SHORT-RANGE DEVICE COMMUNICATIONS FOR SECURED RESOURCE ACCESS
5 Assignments
0 Petitions
Accused Products
Abstract
Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.
1 Citation
21 Claims
-
1. (canceled)
-
2. An electronic client device comprising:
-
one or more transceivers for receiving and transmitting wireless signals over a short-range communication channel; a decryption engine, wherein the decryption engine is configured to transmit a decryption key over the short-range communication channel; a communication engine that; detects a first wireless signal having been transmitted over the short-range communication channel by an electronic user device and having been received by the one or more transceivers, wherein the first wireless signal includes an identifier associated with the electronic user device; transmits a second wireless signal over the short-range communication channel using the one or more transceivers, wherein the second wireless signal includes a decryption key, and wherein the decryption key is transmitted upon satisfaction of a decryption condition; and receives decrypted data over the short-range communication channel; and an access-right determination engine that; identifies a specification of a limited-access resource using the identifier associated with the electronic user device; determines an access-enabling code using the specification of the limited-access resource; compares the decrypted data with the access-enabling code; and enables entry to one or more users based on a result of the comparison. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
9. An electronic user device comprising:
-
one or more transceivers for receiving and transmitting wireless signals over a short-range communication channel; a decryption engine, wherein the decryption engine is configured to receive a decryption key over the short-range communication channel; a communication engine that; detects a first wireless signal having been transmitted over the short-range communication channel by an electronic client device and having been received by the one or more transceivers, wherein the first wireless signal corresponds to a request for an identifier associated with the electronic user device; transmits a second wireless signal over the short-range communication channel using the one or more transceivers, wherein the second wireless signal includes the identifier associated with the electronic user device; receiving, over the short-range communication channel, a third wireless signal corresponding to decryption key, and wherein the decryption key is transmitted by the electronic client device upon satisfaction of a decryption condition; and transmits decrypted data over the short-range communication channel. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method comprising:
-
detecting a first wireless signal having been transmitted over a short-range communication channel by an electronic user device and having been received by one or more transceivers, wherein the first wireless signal includes an identifier associated with the electronic user device; transmitting a second wireless signal over the short-range communication channel using the one or more transceivers, wherein the second wireless signal includes a decryption key, and wherein the decryption key is transmitted upon satisfaction of a decryption condition; receiving decrypted data over the short-range communication channel; identifying a specification of a limited-access resource using the identifier associated with the electronic user device; determining an access-enabling code using the specification of the limited-access resource; comparing the decrypted data with the access-enabling code; and enabling entry to one or more users based on a result of the comparison. - View Dependent Claims (18, 19, 20, 21)
-
Specification