System and method for controlling access between Bluetooth devices
First Claim
1. A method of using an access list stored on a memory of a first computing device, the access list for controlling communication between the first computing device and a plurality of computing devices in a Bluetooth communication network, the method comprising:
- initiating a discovery request at the first computing device such that the discovery request is targeted to at least one of the plurality of computing devices;
generating a list of discoverable computing devices from the plurality of computing devices available for communication with the first computing device in response to the discovery request;
pairing the first computing device to a discovered computing device;
assigning the discovered computing device to the access list;
initiating a restricted mode of operation on the first computing device, the restricted mode of operation configured to secure the access list to prevent subsequent unauthorized modification thereof, the access list including an entry representing the discovered computing device of the plurality of computing devices that is permitted to access the first computing device, the entry comprising at least one identifier to identify the discovered computing device;
in response to a connection request between the first computing device and a particular computing device of the plurality of computing devices, determining whether the particular computing device is on the access list; and
preventing connection between the first computing device and the particular computing device in response to determining that the particular computing device is not on the access list.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system is provided for using an access list stored on a memory of a first computing device, the access list for controlling communication between the first computing device and a plurality of computing devices in a Bluetooth communication network. The method comprises: initiating a restricted mode of operation on the first computing device, the restricted mode of operation configured to secure the access list to prevent subsequent unauthorized modification thereon, the access list including at least one entry representing at least one selected computing device of the plurality of computing devices being permitted to access the first computing device, the at least one entry comprising at least one identifier to identify the at least one selected computing device; in response to a connection request between the first computing device and a particular computing device of the plurality of computing devices, determining whether the particular computing device is on the access list; and preventing connection between the first computing device to the particular computing device in response to determining that the particular computing device is not on the access list.
17 Citations
20 Claims
-
1. A method of using an access list stored on a memory of a first computing device, the access list for controlling communication between the first computing device and a plurality of computing devices in a Bluetooth communication network, the method comprising:
-
initiating a discovery request at the first computing device such that the discovery request is targeted to at least one of the plurality of computing devices; generating a list of discoverable computing devices from the plurality of computing devices available for communication with the first computing device in response to the discovery request; pairing the first computing device to a discovered computing device; assigning the discovered computing device to the access list; initiating a restricted mode of operation on the first computing device, the restricted mode of operation configured to secure the access list to prevent subsequent unauthorized modification thereof, the access list including an entry representing the discovered computing device of the plurality of computing devices that is permitted to access the first computing device, the entry comprising at least one identifier to identify the discovered computing device; in response to a connection request between the first computing device and a particular computing device of the plurality of computing devices, determining whether the particular computing device is on the access list; and preventing connection between the first computing device and the particular computing device in response to determining that the particular computing device is not on the access list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A first computing device comprising:
-
a processor; a memory coupled to the processor, the memory configured to store an access list for controlling communication between the first computing device and a plurality of computing devices in a Bluetooth communication network, the memory coupled to the processor having instructions stored thereon for execution by the processor, the memory comprising instructions for; initiating a discovery request at the first computing device such that the discovery request is targeted to at least one of the plurality of computing devices; generating a list of discoverable computing devices from the plurality of computing devices available for communication with the first computing device in response to the discovery request; pairing the first computing device to a discovered computing device; assigning the discovered computing device to the access list; initiating a restricted mode of operation on the first computing device, the restricted mode of operation configured to secure the access list to prevent subsequent unauthorized modification thereof, the access list including an entry representing the discovered computing device of the plurality of computing devices that is permitted to access the first computing device, the entry comprising at least one identifier to identify the discovered computing device; in response to a connection request between the first computing device and a particular computing device of the plurality of computing devices, determining whether the particular computing device is on the access list; and preventing connection between the first computing device to the particular computing device in response to determining that the particular computing device is not on the access list. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification