Accessing a vehicle using portable devices
First Claim
Patent Images
1. A method for accessing a secured object, the method comprising:
- establishing, by a first portable device having a touch screen display, a first connection between the first portable device and the secured object;
receiving, by the first portable device, an access credential from the secured object via the first connection, wherein the access credential received from the secured object enables the first portable device to access the secured object;
establishing, by the first portable device, a second connection between the first portable device and a second portable device that is different from the first portable device based on a user input received at the touch screen display; and
transmitting, by the first portable device, an additional access credential to the second portable device via the established second connection, wherein the additional access credential is used by the second portable device to enable access to the secured object by a direct connection.
0 Assignments
0 Petitions
Accused Products
Abstract
A primary portable device can access a vehicle by transmitting an activation message including a vehicle access credential to the vehicle. The primary portable device can additionally enable a secondary portable device to access the vehicle by transmitting the vehicle access credential to the secondary portable device. The connections between the primary portable device, secondary portable device, and vehicle can be based on a short-range wireless protocol, such as Bluetooth or Bluetooth LE.
18 Citations
20 Claims
-
1. A method for accessing a secured object, the method comprising:
-
establishing, by a first portable device having a touch screen display, a first connection between the first portable device and the secured object; receiving, by the first portable device, an access credential from the secured object via the first connection, wherein the access credential received from the secured object enables the first portable device to access the secured object; establishing, by the first portable device, a second connection between the first portable device and a second portable device that is different from the first portable device based on a user input received at the touch screen display; and transmitting, by the first portable device, an additional access credential to the second portable device via the established second connection, wherein the additional access credential is used by the second portable device to enable access to the secured object by a direct connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 20)
-
-
8. A method for accessing a secured system, the method comprising:
-
receiving, by a secondary portable device, an access credential from a primary portable device; establishing, by the secondary portable device, a direct connection between the secondary portable device and the secured system; and transmitting, by the secondary portable device, the access credential to the secured system via the direct connection, wherein access to the secured system is enabled based on the access credential and enabling access to the secured system executes one or more operations of the secured system selected from the group of operations consisting of; automatically adjusting an adjustable seat of the secured system to a predetermined position; automatically adjusting one or more settings of an entertainment system of the secured system; and activating a location reporting function of the secured system. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method for accessing a secured object, the method comprising:
-
establishing, by the secured object, a connection between the secured object and a primary portable device; encrypting, by the secured object, a first access credential; transmitting, by the secured object, the encrypted first access credential to the primary portable device over a connection; establishing, by the secured object, a direct connection between the secured object and a secondary portable device; receiving, by the secured object, a second access credential from the secondary portable device over the direct connection; and enabling, by the secured object, access to the secured object based at least in part on the second access credential. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification