Personal data storage and transaction device system and method
First Claim
1. A method for personalizing an electronic device through a personal area network, comprising the steps of:
- transmitting a self-initiated message by the electronic device that includes an identification code of the electronic device;
receiving a self-initiated message from another electronic device and a response message in response to the identification code of the electronic device in the self-initiated message;
configuring the application of the electronic device based on the response message; and
displaying data received by the electronic device based on the application.
4 Assignments
0 Petitions
Accused Products
Abstract
A circuit and method for personalizing an electronic device (20) through a personal area network (22). Electron devices (20) have transceivers (38) for transmitting a self-initiated message that includes an identification code of the electronic device. Transceivers (38) are also capable of receiving a self-initiated message sent from other electronic devices. The received message causes a response message to be transmitted in response to the identification code in the self-initiated message. Communication between two electron devices (20′ and 20″) is established when the devices are determined to be compatible. The application of the electronic device is configured based on the response message and data is displayed by the electronic device based on the application.
-
Citations
18 Claims
-
1. A method for personalizing an electronic device through a personal area network, comprising the steps of:
-
transmitting a self-initiated message by the electronic device that includes an identification code of the electronic device;
receiving a self-initiated message from another electronic device and a response message in response to the identification code of the electronic device in the self-initiated message;
configuring the application of the electronic device based on the response message; and
displaying data received by the electronic device based on the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for personalizing an electronic device, comprising the steps of:
-
receiving an unsolicited message that includes an identification code of another electronic device;
transmitting an unsolicited message by the electronic device that includes an identification code of the electronic device;
receiving a response message from the another electronic device in response to the identification code of the electronic device; and
configuring the electronic device for an application based on the response message. - View Dependent Claims (10, 11, 12, 13)
configuring the electronic device to receive data for the application based on control data received in the response message; and
configuring a display of the electronic device to display the data based on the application.
-
-
11. The method of claim 9, further comprising the step of transmitting the unsolicited message periodically.
-
12. The method of claim 9, further comprising the step of transmitting information describing a capability of the electronic device for performing a function on the data.
-
13. The method of claim 9, further comprising the step of transmitting identifying information stored in the electronic device.
-
14. A method for personalizing an electronic device, comprising the steps of:
-
receiving an unsolicited message that includes an identification code of another electronic device;
transmitting an unsolicited message by the electronic device that includes an identification code of the electronic device;
receiving a response message from the another electronic device in response to the identification code of the electronic device;
configuring the electronic device for an application based on the response message;
transmitting an interrogation signal periodically from the electronic device; and
sending a security alarm sequence when a signal is not received in response to the interrogation signal. - View Dependent Claims (15, 16)
transmitting a request message to a telephone;
receiving a reply message from the telephone that establishes communication with the electronic device; and
sending a security message from the electronic device to the telephone that includes an identification of the electronic device.
-
-
16. The method of claim 14, further comprising the step of inhibiting the electronic device from further communications while the electronic device is sending the security alarm sequence.
-
17. An electronic device, comprising:
-
an antenna;
a transmitter having an output coupled to the antenna for transmitting an unsolicited message that includes an identification code of the electronic device;
a receiver having an input coupled to the antenna for receiving an unsolicited message that includes an identification code of another electronic device and a response message based on the identification code of the electronic device; and
a display having terminals coupled to an output of the receiver for receiving signals that configure the display for an application based on the response message. - View Dependent Claims (18)
-
Specification