WIRELESS NETWORKING-ENABLED PERSONAL IDENTIFICATION SYSTEM
First Claim
1. A method for conserving power at a personal identification device, the method comprising:
- determining, by the personal identification device, to perform one or more operations;
determining the personal identification device will consume an amount of power greater than a power threshold to perform the one or more operations;
determining the personal identification device can communicate with a first device that is capable of performing the one or more operations; and
delegating the one or more operations to the first device based, at least in part, on determining the personal identification device will consume the amount of power that is greater than the power threshold to perform the one or more operations.
1 Assignment
0 Petitions
Accused Products
Abstract
A personal identification device may conserve power by delegating one or more operations to another device. For example, the one or more operations may be associated with the authentication of the personal identification device. In one example, the personal identification device may determine an amount of power greater than a power threshold will be consumed by the personal identification device to perform the one or more operations. The personal identification device may determine it can communicate with a mobile device that is capable of performing the one or more operations, and may then delegate the one or more operations to the mobile device to conserve power. In one example, the personal identification device may receive the results of the one or more operations from the mobile device, and may provide data associated with the results to a personal identification device detector for authentication of the personal identification device.
11 Citations
20 Claims
-
1. A method for conserving power at a personal identification device, the method comprising:
-
determining, by the personal identification device, to perform one or more operations; determining the personal identification device will consume an amount of power greater than a power threshold to perform the one or more operations; determining the personal identification device can communicate with a first device that is capable of performing the one or more operations; and delegating the one or more operations to the first device based, at least in part, on determining the personal identification device will consume the amount of power that is greater than the power threshold to perform the one or more operations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A personal identification device comprising:
-
a memory; and a processor coupled with the memory, the processor configured to; determine to perform one or more operations; determine the personal identification device will consume an amount of power greater than a power threshold to perform the one or more operations; determine the personal identification device can communicate with a first device that is capable of performing the one or more operations; and delegate the one or more operations to the first device based, at least in part, on a determination that the personal identification device will consume the amount of power that is greater than the power threshold to perform the one or more operations. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory machine-readable storage medium having instructions stored therein, which when executed by one or more processors of a personal identification device cause the personal identification device to perform operations that comprise:
-
determining to perform one or more operations; determining the personal identification device will consume an amount of power greater than a power threshold to perform the one or more operations; determining the personal identification device can communicate with a first device that is capable of performing the one or more operations; and delegating the one or more operations to the first device based, at least in part, on determining the personal identification device will consume the amount of power that is greater than the power threshold to perform the one or more operations. - View Dependent Claims (18, 19, 20)
-
Specification