Apparatus and method for wireless device set-up and authentication using audio authentication—information
First Claim
1. A method comprising:
- detecting a wireless device within communication range of a host device;
authenticating, by a host device, the detected wireless device according to requested device identification information of the detected wireless device;
if the detected wireless device fails authentication, requesting audio authentication initialization information from the detected wireless device;
authenticating, by the host device, the detected wireless device based on the requested audio authentication initialization information received from the detected wireless device and audio authentication initialization information stored by the host device for initial authentication of the detected wireless device; and
storing, by the host device, one or more of a device identification code and a device personal identification number of the detected wireless device as device identification information to enable subsequent authentication of the detected wireless device.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and method for wireless device set-up and authentication using voice stream identification information are described. The method includes the detection of a wireless device within communication range of a host device. Once detected, the device is authenticated according to requested device identification information. However, when authentication of the detected device fails, audio authentication initialization information is requested from the detected device. As a result, the detected device is authenticated based on the requested audio authentication initialization information. In one embodiment, the audio authentication initialization information refers to a voice stream device identification code assigned to the detected device during authentication set-up by a user of the detected device.
-
Citations
36 Claims
-
1. A method comprising:
-
detecting a wireless device within communication range of a host device; authenticating, by a host device, the detected wireless device according to requested device identification information of the detected wireless device; if the detected wireless device fails authentication, requesting audio authentication initialization information from the detected wireless device; authenticating, by the host device, the detected wireless device based on the requested audio authentication initialization information received from the detected wireless device and audio authentication initialization information stored by the host device for initial authentication of the detected wireless device; and storing, by the host device, one or more of a device identification code and a device personal identification number of the detected wireless device as device identification information to enable subsequent authentication of the detected wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer readable storage medium including program instructions that direct a computer to function in a specified manner when executed by a processor, the program instructions comprising:
-
detecting a wireless device within communication range of a host device; authenticating, by the host device, the detected wireless device according to requested device identification information of the detected wireless device; if the detected wireless device fails authentication, requesting audio authentication initialization information from the wireless detected device; authenticating, by the host device, the detected device based on the requested audio authentication initialization information received from the detected wireless device and audio authentication initialization information stored by the host device for initial authentication of the detected wireless device; and storing, by the host device, one or more of a device identification code and a device personal identification number of the detected wireless device as device identification information to enable a challenge and response scheme for subsequent authentication of the detected wireless device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method comprising:
-
receiving, by a wireless device, a communications connection request from a host device; engaging in a challenge and response scheme with the host device according to authentication information held by the wireless device to enable the host device to authenticate the wireless device; if a request for audio authentication initialization information is received from the host device, providing audio authentication initialization information to the host device; and once the provided audio authentication initialization information is authenticated by the host device according to audio authentication initialization information stored by the host device for initial authentication of the wireless device, providing the host device with one or more of a device identification code and a device personal identification number of the wireless device as device identification information to enable subsequent authentication of the wireless device. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A computer readable storage medium including program instructions that direct a computer to function in a specified manner when executed by a processor, the program instructions comprising:
-
receiving, by a wireless device, a connection request from a host device; engaging in a challenge and response scheme with the host device according to authentication information held by the wireless device to enable the host device to authenticate the wireless device; if a request for audio authentication initialization information is received from the host device, providing audio authentication initialization information to the host device; and once the provided audio authentication initialization information is authenticated by the host device according to audio authentication initialization information stored by the host device for initial authentication of the detected wireless device, providing the host device with one or more of a device identification code and a device personal identification number of the wireless device as device identification information to enable subsequent authentication of the wireless device. - View Dependent Claims (27, 28, 29, 30)
-
-
31. An apparatus, comprising:
-
an authentication unit to authenticate at least one wireless device detected within communications range of the apparatus using stored audio authentication initialization information for initial authentication of the detected wireless device if a challenge and response scheme for authentication according to device identification information of the detected wireless device fails to authenticate the detected wireless device; a communications interface coupled to the authentication unit, the communications interface to establish an audio link with the authenticated wireless device, request device identification information as well as audio device authentication initialization information from the detected wireless device; and a storage device coupled to the authentication unit, containing an audio authentication initialization token as well as one or more of a device identification code and a device personal identification number as device identification information for at least one wireless device initialized by the apparatus to enable subsequent authentication of the initialized wireless device. - View Dependent Claims (32, 33)
-
-
34. A system comprising:
-
a host device; and at least one wireless device, the wireless device including; a processor having circuitry to execute instructions; and a storage device having a sequence of instructions stored therein, which when executed by the processor causes the processor to; engage in a challenge and response scheme with the host device according to device identification information held by the wireless device to enable the host device to authenticate the wireless device; request an audio authentication initialization information from a user of the wireless device if an audio authentication initialization request is received from the host device; receive audio device identification information from the user; provide the audio device identification information to the host device as the requested audio authentication initialization information; and once the provided audio authentication initialization information is authenticated by the host device according to audio authentication initialization information stored by the host device for initial authentication of the detected wireless device, providing the host device with one or more of a device identification code and a device personal identification number of the wireless device as device identification information to enable subsequent authentication of the wireless device. - View Dependent Claims (35, 36)
-
Specification