User authentication via a mobile telephone
First Claim
Patent Images
1. A method to authenticate a user via a mobile phone, comprising:
- identifying a short-range wireless network associated with a system, the system comprising one or more user accounts;
switching from a mobile phone mode to a system mode; and
transmitting via the short-range wireless network, an identifier associated with the mobile phone, thereby causing a particular one of the user accounts to be activated.
2 Assignments
0 Petitions
Accused Products
Abstract
A mobile telephone automatically establishes communication with a system via a short-range wireless network. When communication is established, the mobile telephone user is automatically logged in to the system. The system can then apply personalized settings and/or provide access to personalized services based on the mobile telephone user'"'"'s system account. Once communication between the mobile telephone and the system is established, the mobile telephone may be used as a remote control device to control operation of the system.
-
Citations
20 Claims
-
1. A method to authenticate a user via a mobile phone, comprising:
-
identifying a short-range wireless network associated with a system, the system comprising one or more user accounts;
switching from a mobile phone mode to a system mode; and
transmitting via the short-range wireless network, an identifier associated with the mobile phone, thereby causing a particular one of the user accounts to be activated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A mobile telephone, comprising:
-
a wireless telecommunications network interface configured to enable the mobile telephone to communicate with other telephones via a wireless telecommunications network;
a short-range wireless transmitter configured to enable the mobile telephone to communicate with a system via a short-range wireless network; and
a data store configured to maintain system identifiers and associated security keys such that a security key can be automatically transmitted from the mobile telephone to a system to facilitate user authentication to the system. - View Dependent Claims (13, 14)
-
-
15. One or more computer-readable media comprising computer-executable instructions that, when executed, direct a computer system to:
-
publish a system identifier via a short-range wireless network;
receive a security key and a mobile telephone identifier via the short-range wireless network;
authenticate the security key;
identify a user ID based on the mobile telephone identifier; and
perform a login process using the user ID to automatically login a user associated with a mobile telephone having the mobile telephone identifier. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification