Physical key secure peripheral interconnection
First Claim
Patent Images
1. A method, comprising:
- providing a device;
providing a first dock;
establishing a connection between the device and the first dock;
after establishing the connection, determining, by a processor, if the connection is a first connection between the device and the first dock;
if the connection is not the first connection between the device and the first dock, determining, by the processor, if a signal strength of the connection between the device and the first dock is above a signal threshold;
if the signal strength between the device and the first dock is above the signal threshold, exchanging, by the processor, security keys between the device and the first dock, wherein the exchanged security keys were created during a previous session between the device and the first dock;
determining, by the processor, if the exchanged security keys compare to stored information, wherein the exchanged security keys are compared to a list of allowed security keys that were created during the previous session between the device and the first dock;
if the exchanged security keys do compare to the stored information, starting, by the processor, a new session between the device and the first dock;
after starting the new session, determining, by the processor, that the device has moved and the signal strength of the connection between the device and the first dock is below the signal threshold; and
terminating, by the processor, the new session.
1 Assignment
0 Petitions
Accused Products
Abstract
A multi-display device can interface with two or more different types of docking stations. The device can determine the type of dock and change the pin outs for a connector to interface with that dock. Once docked, the device can determine a charge status for the device and the dock to present the status to the user. Further, the dock can enter one of several modes, including a call receipt mode and an entertainment mode. The modes allow for expanded functionality for the device while docked. Two particular docks, the laptop dock and the smart dock, provide special functionality with the device.
249 Citations
20 Claims
-
1. A method, comprising:
-
providing a device; providing a first dock; establishing a connection between the device and the first dock; after establishing the connection, determining, by a processor, if the connection is a first connection between the device and the first dock; if the connection is not the first connection between the device and the first dock, determining, by the processor, if a signal strength of the connection between the device and the first dock is above a signal threshold; if the signal strength between the device and the first dock is above the signal threshold, exchanging, by the processor, security keys between the device and the first dock, wherein the exchanged security keys were created during a previous session between the device and the first dock; determining, by the processor, if the exchanged security keys compare to stored information, wherein the exchanged security keys are compared to a list of allowed security keys that were created during the previous session between the device and the first dock; if the exchanged security keys do compare to the stored information, starting, by the processor, a new session between the device and the first dock; after starting the new session, determining, by the processor, that the device has moved and the signal strength of the connection between the device and the first dock is below the signal threshold; and terminating, by the processor, the new session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device, comprising:
-
a memory; and a processor in communication with the memory, the processor programmed to; establish a connection between the device and a first dock; after establishing the connection, determine if the connection is a first connection between the device and the first dock; if the connection is not the first connection between the device and the first dock, determine if a signal strength of the connection between the device and the first dock is above a signal threshold; if the signal strength between the device and the first dock is above the signal threshold, exchange security keys between the device and the first dock, wherein the exchanged security keys were created during a previous session between the device and the first dock; determine if the exchanged security keys compare to stored information; if the exchanged security keys do compare to the stored information, start a new session between the device and the first docks; after starting the new session, determine that the device has moved and the signal strength of the connection between the device and the first dock is below the signal threshold; and terminate the new session. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium having stored thereon computer-executable instructions, the computer-executable instructions causing a processor of a device to execute a method for managing the docking of the device, the computer-executable instructions comprising:
-
instructions to establish a connection between the device and a first dock; after establishing the connection, instructions to determine if the connection is a first connection between the device and the first dock; if the connection is not the first connection between the device and the first dock, instructions to determine if a signal strength of the connection between the device and the first dock is above a signal threshold; if the signal strength between the device and the first dock is above the signal threshold, instructions to exchange security keys between the device and the first dock, wherein the exchanged security keys were created during a previous session between the device and the first dock; instructions to determine if the exchanged security keys compare to stored information; if the exchanged security keys do compare to the stored information, instructions to start a new session between the device and the first dock; after starting the new session, instructions to determine the device has moved and the signal strength of the connection between the device and the first dock is below the signal threshold; and instructions to terminate the new session. - View Dependent Claims (17, 18, 19, 20)
-
Specification