Method and apparatus for enabling context awareness in a wireless system
First Claim
Patent Images
1. A wireless device comprising:
- at least one biometric sensor to obtain biometric information about a user presently holding said wireless device when said wireless device is being held;
a biometric authentication unit to determine, based on said biometric information, whether said user presently holding said wireless device is authorized to use said wireless device;
a wireless transceiver to support wireless communication with a remote entity; and
a controller to control operation of said wireless device, wherein said controller is programmed to change operational characteristics of said wireless device based on whether said wireless device is presently being held.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques and structures are disclosed for implementing context awareness within a wireless system.
99 Citations
60 Claims
-
1. A wireless device comprising:
-
at least one biometric sensor to obtain biometric information about a user presently holding said wireless device when said wireless device is being held;
a biometric authentication unit to determine, based on said biometric information, whether said user presently holding said wireless device is authorized to use said wireless device;
a wireless transceiver to support wireless communication with a remote entity; and
a controller to control operation of said wireless device, wherein said controller is programmed to change operational characteristics of said wireless device based on whether said wireless device is presently being held. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
sensing that a wireless device has been picked up by a user;
determining, after sensing that said wireless device has been picked up, whether said user is authorized to use said wireless device based on collected biometric information; and
when said user is determined to be authorized to use said wireless device, requesting access to a network via a wireless link. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A method comprising:
-
sensing that a wireless device is no longer being held by a user; and
dropping user authentication and network authorization for the device, if any, based on said device no longer being held. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29. A method comprising:
-
detecting unauthorized use of a wireless device;
determining, in response to detecting, whether said wireless device has been reported lost or stolen; and
when said wireless device is determined to have been reported lost or stolen;
determining a location of said wireless device; and
when said location of said wireless device is not an expected location, backing up data from said wireless device to a remote location. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A system comprising:
-
a network access authorization unit to manage network access authorization for wireless devices in a network;
an equipment identity register (EIR) to maintain a list of wireless devices that have been reported lost or stolen, said EIR being accessible by said network access authorization unit;
a backup server to manage data backups for wireless devices in said network; and
a mobile location server (MLS) to track locations of wireless devices in said network;
wherein said network access authorization unit is configured to determine whether a first wireless device has been reported lost or stolen when unauthorized use of said first wireless device has been detected and to determine a location of said first wireless device when it is determined that said first wireless device has been reported lost or stolen. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45)
-
-
46. An article comprising a storage medium having instructions stored thereon that, when executed by a computing platform, operate to:
-
sense that a wireless device has been picked up by a user;
determine, after sensing that said wireless device has been picked up, whether said user is authorized to use said wireless device based on collected biometric information; and
when said user is determined to be authorized to use said wireless device, request access to a network via a wireless link. - View Dependent Claims (47, 48, 49, 50)
-
-
51. An article comprising a storage medium having instructions stored thereon that, when executed by a computing platform, operate to:
-
sense that a wireless device is no longer being held by a user; and
drop user authentication and network access for the wireless device, if any, based on said wireless device no longer being held. - View Dependent Claims (52, 53, 54, 55, 56)
-
-
57. A wireless device comprising:
-
at least one biometric sensor to obtain biometric information about a user presently holding said wireless device when said wireless device is being held;
a biometric authentication unit to determine, based on said biometric information, whether said user presently holding said wireless device is authorized to use said wireless device;
a wireless transceiver to support wireless communication with a remote entity;
a controller to control operation of said wireless device, wherein said controller is programmed to change operational characteristics of said wireless device based on whether said wireless device is presently being held; and
at least one dipole antenna coupled to said wireless transceiver to provide a transition to free space. - View Dependent Claims (58, 59, 60)
-
Specification