Multiple device and/or user association
First Claim
Patent Images
1. A multi-user authentication method, comprising;
- reading first encoded information at a first time;
reading second encoded information at a second time;
authenticating a first person and a second person according to the first encoded information and the second encoded information;
determining whether a time interval between the first time and the second time is less than or equal to a predetermined time interval; and
authorizing a procedure when the time interval between the first time and the second time is less than or equal to the predetermined time interval.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and devices are provided for automating a login process and user/device associations. A user'"'"'s preferred device settings and/or functions may be provisioned automatically. Some implementations provide an automated log out or “sleep” when a user leaves one or more of the devices. Users may be automatically identified and associated. The “presence” of members of a user group may be determined as required for one or more actions to be taken. Some user groups control devices according to which members of a group may have access to certain functions, information, etc., and which may not.
-
Citations
13 Claims
-
1. A multi-user authentication method, comprising;
-
reading first encoded information at a first time; reading second encoded information at a second time; authenticating a first person and a second person according to the first encoded information and the second encoded information; determining whether a time interval between the first time and the second time is less than or equal to a predetermined time interval; and authorizing a procedure when the time interval between the first time and the second time is less than or equal to the predetermined time interval. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A multi-user authentication system, comprising:
-
first reading means for reading first encoded information at a first time; second reading means for reading second encoded information at a second time; means for authenticating a first person and a second person according to the first encoded information and the second encoded information; means for determining whether a time interval between the first time and the second time is less than or equal to a predetermined time interval; and means for authorizing a procedure when the time interval between the first and second time is less than or equal to the predetermined time interval. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of controlling access to content, the method comprising;
-
assigning a first level of authorization to a first person associated with a first RFID tag; assigning a second level of authorization to a second person associated with a second RFID tag; permitting the first person to view content according to the first level of authorization when the first RFID tag is read by an RFID reader associated with a display device; and causing content being viewed by the first person to be concealed when the second RFID tag is read by the RFID reader and the second level of authorization is does not permit viewing the content. - View Dependent Claims (12, 13)
-
Specification