Method and system for providing extended authentication
First Claim
Patent Images
1. A method for extending an authentication of a wireless device, comprising:
- authenticating access to said wireless device to receive communications from a network via a first authentication;
detecting an accessory device and determining if said accessory device will be used as a bonded authentication device for second authentication;
if said accessory device will be used as said bonded authentication device, permitting access to said wireless device when said accessory device is detected; and
wherein permitting access to said wireless device comprises extending an amount of time of said access so that the amount of time the access is permitted to the wireless device is extended when compared to the amount of time access is permitted when the wireless device is authenticated via the first authentication.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for extending an authentication of a wireless device are disclosed. For example, the method includes authenticating access to the wireless device via a first authentication. The method detects a bonded authentication device as a second authentication. The method permits access to the wireless device when the bonded authentication device is detected.
-
Citations
20 Claims
-
1. A method for extending an authentication of a wireless device, comprising:
-
authenticating access to said wireless device to receive communications from a network via a first authentication; detecting an accessory device and determining if said accessory device will be used as a bonded authentication device for second authentication; if said accessory device will be used as said bonded authentication device, permitting access to said wireless device when said accessory device is detected; and wherein permitting access to said wireless device comprises extending an amount of time of said access so that the amount of time the access is permitted to the wireless device is extended when compared to the amount of time access is permitted when the wireless device is authenticated via the first authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium having stored thereon a plurality of instructions, said plurality of instructions including instructions which, when executed by a processor, cause said processor to perform said steps of a method for extending an authentication of a wireless device, comprising:
-
authenticating access to said wireless device to receive communications from a network via a first authentication; detecting an accessory device and determining if said accessory device will be used as a bonded authentication device for second authentication; if said accessory device will be used as said bonded authentication device, permitting access to said wireless device when said accessory device is detected; and wherein permitting access to said wireless device comprises extending an amount of time of said access so that the amount of time the access is permitted to the wireless device is extended when compared to the amount of time access is permitted when the wireless device is authenticated via the first authentication. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus for extending an authentication of a wireless device, comprising:
a processor for authenticating access to said wireless device to receive communications from a network via a first authentication, detecting an accessory device and determining if said accessory device will be used as a bonded authentication device for second authentication, if said accessory device will be used as said bonded authentication device, permitting access to said wireless device when said accessory device is detected, and wherein permitting access to said wireless device comprises extending an amount of time of said access so that the amount of time the access is permitted to the wireless device is extended when compared to the amount of time access is permitted when the wireless device is authenticated via the first authentication. - View Dependent Claims (20)
Specification