Management of multiple connections to a security token access device
First Claim
1. A user device adapted to communicate with a security token access device over a wireless link, the access device being adapted to communicate over a wireless link with a plurality of user devices and to be paired with at least one of the plurality of user devices, and further being adapted to maintain connection information relating to each of the plurality of user devices paired with the access device, the user device comprising:
- a processor configured to place the user device in an inactivated state in response to a detected input at the user device while maintaining a pairing with the access device, and to reactivate the user device after the user device was in the inactivated state;
a receiver for receiving a signal from the access device, the signal comprising a notification that an other user device has been paired with the access device, the other user device being paired with the access device while the user device was in the inactivated state; and
a transmitter for transmitting a signal, after the user device is reactivated, to the access device to instruct the access device to terminate the pairing with the other user device,wherein the transmitter is further adapted to transmit a signal to the access device comprising a request for a listing of user devices currently paired with the access device, and the receiver is further adapted to receive a signal from the access device comprising the listing of user devices currently paired with the access device.
4 Assignments
0 Petitions
Accused Products
Abstract
A security token access device, a user device such as a computing device or communications device, and a method for managing multiple connections between multiple user devices and the access device. The access device maintains connection information, including security information, for each user device securely paired with the access device. Each time a new user device is paired with the access device, the access device transmits a notification to the user devices already paired to the user device. A user may provide instructions to the access device to terminate a pairing with one of the user devices by overwriting at least a portion of the connection information associated with the designated user device. A user device may further request a listing of all user devices currently paired with the access device.
-
Citations
23 Claims
-
1. A user device adapted to communicate with a security token access device over a wireless link, the access device being adapted to communicate over a wireless link with a plurality of user devices and to be paired with at least one of the plurality of user devices, and further being adapted to maintain connection information relating to each of the plurality of user devices paired with the access device, the user device comprising:
-
a processor configured to place the user device in an inactivated state in response to a detected input at the user device while maintaining a pairing with the access device, and to reactivate the user device after the user device was in the inactivated state; a receiver for receiving a signal from the access device, the signal comprising a notification that an other user device has been paired with the access device, the other user device being paired with the access device while the user device was in the inactivated state; and a transmitter for transmitting a signal, after the user device is reactivated, to the access device to instruct the access device to terminate the pairing with the other user device, wherein the transmitter is further adapted to transmit a signal to the access device comprising a request for a listing of user devices currently paired with the access device, and the receiver is further adapted to receive a signal from the access device comprising the listing of user devices currently paired with the access device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A security token access device adapted to wirelessly communicate with a plurality of user devices, comprising:
-
a transceiver, a processor and a memory configured to enter into a pairing with each of a plurality of user devices, the processor and memory further being configured to store and maintain connection information relating to each of the plurality of user devices thus paired while said each of the plurality of user devices is in an inactivated state in response to a detected input at said user device; the transceiver being configured to transmit a notification of a subsequent pairing with a user device to at least one previously paired device of the plurality of user devices, wherein said subsequent pairing occurred while the at least one previously paired device was in the inactivated state, and to receive, from one of the at least one previously paired device, after it is reactivated, an instruction to terminate the subsequent pairing; wherein the processor and memory are further configured to terminate the subsequent pairing upon receipt of said instruction by overwriting at least a portion of the connection information relating to said subsequently paired device, wherein the transceiver is further configured to receive a request from a requesting user device for a listing of all user devices currently paired with the access device, and to transmit to the requesting user device in response to the request the listing of all user devices currently paired with the access device. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for managing a plurality of user devices adapted to communicate over a wireless link with a security token access device, the method being implemented by the access device and comprising:
-
receiving a request for a connection from each of a plurality of user devices, each request comprising an identifier corresponding to each of the plurality of user devices; for each request, generating and transmitting a secure pairing value corresponding to each of the plurality of user devices for establishing a secure pairing with each said user device; for each of said user device, storing connection information comprising the corresponding identifier and a key derived from the corresponding secure pairing value; while a first one of the plurality of user devices thus paired is in an inactivated state in response to a detected input at the user device, receiving a request for a connection from a subsequent user device, the request comprising an identifier corresponding to said subsequent user device; generating and transmitting a subsequent secure pairing value corresponding to the subsequent user device for establishing a secure pairing with the subsequent user device; storing connection information comprising the identifier corresponding to the subsequent user device and a key derived from the subsequent secure pairing value; transmitting a notification to the first one of the plurality of user devices thus paired that the subsequent user device has been paired with the access device; receiving an instruction from said first one of the plurality of user devices thus paired, after said user device is reactivated, to terminate the pairing between the access device and the subsequent user device; in response to said instruction, overwriting the key derived from the subsequent secure pairing value; receiving a request from a requesting user device for a listing of all user devices currently paired with the access device; and transmitting to the requesting user device in response to the request the listing of all user devices currently paired with the access device. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification