Electronic device security
First Claim
Patent Images
1. An electronic proximal security system comprising:
- a master device including;
a first transmitter for communicating at least one device code;
a code processor;
at least one slave device including;
a receiver for communicating said at least one device code;
a code translator;
a slave controller for limiting access to at least one functionality of said slave device responsive to said at least one device code transmitted from said master device; and
an alternative master device including;
a second transmitter for communicating said at least one device code; and
an alternate code processor;
wherein said alternative master device provides alternative control signals for limiting access to functionality of said slave device.
2 Assignments
0 Petitions
Accused Products
Abstract
A preferred embodiment of the present invention provides an electronic proximal security system comprising a master device including a first transmitter for communicating at least one device code, and a code processor. The system also comprises at least one slave device including a receiver for communicating the at least one device code, a code translator, and a slave controller for limiting access to functionality of the slave device responsive to the at least one device code transmitted from the master device.
101 Citations
14 Claims
-
1. An electronic proximal security system comprising:
-
a master device including;
a first transmitter for communicating at least one device code;
a code processor;
at least one slave device including;
a receiver for communicating said at least one device code;
a code translator;
a slave controller for limiting access to at least one functionality of said slave device responsive to said at least one device code transmitted from said master device; and
an alternative master device including;
a second transmitter for communicating said at least one device code; and
an alternate code processor;
wherein said alternative master device provides alternative control signals for limiting access to functionality of said slave device.- View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
a programmable base controller for programming ones of said at least one device code.
-
-
3. The system of claim 1 wherein said master device is programmed to vary said at least one device code for varying access to functionality of said slave device.
-
4. The system of claim 1 wherein said slave device limits functionality without receiving appropriate said at least one device code.
-
5. The system of claim 1 wherein said master device communicates said at least one device code responsive to a page code communicated from said slave device.
-
6. The system of claim 5 wherein said slave device periodically transmits said page.
-
7. The system of claim 1 wherein said slave device automatically erases a memory disposed within said slave device when a user attempts to access functionality of said slave device without receiving appropriate ones of said at least one device code transmitted by said master device.
-
8. The system of claim 1 wherein said master device comprises at least one of:
-
a fob;
a piece of jewelry;
a smart card; and
an electronic device.
-
-
9. An electronic proximal security system comprising:
-
a master device including;
a first transmitter for communicating at least one device code;
a code processor;
at least one slave device including;
a receiver for communicating said at least one device code;
a code translator;
a slave controller for limiting access to at least one functionality of said slave device responsive to said at least one device code transmitted from said master device; and
a proxy master including;
a third transmitter for communicating said at least one device code;
a proxy code processor for mimicking device codes transmitted by said master device;
a proxy controller for limiting access to functionality of said proxy device responsive to said at least one device code transmitted from said master device; and
a proxy timer for continuing operation of said proxy code processor for a predetermined period of time after exceeding a transmission range of said master device.
-
-
10. A method for providing proximal security for electronic devices comprising the steps of:
-
transmitting an access code from a second device responsive to receiving a page signal transmitted from a first device;
receiving said access code at said first device, wherein said access code determines a level of access to functionality of said first device;
programming said access code for selectively controlling said level of access transmitting an alternative access code from a third device, wherein said alternative access code transmitted by said third device is substantially the same as said access code transmitted from said second device; and
receiving said alternative access code at said first device, wherein said alternative access code determines said level of access to functionality of said first device. - View Dependent Claims (11, 12, 13, 14)
transmitting said page signal from a fourth device;
receiving said access code at said fourth device, wherein said access code determines said level of access to functionality of said fourth device;
transmitting a quasi-access code from said fourth device in response to said received access code, wherein said quasi-access code continues to be transmitted for a preset period of time after failing to receive said access code; and
receiving said quasi-access code at said first device, wherein said quasi-access code determines said level of access to functionality of said first device.
-
-
12. The method of claim 11 further comprising the step of:
executing an application at said first device responsive to failing to receive at least one of said access code and said quasi-access code.
-
13. The method of claim 12 wherein said application comprises at least one of:
-
a communication application for establishing a communication link with a predetermined third party;
a location application for communicating a location of said first device to said predetermined third party; and
an alteration application for altering a functional attribute of said first device.
-
-
14. The method of claim 10 further comprising the step of:
executing an application at said first device responsive to failing to receive at least one of said access code and said alternative access code.
Specification