Wireless networking-enabled personal identification system
First Claim
1. A method for conserving power at a personal identification device, the method comprising:
- determining, by the personal identification device, to perform an encryption operation;
determining the personal identification device will consume an amount of power greater than a power threshold to perform the encryption operation;
determining the personal identification device can wirelessly communicate with a first device that is capable of performing the encryption operation;
receiving, by the personal identification device, a beacon message from a second device;
delegating, by the personal identification device, the encryption operation to the first device based, at least in part, on determining the personal identification device will consume the amount of power that is greater than the power threshold to perform the encryption operation, the first device located proximate to the personal identification device within a range for wireless communications;
providing, by the personal identification device, authentication data to the first device for encrypting the authentication data;
receiving, by the personal identification device, encrypted authentication data from the first device after the first device performs the encryption operation; and
responsive to receiving the beacon message and the encrypted authentication data, providing, by the personal identification device, the encrypted authentication data received from the first device to the second device for authentication of the personal identification device.
1 Assignment
0 Petitions
Accused Products
Abstract
A personal identification device may conserve power by delegating one or more operations to another device. For example, the one or more operations may be associated with the authentication of the personal identification device. In one example, the personal identification device may determine an amount of power greater than a power threshold will be consumed by the personal identification device to perform the one or more operations. The personal identification device may determine it can communicate with a mobile device that is capable of performing the one or more operations, and may then delegate the one or more operations to the mobile device to conserve power. In one example, the personal identification device may receive the results of the one or more operations from the mobile device, and may provide data associated with the results to a personal identification device detector for authentication of the personal identification device.
33 Citations
12 Claims
-
1. A method for conserving power at a personal identification device, the method comprising:
-
determining, by the personal identification device, to perform an encryption operation; determining the personal identification device will consume an amount of power greater than a power threshold to perform the encryption operation; determining the personal identification device can wirelessly communicate with a first device that is capable of performing the encryption operation; receiving, by the personal identification device, a beacon message from a second device; delegating, by the personal identification device, the encryption operation to the first device based, at least in part, on determining the personal identification device will consume the amount of power that is greater than the power threshold to perform the encryption operation, the first device located proximate to the personal identification device within a range for wireless communications; providing, by the personal identification device, authentication data to the first device for encrypting the authentication data; receiving, by the personal identification device, encrypted authentication data from the first device after the first device performs the encryption operation; and responsive to receiving the beacon message and the encrypted authentication data, providing, by the personal identification device, the encrypted authentication data received from the first device to the second device for authentication of the personal identification device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A personal identification device comprising:
-
a memory; and a processor coupled with the memory, the processor configured to; determine to perform an encryption operation; determine the personal identification device will consume an amount of power greater than a power threshold to perform the encryption operation; determine the personal identification device can wirelessly communicate with a first device that is capable of performing the encryption operation; receive a beacon message from a second device; delegate the encryption operation to the first device based, at least in part, on a determination that the personal identification device will consume the amount of power that is greater than the power threshold to perform the encryption operation, the first device located proximate to the personal identification device within a range for wireless communications; provide authentication data to the first device for encrypting the authentication data; receive encrypted authentication data from the first device after the first device performs the encryption operation; and responsive to receipt of the beacon message and the encrypted authentication data, provide the encrypted authentication data received from the first device to the second device for authentication of the personal identification device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory machine-readable storage medium having instructions stored therein, which when executed by one or more processors of a personal identification device cause the personal identification device to:
- determine to perform an encryption operation;
determine the personal identification device will consume an amount of power greater than a power threshold to perform the encryption operation; determine the personal identification device can wirelessly communicate with a first device that is capable of performing the encryption operation; receive a beacon message from a second device; delegate the encryption operation to the first device based, at least in part, on determining the personal identification device will consume the amount of power that is greater than the power threshold to perform the encryption operation, the first device located proximate to the personal identification device within a range for wireless communications; provide authentication data to the first device for encrypting the authentication data; receive encrypted authentication data from the first device after the first device performs the encryption operation; and responsive to receipt of the beacon message and the encrypted authentication data, provide the encrypted authentication data received from the first device to the second device for authentication of the personal identification device. - View Dependent Claims (12)
- determine to perform an encryption operation;
Specification