Accessing a Vehicle Using Portable Devices
First Claim
Patent Images
1. A method for accessing a secured object, the method comprising:
- establishing, by a first portable device, a first connection between the first portable device and the secured object;
receiving, by the first portable device, an access credential from the secured object via the first connection, wherein the access credential received from the secured object enables the first portable device to access the secured object;
establishing, by the first portable device, a second connection between the first portable device and a second portable device that is different from the first portable device; and
transmitting, by the first portable device, at least one of the access credential and an additional access credential to the second portable device via the second connection, wherein the second access credential is used by the second portable device to enable access to the secured object by a direct connection.
0 Assignments
0 Petitions
Accused Products
Abstract
A primary portable device can access a vehicle by transmitting an activation message including a vehicle access credential to the vehicle. The primary portable device can additionally enable a secondary portable device to access the vehicle by transmitting the vehicle access credential to the secondary portable device. The connections between the primary portable device, secondary portable device, and vehicle can be based on a short-range wireless protocol, such as Bluetooth or Bluetooth LE.
42 Citations
20 Claims
-
1. A method for accessing a secured object, the method comprising:
-
establishing, by a first portable device, a first connection between the first portable device and the secured object; receiving, by the first portable device, an access credential from the secured object via the first connection, wherein the access credential received from the secured object enables the first portable device to access the secured object; establishing, by the first portable device, a second connection between the first portable device and a second portable device that is different from the first portable device; and transmitting, by the first portable device, at least one of the access credential and an additional access credential to the second portable device via the second connection, wherein the second access credential is used by the second portable device to enable access to the secured object by a direct connection. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for accessing a secured system, the method comprising:
-
receiving, by a secondary portable device, an access credential from a primary portable device; establishing, by the secondary portable device, a direct connection between the secondary portable device and the secured system; and transmitting, by the secondary portable device, the access credential to the secured system via the direct connection, wherein access to the secured system is enabled based on the access credential. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for accessing a secured object, the method comprising:
-
establishing, by the secured object, a connection between the secured object and a primary portable device; transmitting, by the secured object, a first access credential to the primary portable device over the first connection; establishing, by the secured object, a direct connection between the secured object and a secondary portable device; receiving, by the secured object, a second access credential from the secondary portable device over the direct connection; and enabling, by the secured object, access to the secured object based at least in part on the second access credential. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification