System and method for providing secured access to mobile devices
First Claim
Patent Images
1. A method of providing access to information accessible by a mobile device, comprising:
- interrogating an authentication device;
communicating an authentication data from the authentication device to the mobile device;
verifying the authentication data at the mobile device; and
permitting access to the information accessible by the mobile device when the communicated authentication data is recognized by the mobile device.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing secured access of a mobile device is disclosed herein. Access to data included in the mobile device is permitted when the presence of an authentication device having the proper authentication information is received by the mobile device.
-
Citations
26 Claims
-
1. A method of providing access to information accessible by a mobile device, comprising:
-
interrogating an authentication device;
communicating an authentication data from the authentication device to the mobile device;
verifying the authentication data at the mobile device; and
permitting access to the information accessible by the mobile device when the communicated authentication data is recognized by the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for providing authorized access to data contained within a mobile device, comprising:
-
a transceiver; and
a processor in communication with the transceiver, wherein access to the data contained within the mobile device is permitted when the transceiver receives an authorization request from the mobile device, the processor provides an authorization data to the transceiver for transmission to the mobile device, and the mobile device recognizes the transmitted authorization data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for providing selective access to data, comprising:
-
a first device configured to include the data; and
a second device proximate to the first device, the first device configured to communicate a first signal and the second device configured to communicate a second signal, wherein the first signal received and recognized by the second device and the second signal received and recognized by the first device permit a user to access the data included in the first device. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A process for preventing unauthorized access of a first device, comprising:
-
detecting the presence of a second device;
verifying a signal communicated from the second device; and
permitting access of data included in the first device when the signal is acceptable at the first device. - View Dependent Claims (25, 26)
-
Specification