Method and system for electronic device authentication
DC CAFCFirst Claim
Patent Images
1. A method of authenticating first and second electronic devices, comprising:
- upon link set-up over a short-range wireless link, executing an authentication protocol by exchanging authentication information between the first and second electronic devices to initially authenticate communication between the first and second devices;
later, when the first and second electronic devices are beyond the short-range wireless link, executing the authentication protocol by exchanging the authentication information between the first and second electronic devices over an alternate communications link, then only allowing communication between the first and second devices if the first and second devices had initially been successfully authenticated.
5 Assignments
Litigations
2 Petitions
Accused Products
Abstract
Electronic devices are authenticated to each other initially over a short-range wireless link. In particular, a user first enters a given authentication information in each device. Later, when the devices are out-of-range of the wireless link, they may be authenticated to each other without subsequent user input when one of the devices invites the other to exchange authentication information over an alternative communications link. If the authentication is successful, the devices may then communicate over the alternative communications link as if they were within range of the original wireless link.
41 Citations
17 Claims
-
1. A method of authenticating first and second electronic devices, comprising:
-
upon link set-up over a short-range wireless link, executing an authentication protocol by exchanging authentication information between the first and second electronic devices to initially authenticate communication between the first and second devices; later, when the first and second electronic devices are beyond the short-range wireless link, executing the authentication protocol by exchanging the authentication information between the first and second electronic devices over an alternate communications link, then only allowing communication between the first and second devices if the first and second devices had initially been successfully authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of authenticating first and second electronic devices, comprising:
-
upon link set-up over a first link, executing an authentication protocol by exchanging authentication information between the first and second electronic devices to initially authenticate communication between the first and second devices; later, when the first and second electronic devices are connected using a second link, exchanging the authentication information between the first and second electronic devices over the second link, then only allowing communication between the first and second devices if the first and second devices had initially been successfully authenticated.
-
-
14. An electronic device, comprising:
-
a processor; and a memory loaded with a software routine executed by the processor (a) for generating authentication information useful in initially authenticating the electronic device to a another electronic device over a short-range wireless link, and (b) for later supplying the authentication information for later authentication of the electronic device to the other electronic device over an alternate communications link when the devices are beyond the short-range wireless link, then only allowing communication between the devices if the devices had initially been successfully authenticated. - View Dependent Claims (15, 16)
-
-
17. A communications system, comprising:
-
a first electronic device; a second electronic device; a first communications link over which the first and second electronic devices authenticate each other using a given protocol that includes a link set-up and the exchange of authentication information following the link set-up, the authentication information being used to initially authenticate communication between the first and second electronic devices; and a second communications link over which the first and second electronic devices later authenticate each other using the exchange of the authentication information, then only allowing communication between the first and second devices if the first and second devices had initially been successfully authenticated, wherein said first communications link and said second communications link are different types of links.
-
Specification