System and method for providing secured wireless communication with an action figure or action figure accessory
First Claim
1. A method of providing secured wireless communication with an action figure or action figure accessory, the method being implemented on the action figure or action figure accessory that includes one or more physical processors executing computer program instructions which, when executed, perform the method, the method comprising:
- detecting, by the action figure or action figure accessory, a device within a short wireless communication range;
establishing, by the action figure or action figure accessory, based on the detection, a wireless connection between the action figure or action figure accessory and the device;
obtaining, by the action figure or action figure accessory, a first key;
receiving, at the action figure or action figure accessory, first encrypted information from the device via the established wireless connection, wherein the first encrypted information comprises an encrypted version of a second key;
processing, by the action figure or action figure accessory, the first encrypted information based on the first key to determine the second key;
generating, by the action figure or action figure accessory, second encrypted information based on the second key and an identifier associated with the action figure or action figure accessory; and
providing, by the action figure or action figure accessory, the second encrypted information to the device via the established wireless connection.
1 Assignment
0 Petitions
Accused Products
Abstract
In certain implementations, secured communication with an action figure or action figure accessory may be provided. As an example, a device may be detected within a short wireless communication range of the action figure or action figure accessory. A wireless connection may be established between the action figure or action figure accessory and the device based on the detection. A first key may be obtained. First encrypted information may be received from the device via the wireless connection, and processed based on the first key to determine a second key. An identifier associated with the action figure or action figure accessory may be obtained. Second encrypted information may be generated based on the second key and the identifier, and provided to the device via the wireless connection. The second encrypted information may be used to obtain a virtual counterpart of the action figure or action figure accessory.
71 Citations
25 Claims
-
1. A method of providing secured wireless communication with an action figure or action figure accessory, the method being implemented on the action figure or action figure accessory that includes one or more physical processors executing computer program instructions which, when executed, perform the method, the method comprising:
-
detecting, by the action figure or action figure accessory, a device within a short wireless communication range; establishing, by the action figure or action figure accessory, based on the detection, a wireless connection between the action figure or action figure accessory and the device; obtaining, by the action figure or action figure accessory, a first key; receiving, at the action figure or action figure accessory, first encrypted information from the device via the established wireless connection, wherein the first encrypted information comprises an encrypted version of a second key; processing, by the action figure or action figure accessory, the first encrypted information based on the first key to determine the second key; generating, by the action figure or action figure accessory, second encrypted information based on the second key and an identifier associated with the action figure or action figure accessory; and providing, by the action figure or action figure accessory, the second encrypted information to the device via the established wireless connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An action figure or action figure accessory for providing secured wireless communication, the action figure or action figure accessory comprising:
one or more physical processors programmed to execute computer program instructions which, when executed, cause the one or more physical processors to; detect a device within a short wireless communication range; establish, based on the detection, a wireless connection between the action figure or action figure accessory and the device; obtain a first key; receive first encrypted information from the device via the established wireless connection, wherein the first encrypted information comprises an encrypted version of a second key; process the first encrypted information based on the first key to determine the second key; generate second encrypted information based on the second key and an identifier associated with the action figure or action figure accessory; and provide the second encrypted information to the device via the established wireless connection. - View Dependent Claims (11, 12, 13, 14, 15)
-
16. A method of providing secured wireless communication with an action figure or action figure accessory, the method being implemented on a computer system that includes one or more physical processors executing computer program instructions which, when executed, perform the method, the method comprising:
-
providing, by the computer system, a first public key associated with a first private key to an action figure or action figure accessory via a wireless connection between the computer system and the action figure or action figure accessory; generating, by the computer system, first encrypted information comprising an encrypted version of a second key; providing, by the computer system, the first encrypted information to the action figure or action figure accessory; receiving, at the computer system, second encrypted information from the action figure or action figure accessory via the wireless connection; processing, by the computer system, the second encrypted information based on the first private key and the second key to obtain an identifier associated with the action figure or action figure accessory; and providing, by the computer system, based on the identifier, a presentation of a virtual counterpart of the action figure or action figure accessory in a virtual environment. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A system for providing secured wireless communication with an action figure or action figure accessory, the system comprising:
one or more physical processors programmed with one or more computer program instructions which, when executed, cause the one or more physical processors to; provide a first public key associated with a first private key to an action figure or action figure accessory via a wireless connection between the computer system and the action figure or action figure accessory; generate first encrypted information comprising an encrypted version of a second key; provide the first encrypted information to the action figure or action figure accessory; receive second encrypted information from the action figure or action figure accessory via the wireless connection; process the second encrypted information based on the first private key and the second key to obtain an identifier associated with the action figure or action figure accessory; and provide, based on the identifier, a presentation of a virtual counterpart of the action figure or action figure accessory in a virtual environment. - View Dependent Claims (22, 23, 24, 25)
Specification