PROXIMITY BASED AND DATA EXCHANGE AND USER AUTHENTICATION BETWEEN SMART WEARABLE DEVICES
First Claim
1. A wearable device, the device comprising:
- (a) a housing;
(b) one or more sensors coupled to the housing, wherein at least one of the one or more sensors is configured for sensing biological or physiological input;
(c) one or more communications interfaces;
(d) a processor; and
(e) programming stored in a non-transitory medium, wherein the programming is readable and executable by the processor, and wherein the programming performs steps comprising;
(i) sensing biological or physiological input of a first user via the one or more sensors;
(ii) identifying a second wearable device worn by a second user in proximity to the wearable device; and
(iii) exchanging data with the second wearable device via the one or more communication interfaces.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method including a disposable wearable device that provides enhanced capabilities to a non-wearable device for a limited period of time by sensing proximity and securely exchanging permissions with the non-wearable device. In one embodiment, the wearable device is capable of sensing one or more bio-signals that are provided to the non-wearable, tactile feedback, or the like. The wearable device may be disposable and may also provide additional tactile feedback for the extended feature (e.g. game feedback, etc). In another embodiment, the wearable device is capable of sensing one or more bio-signals that are provided to the non-wearable, tactile feedback, or the like.
38 Citations
57 Claims
-
1. A wearable device, the device comprising:
-
(a) a housing; (b) one or more sensors coupled to the housing, wherein at least one of the one or more sensors is configured for sensing biological or physiological input; (c) one or more communications interfaces; (d) a processor; and (e) programming stored in a non-transitory medium, wherein the programming is readable and executable by the processor, and wherein the programming performs steps comprising; (i) sensing biological or physiological input of a first user via the one or more sensors; (ii) identifying a second wearable device worn by a second user in proximity to the wearable device; and (iii) exchanging data with the second wearable device via the one or more communication interfaces. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8-20. -20. (canceled)
-
21. A wearable device, the device comprising:
-
(a) a housing, wherein the housing encases components of a wearable device; (b) one or more sensors, wherein at least one sensor is configured for sensing biological or physiological input; (c) one or more communications interfaces; (d) a processor; and (e) programming stored in a non-transitory medium, wherein the programming is readable and executable by the processor, and wherein the programming performs steps comprising; (i) sensing one or more devices in proximity to the wearable device; (ii) communicating with the one or more devices; and (iii) acquiring one or more permissions relating to data associated with the wearable device or the one or more devices. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28-48. -48. (canceled)
-
49. A computer implemented method for a smart wearable device user authentication and non-wearable device range notification, the method comprising:
-
(a) providing a smart wearable device, the device comprising; (i) a housing, wherein the housing encases components of a wearable smart device; (ii) one or more sensors, wherein at least one sensor is a biological sensor configured to acquire biological input; (iii) one or more output devices; (iv) a memory; (v) one or more communications interfaces; and (vi) a processor; (b) authenticating a user'"'"'s identity; (c) detecting a non-wearable device that is in range of the smart wearable device'"'"'s one or more communications interfaces; (d) verifying the authenticated user has access rights to services for use with the non-wearable device; and (e) if access rights are verified, granting access to the services; (f) wherein said method is performed by executing programming on at least one computer processor, said programming residing on a non-transitory medium readable by the computer processor. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56)
-
-
57-60. -60. (canceled)
Specification