BLUETOOTH DEVICE AS SECURITY ACCESS KEY
0 Assignments
0 Petitions
Accused Products
Abstract
This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the communications circuitry. When a host device is within the personal area network, the key may transmit data received by a transceiver on the host device. In response to receiving the data, the host device may perform an operation (e.g., an authentication operation). In some embodiments, the key may transmit data identifying an operation for the host device to perform. In some embodiments, the host device may store in memory key identification information and an associated operation which may be retrieved when the key is brought in proximity of the host device.
1 Citation
21 Claims
-
1. (canceled)
-
2. A method for directing a remote computing device to execute a first operation, the method comprising, at an electronic key:
-
initiating a communication channel with the remote computing device; establishing an identity of the remote computing device; retrieving, from a set of preference data stored on the electronic key, a first subset of preference data based at least in part on the identity, wherein the set of preference data comprises different subsets of preference data for a plurality of different remote computing devices; and communicating, to the remote computing device over the communication channel, the first subset, wherein the remote computing device executes the first operation based at least in part on the first subset. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
9. An electronic key, comprising:
-
at least one processor; and at least one memory configured to store instructions that, when executed by the at least one processor, cause the electronic key to; initiate a communication channel with a remote computing device; establish an identity of the remote computing device; retrieve, from a set of preference data stored on the electronic key, a first subset of preference data based at least in part on the identity, wherein the set of preference data comprises different subsets of preference data for a plurality of different remote computing devices; and communicate, to the remote computing device over the communication channel, the first subset, wherein the remote computing device executes a first operation based at least in part on the first subset. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. At least one non-transitory machine-readable storage medium storing instructions that, when executed by at least one processor included in an electronic key, cause the electronic key to carry out steps that include:
-
initiating a communication channel with a remote computing device; establishing an identity of the remote computing device; retrieving, from a set of preference data stored on the electronic key, a first subset of preference data based at least in part on the identity, wherein the set of preference data comprises different subsets of preference data for a plurality of different remote computing devices; and communicating, to the remote computing device over the communication channel, the first subset, wherein the remote computing device executes a first operation based at least in part on the first subset. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification