Pairing and storage access scheme between a handheld device and a computing system
First Claim
1. A method for enabling a first device to access a non-volatile storage included in a second device, the method comprising:
- at the first device;
detecting that the second device is positioned at a proximity to the first device that satisfies a threshold;
identifying that a pre-existing relationship exists between the first device and the second device, wherein the pre-existing relationship is associated with a unique passcode that is known to each of the first device and the second device;
prior to establishing a connection to the second device, attempting to perform an authentication that involves;
prompting, by the first device, a user to provide the unique passcode known to each of the first device and the second device, orcausing the second device to prompt the user to provide the unique passcode; and
when the user is verified based on the provided unique passcode, pairing with the second device by carrying out steps that include;
invoking a remote storage protocol that enables at least one software application executing on the first device to issue store commands with associated data and read commands identifying specific data to a network interface included in the first device, wherein;
the network interface is configured to tunnel the commands to the second device via an artificially imposed network that is implemented via a physical Universal Serial Bus (USB) connection that exists between the first device and the second device, the physical USB connection enabling the at least one software application to access the non-volatile storage included in the second device by way of the tunneled commands, andthe second device is configured to detect incoming cell phone calls while the first device is accessing the non-volatile storage included in the second device.
0 Assignments
0 Petitions
Accused Products
Abstract
A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service.
82 Citations
17 Claims
-
1. A method for enabling a first device to access a non-volatile storage included in a second device, the method comprising:
-
at the first device; detecting that the second device is positioned at a proximity to the first device that satisfies a threshold; identifying that a pre-existing relationship exists between the first device and the second device, wherein the pre-existing relationship is associated with a unique passcode that is known to each of the first device and the second device; prior to establishing a connection to the second device, attempting to perform an authentication that involves; prompting, by the first device, a user to provide the unique passcode known to each of the first device and the second device, or causing the second device to prompt the user to provide the unique passcode; and when the user is verified based on the provided unique passcode, pairing with the second device by carrying out steps that include; invoking a remote storage protocol that enables at least one software application executing on the first device to issue store commands with associated data and read commands identifying specific data to a network interface included in the first device, wherein; the network interface is configured to tunnel the commands to the second device via an artificially imposed network that is implemented via a physical Universal Serial Bus (USB) connection that exists between the first device and the second device, the physical USB connection enabling the at least one software application to access the non-volatile storage included in the second device by way of the tunneled commands, and the second device is configured to detect incoming cell phone calls while the first device is accessing the non-volatile storage included in the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An electronic device, comprising:
-
a network interface; a processor; and a memory configured to store instructions that, when executed by the processor, cause the electronic device to; detect that a handheld device is positioned at a proximity to the electronic device that satisfies a threshold; identify that a pre-existing relationship exists between the electronic device and the handheld device, wherein pre-existing relationship is associated with a unique passcode that is known to each of the electronic device and the handheld device; prior to establishing a connection to the handheld device, attempt to perform an authentication that involves; prompting, by the electronic device, a user to provide the unique passcode known to each of the electronic device and the handheld device, or causing the handheld device to prompt the user to provide the unique passcode; and when the user is verified based on the provided unique passcode, pair with the handheld device by carrying out steps that include; a remote storage protocol that enables at least one software application executing on the electronic device to issue store commands with associated data and read commands identifying specific data to a network interface included in the electronic device, wherein; the network interface is configured to tunnel the commands to the handheld device via an artificially imposed network that is implemented via a physical Universal Serial Bus (USB) connection that exists between the electronic device and the handheld device, the physical USB connection enabling the at least one software application to access a non-volatile storage included in the handheld device by way of the tunneled commands, and the handheld device is configured to detect incoming cell phone calls while the electronic device is accessing the non-volatile storage included in the handheld device. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable storage medium configured to store instructions that, when executed by a processor included in an electronic device, cause the electronic device to:
-
detect that a handheld device is positioned at a proximity to the electronic device that satisfies a threshold; identify that a pre-existing relationship exists between the electronic device and the handheld device, wherein the pre-existing relationship is associated with a unique passcode that is known to each of the electronic device and the handheld device; prior to establishing a connection to the handheld device, attempt to perform an authentication that involves; prompting, by the electronic device, to provide the unique passcode known to each of the electronic device and the handheld device, or causing the handheld device to prompt the user to provide the unique passcode; and when the user is verified based on the provided unique passcode, pair with the handheld device by carrying out steps that include; a remote storage protocol that enables at least one software application executing on the electronic device to issue store commands with associated data and read commands identifying specific data to a network interface included in the electronic device, wherein; the network interface is configured to tunnel the commands to the handheld device via an artificially imposed network that is implemented via a physical Universal Serial Bus (USB) connection that exists between the electronic device and the handheld device, the physical USB connection enabling the at least one software application to access a non-volatile storage included in the handheld device by way of the tunneled commands, and the handheld device is configured to detect incoming cell phone calls while the electronic device is accessing the non-volatile storage included in the handheld device. - View Dependent Claims (15, 16, 17)
-
Specification