NETWORKED DEVICE AUTHENTICATION, PAIRING AND RESOURCE SHARING
First Claim
Patent Images
1. A method of pairing a first computing device to a second computing device, comprising:
- a) receiving an indication that a user desires to pair the first computing device with the second computing device;
b) negotiating the pairing of the first computing device with the second computing device, including the steps of receiving an identification of at least one of the user and the first computing device and receiving an authentication token authenticating an association of the user with the first computing device;
c) granting the first computing device access to secure resources available to the second computing device if the identification and authentication steps of said step b) verify an association between the user and the first computing device; and
d) denying the first computing device access to secure resources available to the second computing device if the identification and authentication steps of said step b) fail to verify an association between the user and the first computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for pairing computing devices using an authentication protocol that allows an initiating computing device to gain access to a secure, encrypted network of a target computing device.
272 Citations
20 Claims
-
1. A method of pairing a first computing device to a second computing device, comprising:
-
a) receiving an indication that a user desires to pair the first computing device with the second computing device; b) negotiating the pairing of the first computing device with the second computing device, including the steps of receiving an identification of at least one of the user and the first computing device and receiving an authentication token authenticating an association of the user with the first computing device; c) granting the first computing device access to secure resources available to the second computing device if the identification and authentication steps of said step b) verify an association between the user and the first computing device; and d) denying the first computing device access to secure resources available to the second computing device if the identification and authentication steps of said step b) fail to verify an association between the user and the first computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of pairing a first computing device to a second computing device, comprising:
-
a) receiving an indication that a user desires to pair the first computing device with another computing device; b) identifying the second computing device as a computing device with which the first computing device may pair; c) sending a request from the first computing device to the second computing device for the first computing device to pair with the second computing device, the request from the first computing device including both identification and authentication information relating to the first computing device and a user of the first computing device; d) granting the first computing device access to secure resources available to the second computing device if the first computing device and user are authenticated; e) denying the first computing device access to secure resources available to the second computing device if the first computing device and user are not authenticated; and f) decaying a pairing between the first and second computing devices if granted in said step d) upon detection of one or more predefined termination indicators. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method of pairing a first computing device to a second computing device, comprising:
-
a) receiving an indication that a user desires to pair the first computing device with the second computing device; b) pairing of the first computing device with the second computing device; c) joining the first computing device to a gaming session that the second computing device engaged with upon pairing of the first and second computing devices; and d) integrating the first computing device into the gaming session that the second computing device is engaged with by providing the first computing device current state information for the gaming session. - View Dependent Claims (17, 18, 19, 20)
-
Specification