Bluetooth security profile
First Claim
1. A method comprising:
- monitoring, at a wireless communications device, a first value of received signal strength of first point-to-point wireless communications with a first device;
determining, at the wireless communications device, that the first value of received signal strength is below a first predetermined value of received signal strength; and
responsive to determining that the first value of received signal strength is below the first predetermined value of received signal strength, the wireless communications device locking first user interface of the wireless communications device and directing a second device to lock a second user interface of the second device, wherein the second device is in second point-to-point wireless communications with the wireless communications device.
1 Assignment
0 Petitions
Accused Products
Abstract
A user configurable security profile defining relationships between a plurality of communications devices is utilized to secure a communications device in response to an occurrence of an event. In an example embodiment, the devices (e.g., cellular phone, PDA, computer, car key fob, BLUETOOTH® enabled object) are linked together via a BLUETOOTH® conformant interface. If one of the devices becomes disconnected from the link, the remaining devices are locked. Additionally, a warning can be provided on the remaining devices. A device can be unlocked by providing a code, PIN, password, or the like. A legitimate disconnection from the link, such as turning a device off, or the battery dying, will not result in the remaining devices being locked. If a device is stolen and not recovered, the user can reconfigure the security profile to exclude the stolen device.
-
Citations
25 Claims
-
1. A method comprising:
-
monitoring, at a wireless communications device, a first value of received signal strength of first point-to-point wireless communications with a first device; determining, at the wireless communications device, that the first value of received signal strength is below a first predetermined value of received signal strength; and responsive to determining that the first value of received signal strength is below the first predetermined value of received signal strength, the wireless communications device locking first user interface of the wireless communications device and directing a second device to lock a second user interface of the second device, wherein the second device is in second point-to-point wireless communications with the wireless communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A wireless communications device comprising:
-
a processing portion configured to; monitor a first value of received signal strength of first point-to-point wireless communications with a first device, determine that the first value of received signal strength is below a predetermined second value of received signal strength, and responsive to determining that the first value of received signal strength is below the predetermined second value of received signal strength, lock a first user interface of the wireless communications device; and a wireless communications portion configured to; transmit an indication of the determination that the first value of received signal strength is below the predetermined second value of received signal strength to a second device, wherein the indication causes the second device to lock a second user interface of the second device, wherein the second device is in second point-to-point wireless communications with the wireless communications device. - View Dependent Claims (20, 21, 22)
-
-
23. A system comprising;
-
a wireless communications device having a user interface; a first device in first point-to-point wireless communications with the wireless communications device;
wherein the wireless communications device monitors a first value of received signal strength of the point-to-point wireless communication and, when the first value is less than a predetermined second value of received signal strength, locks the user interface; anda second device having a second user interface, wherein the second device is in second point-to-point wireless communication with the wireless communications device, and wherein, when the first value is less than the predetermined second value of received signal strength, the wireless communications device directs the second device to lock the second user interface. - View Dependent Claims (24, 25)
-
Specification