×

Bluetooth device as security access key

  • US 10,362,484 B2
  • Filed: 07/17/2017
  • Issued: 07/23/2019
  • Est. Priority Date: 06/27/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for directing a remote computing device to execute a first operation, the method comprising, at an electronic key:

  • detecting an identity of the remote computing device;

    retrieving, from a set of preference data stored on the electronic key, a first subset of preference data based at least in part on the identity, wherein the set of preference data comprises different subsets of preference data for a plurality of different remote computing devices;

    retrieving authentication information for the electronic key based on the identity, wherein the authentication information is stored on the electronic key and corresponds to the identity;

    transmitting, to the remote computing device, a first public key associated with the electronic key;

    receiving, from the remote computing device, a second public key associated with the remote computing device;

    generating an encryption key based on (1) the second public key associated with the remote computing device, and (2) a private key that is a counterpart to the first public key associated with the electronic key;

    establishing a secure communication channel with the remote computing device based on the encryption key, wherein the remote computing device is operating in accordance with a first state;

    responsive to establishing the secure communication channel with the remote computing device based on the encryption key, communicating, to the remote computing device over the secure communication channel, the first subset and the authentication information, wherein the remote computing device authenticates the electronic key using the authentication information and executes the first operation based at least in part on the first subset to cause the remote computing device to operate in accordance with a second state that is distinct from the first state; and

    terminating the secure communication channel with the remote computing device to cause the remote computing device to restore operating in accordance with the first state.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×