Bluetooth security profile
First Claim
1. A method comprising:
- receiving, at a wireless communications device, profile data indicative of being provided by a wireless network device, the profile data comprising;
a first device identifier for a first device,a second device identifier for a second device,an event, anda user-defined device action associated with the event;
monitoring, at the wireless communications device, a first value of received signal strength of first point-to-point wireless communications with the first device;
determining, at the wireless communications device, that the first value of received signal strength is below a first predetermined value of received signal strength;
determining, at the wireless communications device, that the first value of received signal strength being below the first predetermined value of received signal strength corresponds to the event;
responsive to determining that the first value of received signal strength being below the first predetermined value of received signal strength corresponds to the event, determining, at the wireless communications device, instructions based on the user-defined device action, wherein the instructions comprise an instruction to lock a user interface of the second device; and
transmitting the instructions from the wireless communications device to the second device using second point-to-point wireless communications.
1 Assignment
0 Petitions
Accused Products
Abstract
A user configurable security profile defining relationships between a plurality of communications devices is utilized to secure a communications device in response to an occurrence of an event. In an example embodiment, the devices are linked together using a short range wireless communications protocol. If one of the devices becomes disconnected from the link, another device determines what actions to take based on the profile and the specific actions associated with the disconnected device. A device can be unlocked by providing a code, PIN, password, or the like. A legitimate disconnection from the link, such as turning a device off, or the battery dying, will not result in the remaining devices being locked. If a device is stolen and not recovered, the user can reconfigure the security profile to exclude the stolen device.
53 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a wireless communications device, profile data indicative of being provided by a wireless network device, the profile data comprising; a first device identifier for a first device, a second device identifier for a second device, an event, and a user-defined device action associated with the event; monitoring, at the wireless communications device, a first value of received signal strength of first point-to-point wireless communications with the first device; determining, at the wireless communications device, that the first value of received signal strength is below a first predetermined value of received signal strength; determining, at the wireless communications device, that the first value of received signal strength being below the first predetermined value of received signal strength corresponds to the event; responsive to determining that the first value of received signal strength being below the first predetermined value of received signal strength corresponds to the event, determining, at the wireless communications device, instructions based on the user-defined device action, wherein the instructions comprise an instruction to lock a user interface of the second device; and transmitting the instructions from the wireless communications device to the second device using second point-to-point wireless communications. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a memory comprising instructions; and a processor coupled to the memory that, when executing the instructions, effectuates operations comprising; receiving profile data indicative of being provided by a wireless network device, the profile data comprising; a first device identifier for a first device, a second device identifier for a second device, an event, and a user-defined device action associated with the event; monitoring a first value of received signal strength of first point-to-point wireless communications with the first device; determining that the first value of received signal strength is below a first predetermined value of received signal strength; determining that the first value of received signal strength being below the first predetermined value of received signal strength corresponds to the event; responsive to determining that the first value of received signal strength being below the first predetermined value of received signal strength corresponds to the event, determining first instructions based on the user-defined device action, wherein the first instructions comprise an instruction to lock a user interface of the second device; and transmitting the first instructions to the second device, using second point-to-point wireless communications. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A wireless communications device comprising:
-
a memory comprising instructions and profile data received from a wireless network device, the profile data comprising; a first device identifier for a first device, a second device identifier for a second device, an event, and a user-defined device action associated with the event; and a processor coupled to the memory that, when executing the instructions, effectuates operations comprising; monitoring a first value of received signal strength of first point-to-point wireless communications with the first device; determining that the first value of received signal strength is below the user-defined value of received signal strength; determining that the first value of received signal strength being below the first predetermined value of received signal strength corresponds to the event; responsive to determining that the first value of received signal strength being below the first predetermined value of received signal strength corresponds to the event, determining first instructions based on the user-defined device action, wherein the first instructions comprise an instruction to lock a user interface of the second device; and transmitting the first instructions to the second device using a second point-to-point wireless communications. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification