification.
10. The method, system or computer program product according to Claim 9 wherein the unique serial identification comprised in the request is entered by a user onto the remote computing device accessing the server computer.
11. The method, system or computer program product according to any one of the preceding Claims wherein the remote computing device comprises a personal computing device.
12. The method, system or computer program product according to any one of the preceding Claims wherein the serial number is associated with one or more access level.
13. The method, system or computer program product according to Claim 12 wherein the access level comprises selectable read and/or edit permission.
14. The method, system or computer program product according to any one of the preceding Claims wherein the serial number is used as an identification to permit direct communication between two or more remote personal computing devices.
15. The method, system or computer program product according to any one of the preceding Claims wherein the server computer or an associated database comprises a file log of all changes to the electronic documentation.
16. The method, system or computer program product according to any one of the preceding Claims further comprising submitting the unique serial identification as a search term to determine which personal computing device has been used to delete or change the file system or subset thereof.
17. The method, system or computer program product according to any one of the preceding Claims wherein the remote computing device is mounted on a wall in a factory or other workplace for ease of accessibility.
18. The method, system or computer program product according to any one of the 23 preceding Claims wherein the unique serial identification is used to prevent editing of the electronic documentation by more than one remote computing device at the same time.
19. The method, system or computer program product according to any one of the preceding Claims wherein the unique serial identification may be added to a list of remote computing devices permitted to access the electronic documentation or subset thereof.
20. The method, system or computer program product according to any one of the preceding Claims wherein the unique serial identification may be removed from the list to remove access permission for the remote computing device.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2015243008A AU2015243008A1 (en) | 2014-10-14 | 2015-10-14 | Authentication of remote computing device using serial number |
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2014904107 | 2014-10-14 | ||
| AU2014904107A AU2014904107A0 (en) | 2014-10-14 | Authentication of remote computing device using serial number | |
| AU2015243008A AU2015243008A1 (en) | 2014-10-14 | 2015-10-14 | Authentication of remote computing device using serial number |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU2015243008A1 true AU2015243008A1 (en) | 2016-04-28 |
Family
ID=55856236
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2015243008A Abandoned AU2015243008A1 (en) | 2014-10-14 | 2015-10-14 | Authentication of remote computing device using serial number |
Country Status (1)
| Country | Link |
|---|---|
| AU (1) | AU2015243008A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113282908A (en) * | 2020-02-19 | 2021-08-20 | 网联科技股份有限公司 | Validity verification method |
-
2015
- 2015-10-14 AU AU2015243008A patent/AU2015243008A1/en not_active Abandoned
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113282908A (en) * | 2020-02-19 | 2021-08-20 | 网联科技股份有限公司 | Validity verification method |
| CN113282908B (en) * | 2020-02-19 | 2024-06-25 | 网联科技股份有限公司 | Validity verification method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20240223554A1 (en) | First factor contactless card authentication system and method | |
| US11627129B2 (en) | Method and system for contextual access control | |
| US8544072B1 (en) | Single sign-on service | |
| US10754941B2 (en) | User device security manager | |
| US9672336B1 (en) | Security system for verification of user credentials | |
| EP3937040B1 (en) | Systems and methods for securing login access | |
| US20100274859A1 (en) | Method And System For The Creation, Management And Authentication Of Links Between Entities | |
| CN109241726B (en) | User authority control method and device | |
| CN113661699B (en) | System and method for pre-authentication of customer support calls | |
| US20100042847A1 (en) | Method for authentication using one-time identification information and system | |
| US10594685B2 (en) | User selected key authentication | |
| US20150281230A1 (en) | Method and system for using a vibration signature as an authentication key | |
| CN112039826A (en) | Login method and device applied to applet terminal | |
| US12250317B2 (en) | Passkey integration techniques for identity management | |
| US20190347441A1 (en) | Patient privacy de-identification in firewall switches forming VLAN segregation | |
| US10652241B1 (en) | Dynamic and secure coupling between auxiliary devices and endpoint resources | |
| US12443968B2 (en) | System and methods for universal identification and passport management | |
| KR20180034199A (en) | Unified login method and system based on single sign on service | |
| US20140090032A1 (en) | System and method for real time secure image based key generation using partial polygons assembled into a master composite image | |
| AU2015243008A1 (en) | Authentication of remote computing device using serial number | |
| US8955070B2 (en) | Controlled password modification method and apparatus | |
| WO2023283542A1 (en) | User authentication | |
| CN114978552B (en) | Security management method, device, equipment and medium of mailbox verification code | |
| CN119989409A (en) | Report processing method, device, computer equipment and storage medium | |
| HK40105711A (en) | System and method for second factor authentication of customer support calls |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MK1 | Application lapsed section 142(2)(a) - no request for examination in relevant period |