Wireless storage device
First Claim
1. A method comprising:
- detecting that a first computing device is within range of a wireless storage device, using a short-range wireless communication network;
establishing a connection between the first computing device and the wireless storage device over the short-range wireless network;
sending first authentication data from the wireless storage device to the first computing device over the short-range wireless network to authenticate access to the first computing device by a particular user associated with the first authentication data, wherein the first authentication data is based at least in part on user identifier data unique to the particular user;
receiving from the first computing device over the short-range wireless network second authentication data to authenticate access by the first computing device to at least a portion of the data stored on wireless storage device; and
sending data stored in memory of the wireless storage device from the wireless storage device to the first computing device over the short-range wireless network for a presentation of the data using a user interface of the first computing device, wherein the wireless storage device lacks user interfaces for the presentation of the data.
10 Assignments
0 Petitions
Accused Products
Abstract
A first computing device is detected as substantially collocated with a wireless storage device, using a short-range wireless communication network. A connection is established between the first computing device and the wireless storage device over the short-range wireless network. Data stored in memory of the wireless storage device is sent from the wireless storage device to the first computing device over the short-range wireless network for a presentation of the data using a user interface of the first computing device. The wireless storage device lacks user interfaces for the presentation of the data. In some instances, authentication of either or both of the first computing device or wireless storage device can be accomplished through communication between the first computing device and wireless storage device over the short-range wireless communication network.
-
Citations
21 Claims
-
1. A method comprising:
-
detecting that a first computing device is within range of a wireless storage device, using a short-range wireless communication network; establishing a connection between the first computing device and the wireless storage device over the short-range wireless network; sending first authentication data from the wireless storage device to the first computing device over the short-range wireless network to authenticate access to the first computing device by a particular user associated with the first authentication data, wherein the first authentication data is based at least in part on user identifier data unique to the particular user; receiving from the first computing device over the short-range wireless network second authentication data to authenticate access by the first computing device to at least a portion of the data stored on wireless storage device; and sending data stored in memory of the wireless storage device from the wireless storage device to the first computing device over the short-range wireless network for a presentation of the data using a user interface of the first computing device, wherein the wireless storage device lacks user interfaces for the presentation of the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
detect that a first computing device is within range of a wireless storage device, using a short-range wireless communication network; establish a connection between the first computing device and the wireless storage device over the short-range wireless network; send first authentication data from the wireless storage device to the first computing device over the short-range wireless network to authenticate access to the first computing device by a particular user associated with the first authentication data, wherein the first authentication data is based at least in part on user identifier data corresponding to the particular user; receive from the first computing device over the short-range wireless network second authentication data to authenticate access by the first computing device to at least a portion of the data stored on wireless storage device; and send data stored in memory of the wireless storage device from the wireless storage device to the first computing device over the short-range wireless network for a presentation of the data using a user interface of the first computing device, wherein the wireless storage device lacks user interfaces for the presentation of the data.
-
-
16. A data storage apparatus comprising:
-
a processor device; a memory element; a short-range wireless network adapter adapted to; detect that a first computing device is within range of the apparatus, using a short-range wireless communication network; establish a connection between the first computing device and the apparatus over the short-range wireless network; and an authentication broker adapted to; send first authentication data from the apparatus to the first computing device over the short-range wireless network to authenticate access to the first computing device by a particular user associated with the first authentication data, wherein the first authentication data is based at least in part on unique user identifier data corresponding to the particular user; and cause data stored in the memory element to be sent to the first computing device over the short-range wireless network based on an authentication of the first computing device at the apparatus for a presentation of the data using a user interface of the first computing device, wherein the apparatus lacks user interfaces for the presentation of the data. - View Dependent Claims (17, 18)
-
-
19. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
detect that a wireless storage device is within range of a particular computing device, using a short-range wireless communication network; establish a connection between the particular computing device and the wireless storage device over the short-range wireless network; receive first authentication data from the wireless storage device over the short-range wireless network, wherein the first authentication data is based at least in part on user identifier data unique to a particular user; authorize use of the particular computing device by the particular user based on the received first authentication data; receive data stored on the storage device at the particular computing device over the short-range wireless network; and present the data on a user interface of the particular computing device. - View Dependent Claims (20, 21)
-
Specification