Proximity-based system for automatic application initialization
First Claim
1. A system with automatic access to information, comprising:
- a first personal digital key (PDK) associated with a first user having a first user priority, the first PDK comprising information regarding the first user priority;
a second PDK associated with a user having a second user priority, the second PDK comprising information regarding the second user priority;
a reader configured to detect the first PDK and second PDK within a proximity zone; and
a shared computing device associated with the reader and configured to provide access to the first user responsive to the reader detecting the first PDK and, responsive to the reader detecting the second PDK that was not detected when the first user was provided access, providing the second user access to one or more of the shared computing device in use by the first user and a session of the first user based on determining the second user priority relative to the first user priority based on the information regarding the first user priority and the information regarding the second user priority.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method provide automatic access to applications or data. A portable physical device, referred to herein as a Personal Digital Key or “PDK”, stores one or more profiles in memory. In one embodiment, a biometric profile is acquired in a secure trusted process and uniquely associated with a user that is authorized to use and associated with the PDK. The PDK wirelessly transmits identification information including a unique PDK identification number, and optionally the biometric profile and a profile over a secure wireless channel to a reader. A computing device is coupled to the reader. An auto login server is coupled to the reader and the computing device and launches one or more applications associated with a user name identified by the received profile.
49 Citations
20 Claims
-
1. A system with automatic access to information, comprising:
-
a first personal digital key (PDK) associated with a first user having a first user priority, the first PDK comprising information regarding the first user priority; a second PDK associated with a user having a second user priority, the second PDK comprising information regarding the second user priority; a reader configured to detect the first PDK and second PDK within a proximity zone; and a shared computing device associated with the reader and configured to provide access to the first user responsive to the reader detecting the first PDK and, responsive to the reader detecting the second PDK that was not detected when the first user was provided access, providing the second user access to one or more of the shared computing device in use by the first user and a session of the first user based on determining the second user priority relative to the first user priority based on the information regarding the first user priority and the information regarding the second user priority. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for securing access to information, comprising:
-
detecting a first personal digital key (PDK) associated with a first user in a proximity zone of a reader, the first user having a first user priority, the first PDK comprising information regarding the first user priority; providing the first user access to a shared computing device associated with the reader; detecting a second personal digital key (PDK) associated with a second user in the proximity zone that was non-present during the detecting of the first PDK, the second user having a second user priority, the second PDK comprising information regarding the second user priority; and providing the second user access to one or more of the shared computing device in use by the first user and a session of the first user based on determining the second user priority relative to the first user priority based on the information regarding the first user priority and the information regarding the second user priority. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification