×

PORTABLE ELECTRONIC AUTHORIZATION SYSTEM AND METHOD

  • US 20100031043A1
  • Filed: 10/13/2009
  • Published: 02/04/2010
  • Est. Priority Date: 09/28/1999
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for enabling a user interface on a computer operated by a user to cause memory content of an electronic device distinct from the computer to be modified, comprising steps of:

  • (A) establishing a communication link between the user interface and the electronic device by establishing a first connection between the user interface and a server distinct from each of the computer and the electronic device, and establishing a second connection, which is secure, between the electronic device and the server, the communication link being established such that all substantive communications between the user interface and the electronic device pass through the server;

    (B) with the electronic device, authenticating an identity of the user to determine that the user is permitted to modify the memory content of the electronic device;

    (C) if the identity of the user has been authenticated with the electronic device, then enabling the user interface to cause the server to communicate with the electronic device via the second connection and thereby cause the memory content of the electronic device to be modified;

    (D) if the user interface has been enabled to cause the server to communicate with the electronic device via the second connection and thereby cause the memory content of the electronic device to be modified, then, at a time when the first and second connections exist concurrently, in response to commands input to the computer by the user, using the user interface to communicate with the server via the first connection so as to cause the server to communicate with the electronic device via the second connection and thereby cause new information to be added to the memory of the electronic device via the second connection;

    (E) after performing the step (D), de-establishing the second connection; and

    (F) after performing the step (E), accessing the new information stored in the memory of the electronic device and using the new information to perform at least one operation.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×