×

Networked device authentication, pairing and resource sharing

  • US 10,104,183 B2
  • Filed: 06/22/2010
  • Issued: 10/16/2018
  • Est. Priority Date: 06/22/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method of pairing a first computing device to a second computing device, comprising:

  • a) receiving an indication to pair the first computing device with the second computing device, said indication based on a contextual circumstance defined for the first and second computing devices, said indication to pair the first computing device with the second computing device generated automatically upon an occurrence of the contextual circumstance without a user initiating the indication to pair, the contextual circumstance comprising detecting concurrent instances of the same application running on the first and second computing devices, wherein said receiving further comprises receiving an indication of parameters to be associated with the pairing of the first computing device with the second computing device, the parameters including an access control list specifying at least one of;

    types of computing devices allowed to pair with one of the first computing device or the second computing device, identifications of computing devices allowed to pair with one of the first computing device or the second computing device, or user identities allowed to pair with one of the first computing device or the second computing device;

    b) negotiating the pairing of the first computing device with the second computing device, the negotiating including receiving an identification of at least one of the user and the first computing device and receiving an authentication authenticating an association of the user with the first computing device;

    c) granting the first computing device access to secure resources available to the second computing device if the identification and authentication of said step b) verify an association between the user and the first computing device, wherein content accessible via the secure resources is displayed via a user interface that is divided between the first computing device and the second computing device; and

    d) denying the first computing device access to secure resources available to the second computing device if the identification and authentication of said step b) fail to verify an association between the user and the first computing device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×