Bluetooth device as security access key
First Claim
1. A method for directing a remote computing device to execute a first operation, the method comprising, at an electronic key:
- detecting an identity of the remote computing device;
retrieving, from a set of preference data stored on the electronic key, a first subset of preference data based at least in part on the identity, wherein the set of preference data comprises different subsets of preference data for a plurality of different remote computing devices;
retrieving authentication information for the electronic key based on the identity, wherein the authentication information is stored on the electronic key and corresponds to the identity;
transmitting, to the remote computing device, a first public key associated with the electronic key;
receiving, from the remote computing device, a second public key associated with the remote computing device;
generating an encryption key based on (1) the second public key associated with the remote computing device, and (2) a private key that is a counterpart to the first public key associated with the electronic key;
establishing a secure communication channel with the remote computing device based on the encryption key, wherein the remote computing device is operating in accordance with a first state;
responsive to establishing the secure communication channel with the remote computing device based on the encryption key, communicating, to the remote computing device over the secure communication channel, the first subset and the authentication information, wherein the remote computing device authenticates the electronic key using the authentication information and executes the first operation based at least in part on the first subset to cause the remote computing device to operate in accordance with a second state that is distinct from the first state; and
terminating the secure communication channel with the remote computing device to cause the remote computing device to restore operating in accordance with the first state.
0 Assignments
0 Petitions
Accused Products
Abstract
This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the communications circuitry. When a host device is within the personal area network, the key may transmit data received by a transceiver on the host device. In response to receiving the data, the host device may perform an operation (e.g., an authentication operation). In some embodiments, the key may transmit data identifying an operation for the host device to perform. In some embodiments, the host device may store in memory key identification information and an associated operation which may be retrieved when the key is brought in proximity of the host device.
36 Citations
20 Claims
-
1. A method for directing a remote computing device to execute a first operation, the method comprising, at an electronic key:
-
detecting an identity of the remote computing device; retrieving, from a set of preference data stored on the electronic key, a first subset of preference data based at least in part on the identity, wherein the set of preference data comprises different subsets of preference data for a plurality of different remote computing devices; retrieving authentication information for the electronic key based on the identity, wherein the authentication information is stored on the electronic key and corresponds to the identity; transmitting, to the remote computing device, a first public key associated with the electronic key; receiving, from the remote computing device, a second public key associated with the remote computing device; generating an encryption key based on (1) the second public key associated with the remote computing device, and (2) a private key that is a counterpart to the first public key associated with the electronic key; establishing a secure communication channel with the remote computing device based on the encryption key, wherein the remote computing device is operating in accordance with a first state; responsive to establishing the secure communication channel with the remote computing device based on the encryption key, communicating, to the remote computing device over the secure communication channel, the first subset and the authentication information, wherein the remote computing device authenticates the electronic key using the authentication information and executes the first operation based at least in part on the first subset to cause the remote computing device to operate in accordance with a second state that is distinct from the first state; and terminating the secure communication channel with the remote computing device to cause the remote computing device to restore operating in accordance with the first state. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An electronic key, comprising:
-
at least one processor; and at least one memory configured to store instructions that, when executed by the at least one processor, cause the electronic key to; detect an identity of a remote computing device; retrieve, from a set of preference data stored on the electronic key, a first subset of preference data based at least in part on the identity, wherein the set of preference data comprises different subsets of preference data for a plurality of different remote computing devices; retrieve authentication information for the electronic key based on the identity, wherein the authentication information is stored on the electronic key and corresponds to the identity of the remote computing device; transmit, to the remote computing device, a first public key associated with the electronic key; receive, from the remote computing device, a second public key associated with the remote computing device; generate an encryption key based on (1) the second public key associated with the remote computing device, and (2) a private key that is a counterpart to the first public key associated with the electronic key; establish a secure communication channel with the remote computing device based on the encryption key, wherein the remote computing device is operating in accordance with a first state; responsive to establishing the secure communication channel with the remote computing device based on the encryption key, communicate, to the remote computing device over the secure communication channel, the first subset and the authentication information, wherein the remote computing device authenticates the electronic key using the authentication information and executes a first operation based at least in part on the first subset to cause the remote computing device to operate in accordance with a second state that is distinct from the first state; and terminate the secure communication channel with the remote computing device to cause the remote computing device to restore operating in accordance with the first state. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one non-transitory machine-readable storage medium storing instructions that, when executed by at least one processor included in an electronic key, cause the electronic key to carry out steps that include:
-
detecting an identity of a remote computing device; retrieving, from a set of preference data stored on the electronic key, a first subset of preference data based at least in part on the identity, wherein the set of preference data comprises different subsets of preference data for a plurality of different remote computing devices; retrieving authentication information for the electronic key based on the identity, wherein the authentication information is stored on the electronic key and corresponds to the identity of the remote computing device; transmitting, to the remote computing device, a first public key associated with the electronic key; receiving, from the remote computing device, a second public key associated with the remote computing device; generating an encryption key based on (1) the second public key associated with the remote computing device, and (2) a private key that is a counterpart to the first public key associated with the electronic key; establishing a secure communication channel with the remote computing device based on the encryption key, wherein the remote computing device is operating in accordance with a first state; responsive to establishing the secure communication channel with the remote computing device based on the encryption key, communicating, to the remote computing device over the secure communication channel, the first subset and the authentication information, wherein the remote computing device authenticates the electronic key using the authentication information and executes a first operation based at least in part on the first subset to cause the remote computing device to operate in accordance with a second state that is distinct from the first state; and terminating the secure communication channel with the remote computing device to cause the remote computing device to restore operating in accordance with the first state. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification