Bluetooth device as security access key
First Claim
1. A system for directing a host device to perform an operation, comprising:
- a key comprising communications circuitry operative to automatically transmit an instruction; and
a host device operative to receive the instruction and perform an authentication operation when the key is brought in a communications proximity of the host device.
1 Assignment
0 Petitions
Accused Products
Abstract
This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the communications circuitry. When a host device is within the personal area network, the key may transmit data received by a transceiver on the host device. In response to receiving the data, the host device may perform an operation (e.g., an authentication operation). In some embodiments, the key may transmit data identifying an operation for the host device to perform. In some embodiments, the host device may store in memory key identification information and an associated operation which may be retrieved when the key is brought in proximity of the host device.
-
Citations
31 Claims
-
1. A system for directing a host device to perform an operation, comprising:
-
a key comprising communications circuitry operative to automatically transmit an instruction; and a host device operative to receive the instruction and perform an authentication operation when the key is brought in a communications proximity of the host device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for providing access to a restricted-access device, comprising:
-
a key comprising communications circuitry; and a host device comprising a processor, wherein the processor is operative to; automatically identify the key when the key is brought in proximity of the host device; automatically authenticate the key; identify an operation associated with the key; and perform the identified operation. - View Dependent Claims (12)
-
-
13. For use in connection with a host device having key engagement and key disengagement modes, a key comprising circuitry operative to:
-
engage the host device when within wireless communications range of the host device; when engaged with the host device, transmit data that causes the host device to automatically enter into the key engagement mode; and disengage the host device when not within wireless communications range of the host device, thereby causing the host device to enter into the key disengagement mode. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A host device for performing an operation when the host device is within a personal area network created by a key, the host device comprising a transceiver, memory and a processor, the processor operative to:
-
determine that the host device is within the personal area network created by the key; and in response to determining that the host device is within the personal area network of the key, automatically perform an authentication operation. - View Dependent Claims (19, 20, 21)
-
-
22. A method for directing a host device to perform an operation when the host device is within a personal area network created by a key, comprising:
-
creating a personal area network with a key; determining that a host device is within the personal area network; providing access to the host device when the host device is determined to be within the personal area network; directing the host device to automatically perform an operation when the host device is determined to be within the personal area network; and locking access to the host device when the host device is determined not to be within the personal area network. - View Dependent Claims (23, 24, 25)
-
-
26. A host device for loading a user'"'"'s profile when the host device is within a personal area network created by a user'"'"'s key, the host device comprising a transceiver, memory and a processor, the processor operative to:
-
determine that the host device is within the personal area network created by the key; in response to determining that the host device is within the personal area network of the key, automatically authenticate the key; direct the transceiver to receive a user profile transmitted by the key; and load the received user profile. - View Dependent Claims (27, 28)
-
-
29. A method for loading a user'"'"'s profile on a host device from a key, comprising:
-
creating a personal area network with the key; determining that the host device is within the personal area network; directing the host device to automatically authenticate the key; transmitting a user profile associated with the key to the host device; and directing the host device to load the transmitted user profile. - View Dependent Claims (30, 31)
-
Specification