BLUETOOTH DEVICE AS SECURITY ACCESS KEY
First Claim
1. A method for directing a host device to execute at least one instruction received from an electronic key having limited available processing resources and a limited memory, the method comprising:
- at the electronic key;
initiating a communication channel with the host device;
establishing an identity of the host device;
in response to establishing the identity of the host device;
retrieving the at least one instruction from the memory, wherein the at least one instruction corresponds to the identity of the host device; and
sending the at least one instruction to the host device to be executed by the host device upon receipt of the at least one instruction by the host device.
0 Assignments
0 Petitions
Accused Products
Abstract
This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the communications circuitry. When a host device is within the personal area network, the key may transmit data received by a transceiver on the host device. In response to receiving the data, the host device may perform an operation (e.g., an authentication operation). In some embodiments, the key may transmit data identifying an operation for the host device to perform. In some embodiments, the host device may store in memory key identification information and an associated operation which may be retrieved when the key is brought in proximity of the host device.
-
Citations
20 Claims
-
1. A method for directing a host device to execute at least one instruction received from an electronic key having limited available processing resources and a limited memory, the method comprising:
at the electronic key; initiating a communication channel with the host device; establishing an identity of the host device; in response to establishing the identity of the host device; retrieving the at least one instruction from the memory, wherein the at least one instruction corresponds to the identity of the host device; and sending the at least one instruction to the host device to be executed by the host device upon receipt of the at least one instruction by the host device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A method for directing a host device to perform an operation, the method comprising:
at the host device; in response to a determination that the host device is within a personal area network created by an electronic key; communicating host identification information to the electronic key; receiving authentication information from the electronic key; authenticating the electronic key based on the authentication information; in response to a determination that the electronic key is authenticated; identifying one or more operations to perform on the host device, wherein said identifying comprises receiving an instruction from the electronic key that identifies the one or more operations, the instruction is based on the host identification information, and the instruction is retrieved from a memory of the electronic key; and performing the identified one or more operations on the host device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
17. A system for directing a host device to perform an operation, the system comprising:
-
an electronic key comprising communications circuitry configured to; broadcast information associated with the electronic key to notify a host device of a personal area network established within a proximity of the electronic key; and the host device, wherein the hose device comprises a processor configured to; communicate host identification information to the electronic key, receive authentication information from the electronic key, authenticate the electronic key based on the authentication information, and in response to a determination that the electronic key is authenticated; identify one or more operations to perform on the host device, receive an instruction from the electronic key identifying the one or more operations, wherein the instruction is retrieved from a memory of the electronic key, and the instruction is based on the host identification information, and perform the identified one or more operations on the host device. - View Dependent Claims (18, 19, 20)
-
Specification