Proximity-based system for automatic application initialization
First Claim
1. A system with automatic access to information, comprising:
- a first personal digital key (PDK) including a first profile uniquely associated with a user having a first user priority;
a reader configured to wirelessly communicate with the first PDK, the reader receiving profile information from the first PDK;
a computing device coupled to the reader, the computing device configured to display data on a display device responsive to receiving the profile information from the reader;
an auto login server coupled to the reader and to the computing device, the auto login server configured to receive the profile information from the reader and to automatically initiate a login of the user identified by the profile information;
an application server coupled to the computing device, the application server configured to cooperate with the computing device to automatically launch one or more applications on the computing device responsive to the login of the user associated with the profile information received from the reader; and
a second PDK including a second profile associated with another user having a second user priority, wherein one more of a session of the user and the computing device are taken over by the another user based on the second user priority relative to the first user priority, the reader configured to wirelessly communicate with the second PDK.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or “PDK”, stores one or more profiles in memory. In one embodiment, a biometric profile is acquired in a secure trusted process and uniquely associated with a user that is authorized to use and associated with the PDK. The PDK wirelessly transmits identification information including a unique PDK identification number, and optionally the biometric profile and a profile over a secure wireless channel to a reader. A computing device is coupled to the reader. An auto login server is coupled to the reader and the computing device and launches one or more applications associated with a user name identified by the received profile.
70 Citations
39 Claims
-
1. A system with automatic access to information, comprising:
-
a first personal digital key (PDK) including a first profile uniquely associated with a user having a first user priority; a reader configured to wirelessly communicate with the first PDK, the reader receiving profile information from the first PDK; a computing device coupled to the reader, the computing device configured to display data on a display device responsive to receiving the profile information from the reader; an auto login server coupled to the reader and to the computing device, the auto login server configured to receive the profile information from the reader and to automatically initiate a login of the user identified by the profile information; an application server coupled to the computing device, the application server configured to cooperate with the computing device to automatically launch one or more applications on the computing device responsive to the login of the user associated with the profile information received from the reader; and a second PDK including a second profile associated with another user having a second user priority, wherein one more of a session of the user and the computing device are taken over by the another user based on the second user priority relative to the first user priority, the reader configured to wirelessly communicate with the second PDK. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for automatic access to information, the method comprising:
-
receiving, using a reader, an identifier from a first personal digital key (PDK), the identifier uniquely associated with the first PDK; authenticating the identifier; responsive to authenticating the identifier, receiving profile information from the first PDK, the profile information uniquely associated with a user, the user having a first user priority; authenticating the profile information from the first PDK; responsive to authenticating the profile information, automatically initializing a login of the user; receiving application data via a computer network on a computing device proximate the user, the application data being uniquely associated with the user and describing one or more applications that are accessible by the user; automatically launching, on the computing device, the one or more applications using the application data responsive to the login of the user associated with the profile information received from the first PDK; and taking over one or more of a session of the user and the computing device on behalf of a second user based on a second user priority relative to the first user priority, the second PDK associated with another user having the second user priority. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A method for securing access to information, comprising:
-
detecting a plurality of first personal digital keys (PDKs) respectively associated with a plurality of users in a proximity zone of a reader; authenticating each of the first PDKs to provide the plurality of users access to a shared computing device associated with the reader, the plurality of users having a first user priority; detecting a second personal digital key (PDK) associated with a second user in the proximity zone that was non-present during the detecting of the first PDKs, the second user having a second user priority; authenticating the second PDK to provide the second user access to one or more of the computing device in use by one of the users associated with one of the first PDKs and a session of one of the users associated with one of the first PDKs based on the second user priority relative to the first user priority; detecting the second PDK associated with the second user leaving a proximity zone of the reader; and responsive to detecting the second PDK leaving the proximity zone, one of logging out and saving and hiding a session of the second user.
-
Specification