Secure pairing of end user devices with instruments
First Claim
1. A computer-implemented method, comprising:
- receiving a pairing request from an instrument including a unique access code;
receiving a pairing request from an end user mobile device comprising an end user mobile device identifier, end user identification data, and an access code;
determining that the unique access code from the instrument matches the access code from the end user mobile device;
transmitting a pairing confirmation message to the end user mobile device;
determining that the end user identification data is adequate;
transmitting a pairing confirmation message to the instrument deleting the unique access code; and
adding the end user mobile device identifier to a security group.
2 Assignments
0 Petitions
Accused Products
Abstract
A role-based access control method and/or system permits end users to securely pair their mobile devices via a pairing apparatus with one or more instruments to, for example, remotely monitor operations of the instruments. In an embodiment, the process includes a pairing apparatus receiving a pairing request from an instrument including a unique access code, and receiving a pairing request from an end user mobile device that includes an end user mobile device identifier and an access code. If the unique access code matches the end user'"'"'s access code, then the end user mobile device identifier is added to a security group and a successful pairing message is transmitted to at least one of the instrument and the end user mobile device.
23 Citations
23 Claims
-
1. A computer-implemented method, comprising:
-
receiving a pairing request from an instrument including a unique access code; receiving a pairing request from an end user mobile device comprising an end user mobile device identifier, end user identification data, and an access code; determining that the unique access code from the instrument matches the access code from the end user mobile device; transmitting a pairing confirmation message to the end user mobile device; determining that the end user identification data is adequate; transmitting a pairing confirmation message to the instrument deleting the unique access code; and adding the end user mobile device identifier to a security group. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, by a processor from an instrument, a pairing request including a unique access code; receiving, by the processor from an end user mobile device, a pairing request comprising an access code, end user identification data, and a mobile device identifier; determining, by the processor, that the unique access code matches the access code; transmitting, by the processor, a pairing confirmation message to the end user mobile device; determining, by the processor, that the end user identification data is adequate; transmitting, by the processor, a pairing confirmation message to the instrument deleting, by the processor, the unique access code; and adding, by the processor, the end user mobile device identifier to a security group. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium storing instructions configured to cause a processor to:
-
receive a pairing request including a unique access code from an instrument; receive a pairing request from an end user mobile device, the pairing request comprising an access code, end user identification data, and a mobile device identifier; determine that the unique access code matches the access code; transmit a pairing confirmation message to the end user mobile device; determine that the end user identification data is adequate; transmit a pairing confirmation message to the instrument; delete the unique access code; and add the end user mobile device identifier to a security group. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A pairing apparatus, comprising:
-
at least one processor; a communications device operably connected to the at least one processor; and a non-transitory storage device operably connected to the at least one processor, the non-transitory storage device storing program instructions configured to cause the at least one processor to; receive via the communications device a pairing request including a unique access code from an instrument; receive via the communications device a pairing request from an end user mobile device, the pairing request comprising an access code, end user identification data, and a mobile device identifier; determine that the unique access code matches the access code; transmit a pairing confirmation message to the end user mobile device; determine that the end user identification data is adequate; transmit a pairing confirmation message to the instrument; delete the unique access code; and add the end user mobile device identifier to a security group. - View Dependent Claims (20, 21, 22, 23)
-
Specification