US20090096573A1 - Activation of Cryptographically Paired Device - Google Patents

Activation of Cryptographically Paired Device Download PDF

Info

Publication number
US20090096573A1
US20090096573A1 US12/191,282 US19128208A US2009096573A1 US 20090096573 A1 US20090096573 A1 US 20090096573A1 US 19128208 A US19128208 A US 19128208A US 2009096573 A1 US2009096573 A1 US 2009096573A1
Authority
US
United States
Prior art keywords
detecting
functionality
event
responsive
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/191,282
Inventor
Joshua V. Graessley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apple Inc
Original Assignee
Apple Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apple Inc filed Critical Apple Inc
Priority to US12/191,282 priority Critical patent/US20090096573A1/en
Assigned to APPLE INC. reassignment APPLE INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GRAESSLEY, JOSHUA V.
Publication of US20090096573A1 publication Critical patent/US20090096573A1/en
Priority to US15/253,238 priority patent/US10034167B1/en
Priority to US15/984,218 priority patent/US10405177B2/en
Priority to US15/984,227 priority patent/US10405178B2/en
Priority to US16/556,806 priority patent/US10869191B2/en
Priority to US17/094,627 priority patent/US11540124B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W50/00Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
    • B60W50/08Interaction between the driver and the control system
    • B60W50/12Limiting control by the driver depending on vehicle state, e.g. interlocking means for the control input for preventing unsafe operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • H04W4/21Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W50/00Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
    • B60W2050/0062Adapting control system settings
    • B60W2050/0075Automatic parameter input, automatic initialising or calibrating means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W2520/00Input parameters relating to overall vehicle dynamics
    • B60W2520/10Longitudinal speed
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W2540/00Input parameters relating to occupants
    • B60W2540/043Identity of occupants
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W2556/00Input parameters relating to data
    • B60W2556/45External transmission of data to or from the vehicle
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W2720/00Output or target parameters relating to overall vehicle dynamics
    • B60W2720/10Longitudinal speed
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/26Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 specially adapted for navigation in a road network
    • G01C21/34Route searching; Route guidance
    • G01C21/36Input/output arrangements for on-board computers
    • G01C21/3688Systems comprising multiple parts or multiple output devices (not client-server), e.g. detachable faceplates, key fobs or multiple output screens
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/09Arrangements for giving variable traffic instructions
    • G08G1/0962Arrangements for giving variable traffic instructions having an indicator mounted inside the vehicle, e.g. giving voice messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Definitions

  • Some popular electronic devices installed in vehicles include an anti-theft function where the device is automatically deactivated when the device loses power (e.g., a battery is removed). This function is designed to deter theft since the device cannot be functioned outside the vehicle.
  • the user must call an activation service to have the device reactivated.
  • the user provides a serial number and/or other identifying information to the activation service and the service automatically reactivates the device for the user. In some situations, however, the user may not have the serial number and/or phone service to communicate with the activation service.
  • Other devices allow the user to manually enter a code into the device to reactivate the device.
  • the user may not remember the code and therefore cannot reactivate the device until the code can be obtained. Obtaining the code may be difficult or impossible if the user forgot the code and the code was written in a manual stored at a different location (e.g., the user's home).
  • An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
  • a vehicle can be activated by a first key (e.g., a master key) or a second key.
  • the first key or master key can provide the user unlimited access to the car or the car's features without further authentication.
  • the second key initiates a process by which the car checks for the presence of a device (e.g., a mobile phone, medial player, text messaging device) that has been previously cryptographically paired with the car before allowing the user access to the car or certain of the car's features.
  • a device e.g., a mobile phone, medial player, text messaging device
  • the key can initiate a process where the car checks for the presence of the cryptographically paired device, and ensures that the messaging functionality of the device is disabled before allowing the car to start.
  • FIG. 1 is a block diagram of an example system for activating or reactivating functionality of a cryptographically paired device.
  • FIG. 2 is a flow diagram of an example process for activating or reactivating functionality of a cryptographically paired device.
  • FIG. 3 is a block diagram of a cryptographically paired device architecture for implementing the features described in reference to FIGS. 1-2 .
  • FIG. 1 is a block diagram of an example system for activating or reactivating functionality of a cryptographically paired device.
  • the system includes cryptographically paired devices 102 , 104 that are within transmission range of each other.
  • the transmission range defines a region 100 .
  • the devices 102 , 104 can detect each other's presence.
  • the devices 102 , 104 can be mobile devices, wireless devices, tethered devices, handheld computers, personal digital assistants, cellular telephones, navigation devices, video game consoles, non-GPS head units (e.g., car stereos), digital cameras, laptops, or any other device capable of cryptographically pairing with another device.
  • device 102 is a navigation device installed in a vehicle which has been cryptographically paired with a mobile device 104 (e.g., a mobile phone) while operating in region 100 (e.g., inside the vehicle).
  • a mobile device 104 e.g., a mobile phone
  • Navigation device 102 can include satellite navigation functionality designed to acquire position data to locate a user on a road using previously stored or newly acquired map databases.
  • Navigation device 102 can include circuitry and sensors for supporting a location determining capability, such as that provided by the global positioning system (GPS).
  • GPS global positioning system
  • navigation device 102 can implement multiple device functionalities in addition to navigation, such as phone, email, and media processing functionalities, for example.
  • Mobile device 104 can be cryptographically paired with navigation device 102 using known wireless or wired protocol.
  • navigation device 102 and a mobile device 104 can be wirelessly paired to allow identification, activation, or deactivation of one or more functions on navigation device 102 .
  • the initial pairing can be implemented out of band using, for example, Bluetooth pairing technology.
  • mobile device 104 can be tethered to navigation device 102 using a wired communication link (e.g., Universal Serial Bus (USB)).
  • Mobile device 104 can also be inserted in a dock (not shown) that is tethered or wirelessly connected to navigation device 102 .
  • USB Universal Serial Bus
  • a cryptographic pairing procedure can include navigation device 102 scanning for mobile device 104 or other devices, such as discovery mode used by Bluetooth-enabled devices.
  • navigation device 102 can lock out the ability to pair until a previously paired mobile device 104 is again detected. Navigation device 102 can deactivate some or all navigation functionality or other functionality until navigation device 102 detects the presence of the previously paired mobile device 104 . For example, if mobile device 104 is authenticated and a cryptographic pairing has previously occurred with navigation device 102 , then navigation device 102 can reactivate its deactivated functionality based on redetection of mobile device 104 . If the cryptographic pairing fails, navigation device 102 can deactivate one or more of its functions based on the failed pairing. In some implementations, the failed pairing may simply disallow access to navigation device 102 by mobile device 104 .
  • the cryptography technology used to initially pair navigation device 102 and mobile device 104 can, for example, include various encryption techniques, cryptographic functions, protocols, and algorithms that can pair (e.g., bind) one or more devices to one another to ensure data protection and security between the devices.
  • a numeric comparison association technique can be used to cryptographically pair mobile device 104 to navigation device 102 .
  • the technique can be used when both navigation device 102 and mobile device 104 are capable of displaying an n-digit number (e.g., 6 or 13 digits) and further, can allow a user to enter a selection, for example.
  • an out of band (OOB) technique can be used to cryptographically pair mobile device 104 to navigation device 102 .
  • OOB out of band
  • the technique can be used when an OOB mechanism is used to both discover devices as well as exchange or transfer cryptographic numbers used in the pairing process.
  • a “passkey entry” technique can be used to cryptographically pair mobile device 104 to navigation device 102 .
  • the passkey technique can be used when navigation device 102 has input capability, but does not have the capability to display n-digits and the mobile device 104 device has output capabilities, for example.
  • Other pairing techniques are also possible. Implementing any or all of the above pairing techniques alone or in combination can provide an advantage to the user by ensuring authenticity of a particular device including user identification and data integrity.
  • mobile device 104 may become undetectable by navigation device 102 when mobile device 104 is no longer proximate to navigation device 102 , such as would occur when mobile device 104 travels outside region 100 .
  • navigation device 102 may be locked or deactivated until mobile device 104 reenters region 100 .
  • region 100 could be the interior of the vehicle. For example, if the user leaves the vehicle holding the mobile device 104 in their hand, navigation device 102 can deactivate usage of any or all its functionality until the mobile device 104 is again available for detection (e.g., within the vehicle).
  • navigation device 102 can lose power or detect unauthorized use and in response deactivate at least some of its own functionality including, but not limited to, pairing functions, communication functions, mobile phone functions, and radio functions.
  • the redetection of mobile device 104 by navigation device 102 can initiate a reactivation of one or more deactivated functions of navigation device 102 .
  • the cryptographic pairing can deter theft or misuse of information or property.
  • the owner of navigation device 102 can specify one or mobile devices for use with navigation device 102 .
  • the navigation device 102 can include configuration menus to allow users to prevent users with unauthorized devices from using or abusing functionality of navigation device 102 .
  • Navigation device 102 can be configured to allow the owner of the vehicle to operate the navigation device 102 if the owner is carrying the authorized mobile device 104 on her person. When the authorized mobile device 104 is cryptographically paired with navigation device 102 , full functionality may be allowed on navigation device 102 . In contrast, if a user who does not have an authorized mobile device 104 , one or more functions on navigation device 102 can be locked until an authorized mobile device 104 is detected by the navigation device 102 .
  • cryptographic pairing can be used to define users and/or user limits for using navigation device 102 .
  • Navigation device 102 can be configured to wirelessly activate or deactivate one or more functions when mobile device 104 is present.
  • a driver owning mobile device 104 can have restrictions on using navigation device 102 .
  • navigation device 102 may lock down a stereo system, phone function, or other function until the driver lowers the speed or returns to an approved location.
  • the mobile device 104 could also cause a speed limiter in the vehicle to trigger, thus preventing the vehicle from exceeding a certain speed, instead of, or in addition to, disabling some functionality until the speed is reduced.
  • several devices can be configured to pair with navigation device 102 . If several devices are proximate to navigation device 102 , one device can be selected as an “always link to” device. For example, an owner of navigation device 102 can configure navigation device 102 to accept one mobile device over others mobile devices when several viable linking mobile devices are detected.
  • cryptographic pairing can be performed automatically using a tethered protocol such as USB.
  • a user can access a menu on mobile device 104 to place mobile device 104 in a tethered pairing mode.
  • the user can access a menu on navigation device 102 to enable searching for a particular mobile device 104 .
  • navigation device 102 can search for mobile device 104 .
  • the cryptographic pairing can occur upon detecting the presence of mobile device 104 over the USB cable.
  • a degree of privacy can be achieved by enabling navigation device 102 usage based on a cryptographic pairing.
  • encrypted pairing information e.g., previous pairing information or passkey information
  • FIG. 2 is a flow diagram of an example process 200 for activating or reactivating functionality of a cryptographically paired device. While the reactivating process 200 described below includes a number of operations that appear to occur in a specific order, it should be apparent that the process 200 can include more or fewer operations, which can be executed serially or in parallel (e.g., using parallel processors or a multi-threading environment).
  • the process 200 includes detecting an event at a first device ( 202 ).
  • the event can be detected by the device 102 .
  • the event can include a power loss (e.g., battery removal or drainage) of the first device, a lock down, active or passive eavesdrop (e.g., an attack by an external device, hacker, etc.), or another event causing the first device to suspect unauthorized access or loss of power.
  • the first device can deactivate at least some of its functionality ( 204 ). For example, if the first device is a navigation device or multimedia system, then the first device can deactivate some or all of its navigation functions, mobile phone functions, communication functions, and radio functions on navigation device 102 .
  • the deactivation can include locking some or all functionality on the first device from any or all users, based on the power loss or a detected security breach, for example.
  • the deactivation can include locking out other features, such as communication protocols. For example, if an unauthorized access is detected, the first device can disable its communication ports (wired or wireless) until a user code is entered, or an authorized pairing occurs (e.g., approved cryptographic pairing with a second device). In particular, a pairing with an authorized second device may be requested by the first device to reactivate some or all functionality, for example.
  • the first device e.g., device 102
  • the first device can perform a search for, or detect the presence of, a second device (e.g., device 104 ) cryptographically paired with the first device (e.g., device 102 ) using a wired or wireless communication link ( 206 ).
  • a second device e.g., device 104
  • the first device e.g., navigation system 102
  • the search may be performed upon replacing a vehicle battery or reattaching a wired vehicle navigation system.
  • the first device can initiate activation or reactivation of one or more of its features or functions ( 208 ). For example, if the first device is a navigation or multimedia system, then upon detecting a second device (e.g., mobile phone or smart phone), the navigation or multimedia system can unlock, activate or reactivate all or a portion of its functionality. The unlocking, activation or reactivation can be based on the identifying second device, as a previously paired or authenticated device.
  • a second device e.g., mobile phone or smart phone
  • the first device in response to detecting the second device, can initiate a locking or deactivation of one or more of its features or functions.
  • the second device acts as wireless key or remote control for locking out the first device or its functionality.
  • the second device e.g., a mobile device
  • the first device e.g., a navigation or multimedia system, stereo system, hands free telephone
  • FIG. 3 is a block diagram of an example system architecture for a cryptographically paired device (e.g., devices 102 , 104 of FIG. 1 ) for implementing the features described in reference to FIGS. 1 and 2 .
  • a paired device 300 generally includes one or more computer-readable mediums 302 , a processing system 304 , an Input/Output (I/O) subsystem 306 , radio frequency (RF) circuitry 308 , and audio circuitry 310 . These components may be coupled by one or more communication buses or signal lines 303 .
  • the paired device 300 can be any portable electronic device, including but not limited to, an earpiece, a handheld computer, a tablet computer, a mobile phone, a media player, a personal digital assistant (PDA) and the like, including a combination of two or more of these items.
  • PDA personal digital assistant
  • FIG. 3 is only one example of an architecture for the paired device 300 , and that the device 300 could have more or fewer components than shown, or a different configuration of components.
  • the various components shown in FIG. 3 can be implemented in hardware, software, or a combination of both hardware and software, including one or more signal processing and/or application specific integrated circuits.
  • the RF circuitry 308 (e.g., a wireless transceiver) is used to send and receive information over a wireless link or network to one or more other devices and includes well-known circuitry for performing this function, including but not limited to an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC chipset, memory, etc.
  • the RF circuitry 308 is capable of establishing and maintaining communications with other devices using one or more communications protocols, including but not limited to time division multiple access (TDMA), code division multiple access (CDMA), global system for mobile communications (GSM), Enhanced Data GSM Environment (EDGE), wideband code division multiple access (W-CDMA), Wi-Fi (such as IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/or IEEE 802.11n), Bluetooth, Wi-MAX, voice over Internet Protocol (VoIP), a protocol for email, instant messaging, and/or a short message service (SMS), or any other suitable communication protocol, including communication protocols not yet developed as of the filing date of this document.
  • TDMA time division multiple access
  • CDMA code division multiple access
  • GSM global system for mobile communications
  • EDGE Enhanced Data GSM Environment
  • W-CDMA wideband code division multiple access
  • Wi-Fi such as IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/or IEEE 802.11n
  • Bluetooth Wi-
  • the RF circuitry 308 and the audio circuitry 310 are coupled to the processing system 304 via the peripherals interface 316 .
  • the interface 316 includes various known components for establishing and maintaining communication between peripherals and the processing system 304 .
  • the audio circuitry 310 is coupled to an audio speaker 350 and a microphone 352 and includes known circuitry for providing telephony functions, such as processing voice signals received from interface 316 to enable a user to communicate in real-time with other users, for example.
  • the audio circuitry 310 includes a headphone jack (not shown).
  • Voice and data information received by the RF circuitry 308 and the audio circuitry 310 (e.g., in speech recognition or voice command applications) is sent to one or more processors 318 via the peripherals interface 316 .
  • the one or more processors 318 are configurable to process various data formats for one or more applications programs 330 stored on the medium 302 .
  • data includes but is not limited to text, graphics, Web pages, JAVA applets, widgets, emails, instant messages, voice, digital images or video, widgets, MP3s, etc., which can be used by one or more applications programs 330 stored on the medium 302 (e.g., Web browser, email, etc.).
  • the peripherals interface 316 couples the input and output peripherals of the device to the processor 318 and the computer-readable medium 302 .
  • the one or more processors 318 communicate with the one or more computer-readable mediums 302 via a controller 320 .
  • the computer-readable medium 302 can be any device or medium that can store code and/or data for use by the one or more processors 318 .
  • the medium 302 can include a memory hierarchy, including but not limited to cache, main memory and secondary memory.
  • the memory hierarchy can be implemented using any combination of RAM (e.g., SRAM, DRAM, DDRAM), ROM, FLASH, magnetic and/or optical storage devices, such as disk drives, magnetic tape, CDs (compact disks) and DVDs (digital video discs).
  • the medium 302 may also include a transmission medium for carrying information-bearing signals indicative of computer instructions or data (with or without a carrier wave upon which the signals are modulated).
  • the transmission medium may include a communications network, including but not limited to the Internet (also referred to as the World Wide Web), intranet(s), Local Area Networks (LANs), Wide Local Area Networks (WLANs), Storage Area Networks (SANs), Metropolitan Area Networks (MAN) and the like.
  • the one or more processors 318 run various software components stored in the medium 302 to perform various functions for the device 300 .
  • the software components include an operating system 322 , a user interface module (or set of instructions) 324 , a contact/motion module (or set of instructions) 326 , a communication module (or set of instructions) 328 , and one or more applications (or set of instructions) 330 .
  • the communication module 328 can be used to implement some of the operations (e.g., BluetoothTM pairing) as described in reference to FIGS. 1 and 2 .
  • the operating system 322 (e.g., Darwin, RTXC, LINUX, UNIX, OS X, WINDOWS, or an embedded operating system such as VxWorks) includes various procedures, sets of instructions, software components and/or drivers for controlling and managing general system tasks (e.g., memory management, storage device control, power management, etc.) and facilitates communication between various hardware and software components.
  • general system tasks e.g., memory management, storage device control, power management, etc.
  • the user interface module 324 facilitates and manages user-received input.
  • the user interface module 324 may be designed to receive a user input and translate the input into a particular response.
  • the response can be presented in a display as a sidebar layout, a web page layout, an audio sound, or any other layout that allows for the presentation of user-customizable content.
  • the communication module 328 facilitates communication with other devices over one or more external ports or via RF circuitry 308 and includes various software components for handling data received from the RF circuitry 308 and/or the external port.
  • the RF circuitry 308 e.g., Bluetooth
  • the RF circuitry 308 is adapted for coupling directly to other devices or indirectly over a network (e.g., the Internet, wireless LAN, etc.).
  • the BluetoothTM circuitry provides for connecting and/or pairing devices, such as device 102 and 104 .
  • the circuitry can provide a way to connect and exchange information between devices such as mobile phones, laptops, PCs, navigation systems, printers, digital cameras, and video game consoles over a secure, short-range radio frequency.
  • the one or more applications 330 can include any applications installed on the device 300 , including without limitation, a browser, address book, contact list, email, instant messaging, word processing, keyboard emulation, widgets, JAVA-enabled applications, encryption, digital rights management, voice recognition, voice replication, location determination capability (such as that provided by the global positioning system (GPS)), a music player (which plays back recorded music stored in one or more files, such as MP3 or AAC files), etc.
  • a browser address book, contact list, email, instant messaging, word processing, keyboard emulation, widgets, JAVA-enabled applications, encryption, digital rights management, voice recognition, voice replication, location determination capability (such as that provided by the global positioning system (GPS)), a music player (which plays back recorded music stored in one or more files, such as MP3 or AAC files), etc.
  • GPS global positioning system
  • the contact/motion module 326 includes various software components for performing various tasks associated with the touch-sensitive display system 312 , as previously described with respect to the embodiments in FIGS. 1-3 .
  • the I/O subsystem 306 is coupled to the touch-sensitive display system 312 and a vehicle interface 314 for controlling or performing various functions, such as power control, speaker volume control, ring tone loudness, keyboard input, scrolling, hold, menu, screen lock, clearing and ending communications and the like.
  • the touch-sensitive display 312 communicates with the processing system 304 via the touch sensitive screen controller 332 , which includes various components for processing user input (e.g., scanning hardware).
  • the one or more other input controllers 334 receives/sends electrical signals from/to the vehicle interface 314 .
  • the vehicle interface 314 may include physical buttons (e.g., push buttons, rocker buttons, etc.), dials, slider switches, sticks, and so forth.
  • the touch-sensitive display 312 displays visual output to the user in a GUI.
  • the visual output may include text, graphics, video, and any combination thereof. Some or all of the visual output may correspond to user-interface objects.
  • the touch-sensitive display 312 may also accept input from the user based on haptic and/or tactile contact.
  • the touch-sensitive display 312 forms a touch-sensitive surface that accepts user input, including multiple touches and finger gestures (e.g., a multi-touch-sensitive surface).
  • the touch-sensitive display 312 and the touch screen controller 332 (along with any associated modules and/or sets of instructions in the medium 302 ) detects contact (and any movement or release of the contact) and finger gestures on the touch-sensitive display 312 and converts the detected contact or gestures into interaction with user-interface objects, such as one or more soft keys, that are displayed on the touch screen when the contact occurs.
  • a point of contact between the touch-sensitive display 312 and the user corresponds to one or more digits of the user.
  • the touch-sensitive display 312 may use LCD (liquid crystal display) technology, or LPD (light emitting polymer display) technology, although other display technologies may be used in other embodiments.
  • the touch-sensitive display 312 and touch screen controller 332 may detect contact and any movement or release thereof using any of a plurality of touch sensitivity technologies, including but not limited to capacitive, resistive, infrared, and surface acoustic wave technologies, as well as other proximity sensor arrays or other elements for determining one or more points of contact with the touch-sensitive display 312 .
  • touch sensitivity technologies including but not limited to capacitive, resistive, infrared, and surface acoustic wave technologies, as well as other proximity sensor arrays or other elements for determining one or more points of contact with the touch-sensitive display 312 .
  • the touch-sensitive display may be analogous to the multi-touch sensitive tablets described in the following U.S. Pat. No. 6,323,846 (Westerman et al.), U.S. Pat. No. 6,570,557 (Westerman et al.), and/or U.S. Pat. No. 6,677,932 (Westerman), and/or U.S. Patent Publication 2002/0015024A1, each of which is hereby incorporated by reference.
  • the touch screen 126 displays visual output from the portable device, whereas touch sensitive tablets do not provide visual output.
  • the touch-sensitive display 312 may have a resolution in excess of 100 dpi. In an exemplary embodiment, the touch-sensitive display 312 may have a resolution of approximately 168 dpi.
  • the user may make contact with the touch-sensitive display 312 using any suitable object or appendage, such as a stylus, pen, finger, and so forth.
  • the device 300 may include a touchpad (not shown) for activating or deactivating particular functions.
  • the touchpad is a touch-sensitive area of the device that, unlike the touch screen, does not display visual output.
  • the touchpad may be a touch-sensitive surface that is separate from the touch-sensitive display 312 or an extension of the touch-sensitive surface formed by the touch-sensitive display 312 .
  • the device 300 also includes a power system 344 for powering the various hardware components.
  • the power system 344 can include a power management system, one or more power sources (e.g., battery, alternating current (AC)), a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator (e.g., a light emitting diode (LED)) and any other components typically associated with the generation, management and distribution of power in portable devices.
  • a power management system e.g., one or more power sources (e.g., battery, alternating current (AC)), a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator (e.g., a light emitting diode (LED)) and any other components typically associated with the generation, management and distribution of power in portable devices.
  • power sources e.g., battery, alternating current (AC)
  • AC alternating current
  • a recharging system e
  • the peripherals interface 316 , the one or more processors 318 , and the memory controller 320 may be implemented on a single chip, such as the processing system 304 . In some other embodiments, they may be implemented on separate chips.
  • the described features can be implemented advantageously in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device.
  • a computer program is a set of instructions that can be used, directly or indirectly, in a computer to perform a certain activity or bring about a certain result.
  • a computer program can be written in any form of programming language (e.g., Objective-C, Java), including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • Suitable processors for the execution of a program of instructions include, by way of example, both general and special purpose microprocessors, and the sole processor or one of multiple processors or cores, of any kind of computer.
  • a processor will receive instructions and data from a read-only memory or a random access memory or both.
  • the essential elements of a computer are a processor for executing instructions and one or more memories for storing instructions and data.
  • a computer will also include, or be operatively coupled to communicate with, one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks.
  • Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
  • semiconductor memory devices such as EPROM, EEPROM, and flash memory devices
  • magnetic disks such as internal hard disks and removable disks
  • magneto-optical disks and CD-ROM and DVD-ROM disks.
  • the processor and the memory can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits).
  • ASICs application-specific integrated circuits
  • the features can be implemented on a computer having a display device such as a CRT (cathode ray tube) or LCD (liquid crystal display) monitor for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user can provide input to the computer.
  • a display device such as a CRT (cathode ray tube) or LCD (liquid crystal display) monitor for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user can provide input to the computer.

Abstract

An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.

Description

    RELATED APPLICATION
  • This patent application claims priority from U.S. Provisional Patent Application No. 60/979,035, for “Activation of Cryptographically Paired Device,” filed Oct. 10, 2007, which provisional patent application is incorporated by reference herein in its entirety.
  • TECHNICAL FIELD
  • The subject matter of this patent application is generally related to activation or reactivation of electronic devices.
  • BACKGROUND
  • Some popular electronic devices installed in vehicles (e.g., a radio, a navigation system) include an anti-theft function where the device is automatically deactivated when the device loses power (e.g., a battery is removed). This function is designed to deter theft since the device cannot be functioned outside the vehicle. For some devices, the user must call an activation service to have the device reactivated. Typically, the user provides a serial number and/or other identifying information to the activation service and the service automatically reactivates the device for the user. In some situations, however, the user may not have the serial number and/or phone service to communicate with the activation service. Other devices allow the user to manually enter a code into the device to reactivate the device. For manually activated devices, the user may not remember the code and therefore cannot reactivate the device until the code can be obtained. Obtaining the code may be difficult or impossible if the user forgot the code and the code was written in a manual stored at a different location (e.g., the user's home).
  • SUMMARY
  • An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated.
  • In some implementations, a vehicle can be activated by a first key (e.g., a master key) or a second key. The first key or master key can provide the user unlimited access to the car or the car's features without further authentication. The second key, however, initiates a process by which the car checks for the presence of a device (e.g., a mobile phone, medial player, text messaging device) that has been previously cryptographically paired with the car before allowing the user access to the car or certain of the car's features. For example, a car owner may desire to allow other drivers to drive their car but only under certain conditions, such as prohibiting the driver from sending instant messages while driving the car. The key can initiate a process where the car checks for the presence of the cryptographically paired device, and ensures that the messaging functionality of the device is disabled before allowing the car to start.
  • DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram of an example system for activating or reactivating functionality of a cryptographically paired device.
  • FIG. 2 is a flow diagram of an example process for activating or reactivating functionality of a cryptographically paired device.
  • FIG. 3 is a block diagram of a cryptographically paired device architecture for implementing the features described in reference to FIGS. 1-2.
  • DETAILED DESCRIPTION System Overview
  • FIG. 1 is a block diagram of an example system for activating or reactivating functionality of a cryptographically paired device. The system includes cryptographically paired devices 102, 104 that are within transmission range of each other. The transmission range defines a region 100. While the devices 102, 104 are within the region 100, the devices 102, 104 can detect each other's presence. Generally, the devices 102, 104 can be mobile devices, wireless devices, tethered devices, handheld computers, personal digital assistants, cellular telephones, navigation devices, video game consoles, non-GPS head units (e.g., car stereos), digital cameras, laptops, or any other device capable of cryptographically pairing with another device. In the examples that follow, device 102 is a navigation device installed in a vehicle which has been cryptographically paired with a mobile device 104 (e.g., a mobile phone) while operating in region 100 (e.g., inside the vehicle).
  • Navigation device 102 can include satellite navigation functionality designed to acquire position data to locate a user on a road using previously stored or newly acquired map databases. Navigation device 102 can include circuitry and sensors for supporting a location determining capability, such as that provided by the global positioning system (GPS). In some implementations, navigation device 102 can implement multiple device functionalities in addition to navigation, such as phone, email, and media processing functionalities, for example.
  • Mobile device 104 can be cryptographically paired with navigation device 102 using known wireless or wired protocol. In one example, navigation device 102 and a mobile device 104 can be wirelessly paired to allow identification, activation, or deactivation of one or more functions on navigation device 102. The initial pairing can be implemented out of band using, for example, Bluetooth pairing technology. In another example, mobile device 104 can be tethered to navigation device 102 using a wired communication link (e.g., Universal Serial Bus (USB)). Mobile device 104 can also be inserted in a dock (not shown) that is tethered or wirelessly connected to navigation device 102. If mobile device 104 has not been previously paired or configured to function with navigation device 102, a cryptographic pairing can be performed to establish the pairing. A cryptographic pairing procedure can include navigation device 102 scanning for mobile device 104 or other devices, such as discovery mode used by Bluetooth-enabled devices.
  • In some implementations, navigation device 102 can lock out the ability to pair until a previously paired mobile device 104 is again detected. Navigation device 102 can deactivate some or all navigation functionality or other functionality until navigation device 102 detects the presence of the previously paired mobile device 104. For example, if mobile device 104 is authenticated and a cryptographic pairing has previously occurred with navigation device 102, then navigation device 102 can reactivate its deactivated functionality based on redetection of mobile device 104. If the cryptographic pairing fails, navigation device 102 can deactivate one or more of its functions based on the failed pairing. In some implementations, the failed pairing may simply disallow access to navigation device 102 by mobile device 104.
  • The cryptography technology used to initially pair navigation device 102 and mobile device 104 can, for example, include various encryption techniques, cryptographic functions, protocols, and algorithms that can pair (e.g., bind) one or more devices to one another to ensure data protection and security between the devices. In some implementations, a numeric comparison association technique can be used to cryptographically pair mobile device 104 to navigation device 102. The technique can be used when both navigation device 102 and mobile device 104 are capable of displaying an n-digit number (e.g., 6 or 13 digits) and further, can allow a user to enter a selection, for example. In other implementations, an out of band (OOB) technique can be used to cryptographically pair mobile device 104 to navigation device 102. The technique can be used when an OOB mechanism is used to both discover devices as well as exchange or transfer cryptographic numbers used in the pairing process. In yet other implementations, a “passkey entry” technique can be used to cryptographically pair mobile device 104 to navigation device 102. The passkey technique can be used when navigation device 102 has input capability, but does not have the capability to display n-digits and the mobile device 104 device has output capabilities, for example. Other pairing techniques are also possible. Implementing any or all of the above pairing techniques alone or in combination can provide an advantage to the user by ensuring authenticity of a particular device including user identification and data integrity.
  • In some implementations, mobile device 104 may become undetectable by navigation device 102 when mobile device 104 is no longer proximate to navigation device 102, such as would occur when mobile device 104 travels outside region 100. In such a scenario, navigation device 102 may be locked or deactivated until mobile device 104 reenters region 100. In this example, region 100 could be the interior of the vehicle. For example, if the user leaves the vehicle holding the mobile device 104 in their hand, navigation device 102 can deactivate usage of any or all its functionality until the mobile device 104 is again available for detection (e.g., within the vehicle). In some implementations, navigation device 102 can lose power or detect unauthorized use and in response deactivate at least some of its own functionality including, but not limited to, pairing functions, communication functions, mobile phone functions, and radio functions. The redetection of mobile device 104 by navigation device 102 can initiate a reactivation of one or more deactivated functions of navigation device 102.
  • In some implementations, the cryptographic pairing can deter theft or misuse of information or property. For example, the owner of navigation device 102 can specify one or mobile devices for use with navigation device 102. In particular, the navigation device 102 can include configuration menus to allow users to prevent users with unauthorized devices from using or abusing functionality of navigation device 102. Navigation device 102 can be configured to allow the owner of the vehicle to operate the navigation device 102 if the owner is carrying the authorized mobile device 104 on her person. When the authorized mobile device 104 is cryptographically paired with navigation device 102, full functionality may be allowed on navigation device 102. In contrast, if a user who does not have an authorized mobile device 104, one or more functions on navigation device 102 can be locked until an authorized mobile device 104 is detected by the navigation device 102.
  • In some implementations, cryptographic pairing can be used to define users and/or user limits for using navigation device 102. Navigation device 102 can be configured to wirelessly activate or deactivate one or more functions when mobile device 104 is present. For example, a driver owning mobile device 104 can have restrictions on using navigation device 102. For example, if the driver exceeds a preset speed limit, or drives the vehicle out of an approved location, navigation device 102 may lock down a stereo system, phone function, or other function until the driver lowers the speed or returns to an approved location. The mobile device 104 could also cause a speed limiter in the vehicle to trigger, thus preventing the vehicle from exceeding a certain speed, instead of, or in addition to, disabling some functionality until the speed is reduced.
  • In some implementations, several devices (e.g., mobile phones, head-sets, etc.) can be configured to pair with navigation device 102. If several devices are proximate to navigation device 102, one device can be selected as an “always link to” device. For example, an owner of navigation device 102 can configure navigation device 102 to accept one mobile device over others mobile devices when several viable linking mobile devices are detected.
  • In some implementations, cryptographic pairing can be performed automatically using a tethered protocol such as USB. For example, a user can access a menu on mobile device 104 to place mobile device 104 in a tethered pairing mode. Similarly, the user can access a menu on navigation device 102 to enable searching for a particular mobile device 104. At some point, navigation device 102 can search for mobile device 104. The cryptographic pairing can occur upon detecting the presence of mobile device 104 over the USB cable.
  • In some implementations, a degree of privacy can be achieved by enabling navigation device 102 usage based on a cryptographic pairing. For example, encrypted pairing information (e.g., previous pairing information or passkey information) can be used to authenticate mobile device 104 for purposes of gaining access to the navigation device 102.
  • Example Process
  • FIG. 2 is a flow diagram of an example process 200 for activating or reactivating functionality of a cryptographically paired device. While the reactivating process 200 described below includes a number of operations that appear to occur in a specific order, it should be apparent that the process 200 can include more or fewer operations, which can be executed serially or in parallel (e.g., using parallel processors or a multi-threading environment).
  • In some implementations, the process 200 includes detecting an event at a first device (202). For example, the event can be detected by the device 102. The event can include a power loss (e.g., battery removal or drainage) of the first device, a lock down, active or passive eavesdrop (e.g., an attack by an external device, hacker, etc.), or another event causing the first device to suspect unauthorized access or loss of power.
  • In response to one or more events, the first device can deactivate at least some of its functionality (204). For example, if the first device is a navigation device or multimedia system, then the first device can deactivate some or all of its navigation functions, mobile phone functions, communication functions, and radio functions on navigation device 102. The deactivation can include locking some or all functionality on the first device from any or all users, based on the power loss or a detected security breach, for example. In some implementations, the deactivation can include locking out other features, such as communication protocols. For example, if an unauthorized access is detected, the first device can disable its communication ports (wired or wireless) until a user code is entered, or an authorized pairing occurs (e.g., approved cryptographic pairing with a second device). In particular, a pairing with an authorized second device may be requested by the first device to reactivate some or all functionality, for example.
  • In the event some functionality of the first device is deactivated, the first device (e.g., device 102), or another paired device, can perform a search for, or detect the presence of, a second device (e.g., device 104) cryptographically paired with the first device (e.g., device 102) using a wired or wireless communication link (206). With a wireless communication link, the first device (e.g., navigation system 102) can wirelessly search for a previously paired Bluetooth enabled second device (e.g., mobile device 104). For example, the search may be performed upon replacing a vehicle battery or reattaching a wired vehicle navigation system.
  • In response to detecting the second device, the first device can initiate activation or reactivation of one or more of its features or functions (208). For example, if the first device is a navigation or multimedia system, then upon detecting a second device (e.g., mobile phone or smart phone), the navigation or multimedia system can unlock, activate or reactivate all or a portion of its functionality. The unlocking, activation or reactivation can be based on the identifying second device, as a previously paired or authenticated device.
  • In some implementations, in response to detecting the second device, the first device can initiate a locking or deactivation of one or more of its features or functions. In this case, the second device acts as wireless key or remote control for locking out the first device or its functionality. For example, when the user leaves a vehicle, the second device (e.g., a mobile device) can automatically shutdown down the first device (e.g., a navigation or multimedia system, stereo system, hands free telephone) as a security precaution, regardless of whether there was a power loss, security breach or other triggering event.
  • Paired Device Architecture
  • FIG. 3 is a block diagram of an example system architecture for a cryptographically paired device (e.g., devices 102, 104 of FIG. 1) for implementing the features described in reference to FIGS. 1 and 2. A paired device 300 generally includes one or more computer-readable mediums 302, a processing system 304, an Input/Output (I/O) subsystem 306, radio frequency (RF) circuitry 308, and audio circuitry 310. These components may be coupled by one or more communication buses or signal lines 303. The paired device 300 can be any portable electronic device, including but not limited to, an earpiece, a handheld computer, a tablet computer, a mobile phone, a media player, a personal digital assistant (PDA) and the like, including a combination of two or more of these items.
  • It should be apparent that the architecture shown in FIG. 3 is only one example of an architecture for the paired device 300, and that the device 300 could have more or fewer components than shown, or a different configuration of components. The various components shown in FIG. 3 can be implemented in hardware, software, or a combination of both hardware and software, including one or more signal processing and/or application specific integrated circuits. The RF circuitry 308 (e.g., a wireless transceiver) is used to send and receive information over a wireless link or network to one or more other devices and includes well-known circuitry for performing this function, including but not limited to an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC chipset, memory, etc. In some embodiments, the RF circuitry 308 is capable of establishing and maintaining communications with other devices using one or more communications protocols, including but not limited to time division multiple access (TDMA), code division multiple access (CDMA), global system for mobile communications (GSM), Enhanced Data GSM Environment (EDGE), wideband code division multiple access (W-CDMA), Wi-Fi (such as IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/or IEEE 802.11n), Bluetooth, Wi-MAX, voice over Internet Protocol (VoIP), a protocol for email, instant messaging, and/or a short message service (SMS), or any other suitable communication protocol, including communication protocols not yet developed as of the filing date of this document.
  • The RF circuitry 308 and the audio circuitry 310 are coupled to the processing system 304 via the peripherals interface 316. The interface 316 includes various known components for establishing and maintaining communication between peripherals and the processing system 304. The audio circuitry 310 is coupled to an audio speaker 350 and a microphone 352 and includes known circuitry for providing telephony functions, such as processing voice signals received from interface 316 to enable a user to communicate in real-time with other users, for example. In some embodiments, the audio circuitry 310 includes a headphone jack (not shown). Voice and data information received by the RF circuitry 308 and the audio circuitry 310 (e.g., in speech recognition or voice command applications) is sent to one or more processors 318 via the peripherals interface 316. The one or more processors 318 are configurable to process various data formats for one or more applications programs 330 stored on the medium 302.
  • Note that the term “data” includes but is not limited to text, graphics, Web pages, JAVA applets, widgets, emails, instant messages, voice, digital images or video, widgets, MP3s, etc., which can be used by one or more applications programs 330 stored on the medium 302 (e.g., Web browser, email, etc.).
  • The peripherals interface 316 couples the input and output peripherals of the device to the processor 318 and the computer-readable medium 302. The one or more processors 318 communicate with the one or more computer-readable mediums 302 via a controller 320. The computer-readable medium 302 can be any device or medium that can store code and/or data for use by the one or more processors 318. The medium 302 can include a memory hierarchy, including but not limited to cache, main memory and secondary memory. The memory hierarchy can be implemented using any combination of RAM (e.g., SRAM, DRAM, DDRAM), ROM, FLASH, magnetic and/or optical storage devices, such as disk drives, magnetic tape, CDs (compact disks) and DVDs (digital video discs). The medium 302 may also include a transmission medium for carrying information-bearing signals indicative of computer instructions or data (with or without a carrier wave upon which the signals are modulated). For example, the transmission medium may include a communications network, including but not limited to the Internet (also referred to as the World Wide Web), intranet(s), Local Area Networks (LANs), Wide Local Area Networks (WLANs), Storage Area Networks (SANs), Metropolitan Area Networks (MAN) and the like.
  • The one or more processors 318 run various software components stored in the medium 302 to perform various functions for the device 300. In some embodiments, the software components include an operating system 322, a user interface module (or set of instructions) 324, a contact/motion module (or set of instructions) 326, a communication module (or set of instructions) 328, and one or more applications (or set of instructions) 330. The communication module 328 can be used to implement some of the operations (e.g., Bluetooth™ pairing) as described in reference to FIGS. 1 and 2.
  • The operating system 322 (e.g., Darwin, RTXC, LINUX, UNIX, OS X, WINDOWS, or an embedded operating system such as VxWorks) includes various procedures, sets of instructions, software components and/or drivers for controlling and managing general system tasks (e.g., memory management, storage device control, power management, etc.) and facilitates communication between various hardware and software components.
  • The user interface module 324 facilitates and manages user-received input. In some implementations, the user interface module 324 may be designed to receive a user input and translate the input into a particular response. The response can be presented in a display as a sidebar layout, a web page layout, an audio sound, or any other layout that allows for the presentation of user-customizable content.
  • The communication module 328 facilitates communication with other devices over one or more external ports or via RF circuitry 308 and includes various software components for handling data received from the RF circuitry 308 and/or the external port. The RF circuitry 308 (e.g., Bluetooth) is adapted for coupling directly to other devices or indirectly over a network (e.g., the Internet, wireless LAN, etc.).
  • The Bluetooth™ circuitry provides for connecting and/or pairing devices, such as device 102 and 104. In some implementations, the circuitry can provide a way to connect and exchange information between devices such as mobile phones, laptops, PCs, navigation systems, printers, digital cameras, and video game consoles over a secure, short-range radio frequency.
  • The one or more applications 330 can include any applications installed on the device 300, including without limitation, a browser, address book, contact list, email, instant messaging, word processing, keyboard emulation, widgets, JAVA-enabled applications, encryption, digital rights management, voice recognition, voice replication, location determination capability (such as that provided by the global positioning system (GPS)), a music player (which plays back recorded music stored in one or more files, such as MP3 or AAC files), etc.
  • The contact/motion module 326 includes various software components for performing various tasks associated with the touch-sensitive display system 312, as previously described with respect to the embodiments in FIGS. 1-3.
  • The I/O subsystem 306 is coupled to the touch-sensitive display system 312 and a vehicle interface 314 for controlling or performing various functions, such as power control, speaker volume control, ring tone loudness, keyboard input, scrolling, hold, menu, screen lock, clearing and ending communications and the like. The touch-sensitive display 312 communicates with the processing system 304 via the touch sensitive screen controller 332, which includes various components for processing user input (e.g., scanning hardware). The one or more other input controllers 334 receives/sends electrical signals from/to the vehicle interface 314. The vehicle interface 314 may include physical buttons (e.g., push buttons, rocker buttons, etc.), dials, slider switches, sticks, and so forth.
  • The touch-sensitive display 312 displays visual output to the user in a GUI. The visual output may include text, graphics, video, and any combination thereof. Some or all of the visual output may correspond to user-interface objects. The touch-sensitive display 312 may also accept input from the user based on haptic and/or tactile contact. The touch-sensitive display 312 forms a touch-sensitive surface that accepts user input, including multiple touches and finger gestures (e.g., a multi-touch-sensitive surface). The touch-sensitive display 312 and the touch screen controller 332 (along with any associated modules and/or sets of instructions in the medium 302) detects contact (and any movement or release of the contact) and finger gestures on the touch-sensitive display 312 and converts the detected contact or gestures into interaction with user-interface objects, such as one or more soft keys, that are displayed on the touch screen when the contact occurs. In an exemplary embodiment, a point of contact between the touch-sensitive display 312 and the user corresponds to one or more digits of the user. The touch-sensitive display 312 may use LCD (liquid crystal display) technology, or LPD (light emitting polymer display) technology, although other display technologies may be used in other embodiments. The touch-sensitive display 312 and touch screen controller 332 may detect contact and any movement or release thereof using any of a plurality of touch sensitivity technologies, including but not limited to capacitive, resistive, infrared, and surface acoustic wave technologies, as well as other proximity sensor arrays or other elements for determining one or more points of contact with the touch-sensitive display 312.
  • The touch-sensitive display may be analogous to the multi-touch sensitive tablets described in the following U.S. Pat. No. 6,323,846 (Westerman et al.), U.S. Pat. No. 6,570,557 (Westerman et al.), and/or U.S. Pat. No. 6,677,932 (Westerman), and/or U.S. Patent Publication 2002/0015024A1, each of which is hereby incorporated by reference. However, the touch screen 126 displays visual output from the portable device, whereas touch sensitive tablets do not provide visual output. The touch-sensitive display 312 may have a resolution in excess of 100 dpi. In an exemplary embodiment, the touch-sensitive display 312 may have a resolution of approximately 168 dpi. The user may make contact with the touch-sensitive display 312 using any suitable object or appendage, such as a stylus, pen, finger, and so forth.
  • In some embodiments, in addition to the touch screen, the device 300 may include a touchpad (not shown) for activating or deactivating particular functions. In some embodiments, the touchpad is a touch-sensitive area of the device that, unlike the touch screen, does not display visual output. The touchpad may be a touch-sensitive surface that is separate from the touch-sensitive display 312 or an extension of the touch-sensitive surface formed by the touch-sensitive display 312.
  • The device 300 also includes a power system 344 for powering the various hardware components. The power system 344 can include a power management system, one or more power sources (e.g., battery, alternating current (AC)), a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator (e.g., a light emitting diode (LED)) and any other components typically associated with the generation, management and distribution of power in portable devices.
  • In some embodiments, the peripherals interface 316, the one or more processors 318, and the memory controller 320 may be implemented on a single chip, such as the processing system 304. In some other embodiments, they may be implemented on separate chips.
  • The described features can be implemented advantageously in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. A computer program is a set of instructions that can be used, directly or indirectly, in a computer to perform a certain activity or bring about a certain result. A computer program can be written in any form of programming language (e.g., Objective-C, Java), including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • Suitable processors for the execution of a program of instructions include, by way of example, both general and special purpose microprocessors, and the sole processor or one of multiple processors or cores, of any kind of computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memories for storing instructions and data. Generally, a computer will also include, or be operatively coupled to communicate with, one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits).
  • To provide for interaction with a user, the features can be implemented on a computer having a display device such as a CRT (cathode ray tube) or LCD (liquid crystal display) monitor for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user can provide input to the computer.
  • A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made. For example, elements of one or more implementations may be combined, deleted, modified, or supplemented to form further implementations. As yet another example, the logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. In addition, other steps may be provided, or steps may be eliminated, from the described flows, and other components may be added to, or removed from, the described systems. Accordingly, other implementations are within the scope of the following claims.

Claims (23)

1. A method comprising:
detecting an event at a first device;
responsive to the event, deactivating at least some functionality of the first device;
detecting the presence of a second device that is cryptographically paired with the first device using a communication link; and
responsive to detecting the presence of the second device, initiating activation or reactivation of the at least some functionality of the first device.
2. The method of claim 1, where the communication link is a wireless link.
3. The method of claim 1, where the event is power loss or security breach.
4. The method of claim 1, where the first device includes a navigation function and the second device includes a telephony function.
5. The method of claim 1, where the mobile device includes a multi-touch-sensitive display that can respond to finger gestures.
6. The method of claim 1, where detecting the presence of a second device further comprises:
searching a wireless network for the second device.
7. The method of claim 1, where the first device and the second device are cryptographically paired using Bluetooth pairing technology.
8. A system comprising:
a processor; and
a computer-readable medium coupled to the processor and storing instructions, which when executed by the processor, causes the processor to perform operations comprising:
detecting an event at a first device;
responsive to the event, deactivating at least some functionality of the first device;
detecting the presence of a second device that is cryptographically paired with the first device using a communication link; and
responsive to detecting the presence of the second device, initiating activation or reactivation of the at least some functionality of the first device.
9. The system of claim 8, where the communication link is a wireless link.
10. The system of claim 8, where the event is power loss or security breach.
11. The system of claim 8, where the first device is a navigation system and the second device is a mobile device.
12. The system of claim 8, where the mobile device includes a multi-touch-sensitive display that can respond to finger gestures.
13. The system of claim 8, where detecting the presence of a second device further comprises:
searching a wireless network for the second device.
14. The system of claim 8, where the first device and the second device are cryptographically paired using Bluetooth pairing technology.
15. A computer-readable medium having instructions stored thereon, which, when executed by a processor, causes the processor to perform operations comprising:
detecting an event at a first device;
responsive to the event, deactivating at least some functionality of the first device;
detecting the presence of a second device that is cryptographically paired with the first device using a communication link; and
responsive to detecting the presence of the second device, initiating activation or reactivation of the at least some functionality of the first device.
16. The computer-readable medium of claim 15, where the communication link is a wireless link.
17. The computer-readable medium of claim 15, where the event is power loss or security breach.
18. The computer-readable medium of claim 15, where the first device includes a navigation function and the second device includes a telephony function.
19. A system comprising:
means for detecting an event at a first device;
responsive to the event, means for deactivating at least some functionality of the first device;
means for detecting the presence of a second device that is cryptographically paired with the first device using a communication link; and
responsive to detecting the presence of the second device, means for initiating activation or reactivation of the at least some functionality of the first device.
20. An apparatus comprising:
wireless communications circuitry; and
a processor coupled to the wireless communication circuitry and operable for receiving cryptographic pairing information from a device cryptographically paired with the apparatus, and for activating, deactivating or reactivating features or functionality of the apparatus based on the cryptographic pairing information.
21. The apparatus of claim 20, where the apparatus includes a navigation function.
22. The apparatus of claim 20, where the processor is operable for detecting the presence of the device by searching a wireless network for the device.
23. The apparatus of claim 22, where the cryptographic pairing is Bluetooth pairing.
US12/191,282 2007-10-10 2008-08-13 Activation of Cryptographically Paired Device Abandoned US20090096573A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US12/191,282 US20090096573A1 (en) 2007-10-10 2008-08-13 Activation of Cryptographically Paired Device
US15/253,238 US10034167B1 (en) 2007-10-10 2016-08-31 Activation of cryptographically paired device
US15/984,218 US10405177B2 (en) 2007-10-10 2018-05-18 Activation of cryptographically paired device
US15/984,227 US10405178B2 (en) 2007-10-10 2018-05-18 Activation of cryptographically paired device
US16/556,806 US10869191B2 (en) 2007-10-10 2019-08-30 Activation of cryptographically paired device
US17/094,627 US11540124B2 (en) 2007-10-10 2020-11-10 Activation of cryptographically paired device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US97903507P 2007-10-10 2007-10-10
US12/191,282 US20090096573A1 (en) 2007-10-10 2008-08-13 Activation of Cryptographically Paired Device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/253,238 Continuation US10034167B1 (en) 2007-10-10 2016-08-31 Activation of cryptographically paired device

Publications (1)

Publication Number Publication Date
US20090096573A1 true US20090096573A1 (en) 2009-04-16

Family

ID=40533621

Family Applications (6)

Application Number Title Priority Date Filing Date
US12/191,282 Abandoned US20090096573A1 (en) 2007-10-10 2008-08-13 Activation of Cryptographically Paired Device
US15/253,238 Active US10034167B1 (en) 2007-10-10 2016-08-31 Activation of cryptographically paired device
US15/984,227 Active US10405178B2 (en) 2007-10-10 2018-05-18 Activation of cryptographically paired device
US15/984,218 Active US10405177B2 (en) 2007-10-10 2018-05-18 Activation of cryptographically paired device
US16/556,806 Active US10869191B2 (en) 2007-10-10 2019-08-30 Activation of cryptographically paired device
US17/094,627 Active US11540124B2 (en) 2007-10-10 2020-11-10 Activation of cryptographically paired device

Family Applications After (5)

Application Number Title Priority Date Filing Date
US15/253,238 Active US10034167B1 (en) 2007-10-10 2016-08-31 Activation of cryptographically paired device
US15/984,227 Active US10405178B2 (en) 2007-10-10 2018-05-18 Activation of cryptographically paired device
US15/984,218 Active US10405177B2 (en) 2007-10-10 2018-05-18 Activation of cryptographically paired device
US16/556,806 Active US10869191B2 (en) 2007-10-10 2019-08-30 Activation of cryptographically paired device
US17/094,627 Active US11540124B2 (en) 2007-10-10 2020-11-10 Activation of cryptographically paired device

Country Status (1)

Country Link
US (6) US20090096573A1 (en)

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110018759A1 (en) * 2009-07-23 2011-01-27 Broadcom Corporation Coupled gps phone and navigation system
US20110152637A1 (en) * 2008-05-14 2011-06-23 Kateraas Espen D Physical activity monitor and data collection unit
US20110184862A1 (en) * 2010-01-25 2011-07-28 Brian Lanier Selecting a Device to Display Content
US20110181780A1 (en) * 2010-01-25 2011-07-28 Barton James M Displaying Content on Detected Devices
US20110208834A1 (en) * 2008-12-05 2011-08-25 Soichi Nagano Onboard information system
US20110221590A1 (en) * 2010-03-15 2011-09-15 Welch Allyn, Inc. Personal Area Network Pairing
US20120092441A1 (en) * 2010-10-19 2012-04-19 Cisco Technology, Inc. System and method for providing a paring mechanism in a video environment
US20120188147A1 (en) * 2010-12-31 2012-07-26 Ebay, Inc. Methods and systems for displaying content on multiple networked devices with a simple command
US20130227410A1 (en) * 2011-12-21 2013-08-29 Qualcomm Incorporated Using haptic technologies to provide enhanced media experiences
US20130325479A1 (en) * 2012-05-29 2013-12-05 Apple Inc. Smart dock for activating a voice recognition mode of a portable electronic device
US20140085400A1 (en) * 2012-09-26 2014-03-27 Waldstock Ltd System and method for real-time audiovisual interaction with a target location
US20140179228A1 (en) * 2012-12-20 2014-06-26 Asa Electronics, Inc. Auto-pairing wireless audio/visual system
US8907782B2 (en) 2010-06-30 2014-12-09 Welch Allyn, Inc. Medical devices with proximity detection
US8934026B2 (en) 2011-05-12 2015-01-13 Cisco Technology, Inc. System and method for video coding in a dynamic environment
US8957777B2 (en) 2010-06-30 2015-02-17 Welch Allyn, Inc. Body area network pairing improvements for clinical workflows
US20150070132A1 (en) * 2013-09-11 2015-03-12 Sony Corporation Secure remote control for operating closures such as garage doors
US20150104016A1 (en) * 2007-12-28 2015-04-16 Cellspinsoft Inc. Automatic Multimedia Upload For Publishing Data And Multimedia Content
US9037852B2 (en) 2011-09-02 2015-05-19 Ivsc Ip Llc System and method for independent control of for-hire vehicles
US9082297B2 (en) 2009-08-11 2015-07-14 Cisco Technology, Inc. System and method for verifying parameters in an audiovisual environment
US9111138B2 (en) 2010-11-30 2015-08-18 Cisco Technology, Inc. System and method for gesture interface control
US20150317484A1 (en) * 2014-04-30 2015-11-05 Upton Beall Bowden Providing selective control of information shared from a first device to a second device
US9204096B2 (en) 2009-05-29 2015-12-01 Cisco Technology, Inc. System and method for extending communications between participants in a conferencing environment
US9225916B2 (en) 2010-03-18 2015-12-29 Cisco Technology, Inc. System and method for enhancing video images in a conferencing environment
US20160005250A1 (en) * 2013-03-07 2016-01-07 Denso Corporation Smart entry system
US9242618B2 (en) 2011-11-07 2016-01-26 Kabushiki Kaisha Tokai Rika Denki Seisakusho Wireless communication system for communication and displaying vehicle information on a portable device
US20160058285A1 (en) * 2014-08-29 2016-03-03 Nihon Kohden Corporation Medical device system and medical device
US9313452B2 (en) 2010-05-17 2016-04-12 Cisco Technology, Inc. System and method for providing retracting optics in a video conferencing environment
US20160196420A1 (en) * 2015-01-07 2016-07-07 Htc Corporation Electronic system and device unlock method of the same
US9681471B1 (en) 2016-08-31 2017-06-13 Bank Of America Corporation Pairing of devices for activation/deactivation of a paired device
US9955519B1 (en) 2017-04-28 2018-04-24 Sonova Ag Systems and methods for license-enabled signal processing
US10306052B1 (en) 2014-05-20 2019-05-28 Invincea, Inc. Methods and devices for secure authentication to a compute device
US10366582B2 (en) 2016-06-21 2019-07-30 Bank Of America Corporation Devices and systems for detecting unauthorized communication of data from a magnetic stripe device or embedded smart chip device
US10374804B2 (en) 2014-09-11 2019-08-06 Samsung Electronics Co., Ltd. Method of controlling electronic device using wearable device and method of operating electronic device
US10405177B2 (en) 2007-10-10 2019-09-03 Apple Inc. Activation of cryptographically paired device
US11014515B2 (en) * 2016-12-21 2021-05-25 Audi Ag Method for configuring a vehicle
US11200755B2 (en) 2011-09-02 2021-12-14 Ivsc Ip Llc Systems and methods for pairing of for-hire vehicle meters and medallions
US20220067139A1 (en) * 2020-08-25 2022-03-03 Kyndryl, Inc. Loss prevention of devices
US11757629B2 (en) * 2019-07-23 2023-09-12 Mastercard International Incorporated Methods and computing devices for auto-submission of user authentication credential

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109377748B (en) * 2018-12-03 2021-07-06 武汉理工大学 System and method for acquiring and storing passenger travel data based on block chain
US11457364B2 (en) * 2020-07-02 2022-09-27 Ford Global Technologies, Llc Wireless channel PIN key revocation and renewal
US20220058279A1 (en) * 2020-08-24 2022-02-24 Analog Devices, Inc. Techniques of tracking software usage on a remote device

Citations (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4092643A (en) * 1975-04-25 1978-05-30 A. R. F. Products, Inc. Security device
US4566102A (en) * 1983-04-18 1986-01-21 International Business Machines Corporation Parallel-shift error reconfiguration
US5473305A (en) * 1994-06-29 1995-12-05 Hwang; Shih M. Auto security system with two-stage disarming
FR2773756A1 (en) * 1998-01-16 1999-07-23 Balease Device and process for remote activating or deactivating of a vehicle or other mechanical equipment via a transmitted signal
WO2001014177A1 (en) * 1999-08-20 2001-03-01 Volkswagen Aktiengesellschaft Arrangement for controlling a locking device of a vehicle
US20010018635A1 (en) * 2000-02-28 2001-08-30 Kabushiki Kaisha Toshiba Radio data communication apparatus
US6351536B1 (en) * 1997-10-01 2002-02-26 Minoru Sasaki Encryption network system and method
US6459967B1 (en) * 1998-08-28 2002-10-01 Robert Bosch Gmbh Device for controlling and monitoring a vehicle
GB2386517A (en) * 2001-01-29 2003-09-17 Vtech Communications Ltd Enhanced cordless telephone platform using the Bluetooth protocol
US20030220765A1 (en) * 2002-05-24 2003-11-27 Overy Michael Robert Method and apparatus for enhancing security in a wireless network using distance measurement techniques
US20040019800A1 (en) * 2002-04-16 2004-01-29 Makoto Tatebayashi Deactivation system
US20040036596A1 (en) * 2002-08-07 2004-02-26 Steven Heffner Security system and methods
US20040048622A1 (en) * 1999-05-26 2004-03-11 Johnson Controls Technology Company System and method for radio frequency communication with a personal digital assistant in a vehicle
US20040128509A1 (en) * 2001-02-16 2004-07-01 Christian Gehrmann Method and system for establishing a wireless communication link
US20040213212A1 (en) * 2002-11-25 2004-10-28 Reding Craig L. Methods and systems for automatic communication line management based on device location
US6813482B1 (en) * 2000-03-27 2004-11-02 Fujitsu Limited Radio communication apparatus and method
US20050005120A1 (en) * 2001-09-21 2005-01-06 Raynold Kahn Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder
US20050086332A1 (en) * 2002-02-22 2005-04-21 Toshiyuki Nakazawa Network device management method, network device management program, and network control apparatus
US20050110746A1 (en) * 2003-11-25 2005-05-26 Alpha Hou Power-saving method for an optical navigation device
BE1015667A6 (en) * 2003-08-29 2005-07-05 Bernardy Fulicien Ignition system controlling unit for safety balloon of e.g. car, has receiving unit, where controlling unit controls activation of horn and/or hazard warning flashers and/or siren
US20050219211A1 (en) * 2004-03-31 2005-10-06 Kotzin Michael D Method and apparatus for content management and control
US20050221858A1 (en) * 2004-03-30 2005-10-06 Hoddie J P Interface negotiation
US20050261816A1 (en) * 2004-05-21 2005-11-24 Audiovox Corporation Remote programmer for a vehicle control system
US20060012577A1 (en) * 2004-07-16 2006-01-19 Nokia Corporation Active keypad lock for devices equipped with touch screen
US20060033840A1 (en) * 2004-08-11 2006-02-16 Eric Diehl Device pairing
US20060066568A1 (en) * 2004-09-30 2006-03-30 Chiang-Sun Cheah Computer pointing device with motion-driven electromagnetic induction module
US20060083187A1 (en) * 2004-10-18 2006-04-20 Mobile (R&D) Ltd. Pairing system and method for wirelessly connecting communication devices
US20060143455A1 (en) * 2004-12-28 2006-06-29 Gitzinger Thomas E Method and apparatus for secure pairing
US20060148464A1 (en) * 2004-12-13 2006-07-06 Dunko Gregory A Programmable remote unit for operating a communication device
US20060153386A1 (en) * 2002-09-24 2006-07-13 Rached Ksontini Multiple matching control method
US20060156565A1 (en) * 2005-01-14 2006-07-20 Jukka Linjama Electronic device, computer program product and method of operating built-in compass
US20060205354A1 (en) * 2005-03-11 2006-09-14 Pirzada Fahd B Systems and methods for managing out-of-band device connection
US20060240811A1 (en) * 2005-04-25 2006-10-26 Interoperable Technologies Llc Wireless satellite digital audio radio service (SDARS) head unit with portable subscription and cell phone abilities
US20060271290A1 (en) * 2005-03-14 2006-11-30 Wei-Tin Li Method for exchanging route schemes of global positioning system
US20070013550A1 (en) * 2005-07-13 2007-01-18 Tong Xie Apparatus and method for integrating an optical navigation mechanism with non-optical sensor-based presence detector
US20070061019A1 (en) * 2005-09-14 2007-03-15 Rockwell Automation Technologies, Inc. Control system having verification module
US20070067634A1 (en) * 2005-08-31 2007-03-22 Siegler Thomas A System and method for restricting access to a terminal
US20070140230A1 (en) * 2005-12-16 2007-06-21 Beshai Maged E Scalable Router-Switch
US20070146199A1 (en) * 2005-12-28 2007-06-28 Giga-Byte Communications Inc. Position data exchange systems, mobile communication devices, and methods
US20070152984A1 (en) * 2005-12-30 2007-07-05 Bas Ording Portable electronic device with multi-touch input
US20070198862A1 (en) * 2004-03-19 2007-08-23 Pioneer Corporation Portable information processing device
US20070247435A1 (en) * 2006-04-19 2007-10-25 Microsoft Corporation Precise selection techniques for multi-touch screens
US20070259674A1 (en) * 2006-03-08 2007-11-08 Edwin Neef Automatic discovery of wireless communication settings
US20070257891A1 (en) * 2006-05-03 2007-11-08 Esenther Alan W Method and system for emulating a mouse on a multi-touch sensitive surface
US20070300063A1 (en) * 2006-06-23 2007-12-27 Research In Motion Limited Pairing to a Wireless Peripheral Device at the Lock-Screen
US20080011827A1 (en) * 2006-07-17 2008-01-17 Research In Motion Limited Automatic management of security information for a security token access device with multiple connections
US20080021633A1 (en) * 2004-04-22 2008-01-24 Aisin Aw Co., Ltd. Navigation System And Navigation Apparatus
US20080055116A1 (en) * 2006-08-28 2008-03-06 Yi Luo Vehicle locating using GPS
US20080070501A1 (en) * 2006-08-30 2008-03-20 Apple Computer, Inc. Pairing of wireless devices using a wired medium
US20080113619A1 (en) * 2006-11-09 2008-05-15 Cambridge Silicon Radio Limited Authenticating Devices For RF Communications
US20080160914A1 (en) * 2006-12-29 2008-07-03 Mcrae Matthew B Secure pairing of networked devices
US20080165024A1 (en) * 2007-01-10 2008-07-10 Mark Gretton Remote control system
US20080168368A1 (en) * 2007-01-07 2008-07-10 Louch John O Dashboards, Widgets and Devices
US20080216001A1 (en) * 2006-01-05 2008-09-04 Bas Ording Portable electronic device with content-dependent touch sensitivity
US20080320587A1 (en) * 2004-09-08 2008-12-25 Koninklijke Philips Electronics, N.V. Secure Pairing for Wired or Wireless Communications Devices
US20090061837A1 (en) * 2007-09-04 2009-03-05 Chaudhri Imran A Audio file interface
US20090058821A1 (en) * 2007-09-04 2009-03-05 Apple Inc. Editing interface
US20090061896A1 (en) * 2007-08-31 2009-03-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Location assistance in a paired device
US20090077464A1 (en) * 2007-09-13 2009-03-19 Apple Inc. Input methods for device having multi-language environment
US20090153296A1 (en) * 2006-03-23 2009-06-18 Legasse Francis M Keyless control system
JP2009301476A (en) * 2008-06-17 2009-12-24 Kyocera Mita Corp Key management server device
US7667571B2 (en) * 2003-02-20 2010-02-23 Marquardt Gmbh Locking system, in particular for a motor vehicle
US7689169B2 (en) * 2004-12-17 2010-03-30 Samsung Electronics Co., Ltd. Bluetooth device and method for providing service determined according to Bluetooth PIN
US7783879B2 (en) * 2003-11-20 2010-08-24 Nokia Corporation Method and device relating to security in a radio communication network
US20100289951A1 (en) * 2009-05-12 2010-11-18 Ryu Jae-Kyung Synchronization method
US8160815B2 (en) * 2007-01-10 2012-04-17 Tomtom International B.V. Navigation device and method for informational screen display
US9066199B2 (en) * 2007-06-28 2015-06-23 Apple Inc. Location-aware mobile device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10015307B4 (en) 2000-03-28 2018-10-11 Ipcom Gmbh & Co. Kg Method and device for protecting a device against theft
US20020197976A1 (en) * 2001-06-22 2002-12-26 Jonathan Liu Vehicle customized feature activation system
US7911358B2 (en) 2002-10-08 2011-03-22 Johnson Controls Technology Company System and method for enrollment of a remotely controlled device in a trainable transmitter
US20050277445A1 (en) * 2004-06-09 2005-12-15 Bae Hyon S Hands-free vehicle phone system and method
US20070238491A1 (en) * 2006-03-31 2007-10-11 Motorola, Inc. System and method for establishing wireless connections between user devices and vehicles
US7701331B2 (en) 2006-06-12 2010-04-20 Tran Bao Q Mesh network door lock
US20140121890A1 (en) 2007-04-10 2014-05-01 Anil Gercekci Apparatuses, Systems, Software and Methods for Wireless Interaction with Vehicle Control Systems
US20090096573A1 (en) * 2007-10-10 2009-04-16 Apple Inc. Activation of Cryptographically Paired Device

Patent Citations (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4092643A (en) * 1975-04-25 1978-05-30 A. R. F. Products, Inc. Security device
US4566102A (en) * 1983-04-18 1986-01-21 International Business Machines Corporation Parallel-shift error reconfiguration
US5473305A (en) * 1994-06-29 1995-12-05 Hwang; Shih M. Auto security system with two-stage disarming
US6351536B1 (en) * 1997-10-01 2002-02-26 Minoru Sasaki Encryption network system and method
FR2773756A1 (en) * 1998-01-16 1999-07-23 Balease Device and process for remote activating or deactivating of a vehicle or other mechanical equipment via a transmitted signal
US6459967B1 (en) * 1998-08-28 2002-10-01 Robert Bosch Gmbh Device for controlling and monitoring a vehicle
US20040048622A1 (en) * 1999-05-26 2004-03-11 Johnson Controls Technology Company System and method for radio frequency communication with a personal digital assistant in a vehicle
WO2001014177A1 (en) * 1999-08-20 2001-03-01 Volkswagen Aktiengesellschaft Arrangement for controlling a locking device of a vehicle
US20010018635A1 (en) * 2000-02-28 2001-08-30 Kabushiki Kaisha Toshiba Radio data communication apparatus
US6813482B1 (en) * 2000-03-27 2004-11-02 Fujitsu Limited Radio communication apparatus and method
GB2386517A (en) * 2001-01-29 2003-09-17 Vtech Communications Ltd Enhanced cordless telephone platform using the Bluetooth protocol
US20040128509A1 (en) * 2001-02-16 2004-07-01 Christian Gehrmann Method and system for establishing a wireless communication link
US7216231B2 (en) * 2001-02-16 2007-05-08 Telefonaktiebolaget L M Ericsson (Publ) Method and system for establishing a wireless communication link
US20050005120A1 (en) * 2001-09-21 2005-01-06 Raynold Kahn Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder
US20050086332A1 (en) * 2002-02-22 2005-04-21 Toshiyuki Nakazawa Network device management method, network device management program, and network control apparatus
US20040019800A1 (en) * 2002-04-16 2004-01-29 Makoto Tatebayashi Deactivation system
US20030220765A1 (en) * 2002-05-24 2003-11-27 Overy Michael Robert Method and apparatus for enhancing security in a wireless network using distance measurement techniques
US6961541B2 (en) * 2002-05-24 2005-11-01 Aeroscout, Inc. Method and apparatus for enhancing security in a wireless network using distance measurement techniques
US20040036596A1 (en) * 2002-08-07 2004-02-26 Steven Heffner Security system and methods
US7822205B2 (en) * 2002-09-24 2010-10-26 Nagravision S.A. Multiple matching control method
US20060153386A1 (en) * 2002-09-24 2006-07-13 Rached Ksontini Multiple matching control method
US20040213212A1 (en) * 2002-11-25 2004-10-28 Reding Craig L. Methods and systems for automatic communication line management based on device location
US7667571B2 (en) * 2003-02-20 2010-02-23 Marquardt Gmbh Locking system, in particular for a motor vehicle
BE1015667A6 (en) * 2003-08-29 2005-07-05 Bernardy Fulicien Ignition system controlling unit for safety balloon of e.g. car, has receiving unit, where controlling unit controls activation of horn and/or hazard warning flashers and/or siren
US7783879B2 (en) * 2003-11-20 2010-08-24 Nokia Corporation Method and device relating to security in a radio communication network
US20050110746A1 (en) * 2003-11-25 2005-05-26 Alpha Hou Power-saving method for an optical navigation device
US20070198862A1 (en) * 2004-03-19 2007-08-23 Pioneer Corporation Portable information processing device
US20070294549A1 (en) * 2004-03-19 2007-12-20 Pioneer Corporation Portable information processor
US20070294438A1 (en) * 2004-03-19 2007-12-20 Pioneer Corporation Portable information processor
US20050221858A1 (en) * 2004-03-30 2005-10-06 Hoddie J P Interface negotiation
US20050219211A1 (en) * 2004-03-31 2005-10-06 Kotzin Michael D Method and apparatus for content management and control
US20080021633A1 (en) * 2004-04-22 2008-01-24 Aisin Aw Co., Ltd. Navigation System And Navigation Apparatus
US20050261816A1 (en) * 2004-05-21 2005-11-24 Audiovox Corporation Remote programmer for a vehicle control system
US20060012577A1 (en) * 2004-07-16 2006-01-19 Nokia Corporation Active keypad lock for devices equipped with touch screen
US20060033840A1 (en) * 2004-08-11 2006-02-16 Eric Diehl Device pairing
US20080320587A1 (en) * 2004-09-08 2008-12-25 Koninklijke Philips Electronics, N.V. Secure Pairing for Wired or Wireless Communications Devices
US20060066568A1 (en) * 2004-09-30 2006-03-30 Chiang-Sun Cheah Computer pointing device with motion-driven electromagnetic induction module
US20060083187A1 (en) * 2004-10-18 2006-04-20 Mobile (R&D) Ltd. Pairing system and method for wirelessly connecting communication devices
US7548748B2 (en) * 2004-12-13 2009-06-16 Sony Ericsson Mobile Communications Ab Programmable remote unit for operating a communication device
US20060148464A1 (en) * 2004-12-13 2006-07-06 Dunko Gregory A Programmable remote unit for operating a communication device
US7689169B2 (en) * 2004-12-17 2010-03-30 Samsung Electronics Co., Ltd. Bluetooth device and method for providing service determined according to Bluetooth PIN
US20060143455A1 (en) * 2004-12-28 2006-06-29 Gitzinger Thomas E Method and apparatus for secure pairing
US20060156565A1 (en) * 2005-01-14 2006-07-20 Jukka Linjama Electronic device, computer program product and method of operating built-in compass
US7715795B2 (en) * 2005-03-11 2010-05-11 Dell Products L.P. Systems and methods for managing out-of-band device connection
US20060205354A1 (en) * 2005-03-11 2006-09-14 Pirzada Fahd B Systems and methods for managing out-of-band device connection
US20080248751A1 (en) * 2005-03-11 2008-10-09 Dell Products, L.P. Systems and methods for managing out-of-band device connection
US7386275B2 (en) * 2005-03-11 2008-06-10 Dell Products Llp Systems and methods for managing out-of-band device connection
US20060271290A1 (en) * 2005-03-14 2006-11-30 Wei-Tin Li Method for exchanging route schemes of global positioning system
US20060240811A1 (en) * 2005-04-25 2006-10-26 Interoperable Technologies Llc Wireless satellite digital audio radio service (SDARS) head unit with portable subscription and cell phone abilities
US20070013550A1 (en) * 2005-07-13 2007-01-18 Tong Xie Apparatus and method for integrating an optical navigation mechanism with non-optical sensor-based presence detector
US20070067634A1 (en) * 2005-08-31 2007-03-22 Siegler Thomas A System and method for restricting access to a terminal
US20070061019A1 (en) * 2005-09-14 2007-03-15 Rockwell Automation Technologies, Inc. Control system having verification module
US20070140230A1 (en) * 2005-12-16 2007-06-21 Beshai Maged E Scalable Router-Switch
US20070146199A1 (en) * 2005-12-28 2007-06-28 Giga-Byte Communications Inc. Position data exchange systems, mobile communication devices, and methods
US20070152984A1 (en) * 2005-12-30 2007-07-05 Bas Ording Portable electronic device with multi-touch input
US20110043527A1 (en) * 2005-12-30 2011-02-24 Bas Ording Portable Electronic Device with Multi-Touch Input
US7812826B2 (en) * 2005-12-30 2010-10-12 Apple Inc. Portable electronic device with multi-touch input
US20080216001A1 (en) * 2006-01-05 2008-09-04 Bas Ording Portable electronic device with content-dependent touch sensitivity
US20070259674A1 (en) * 2006-03-08 2007-11-08 Edwin Neef Automatic discovery of wireless communication settings
US20090153296A1 (en) * 2006-03-23 2009-06-18 Legasse Francis M Keyless control system
US20070247435A1 (en) * 2006-04-19 2007-10-25 Microsoft Corporation Precise selection techniques for multi-touch screens
US20070257891A1 (en) * 2006-05-03 2007-11-08 Esenther Alan W Method and system for emulating a mouse on a multi-touch sensitive surface
US20070300063A1 (en) * 2006-06-23 2007-12-27 Research In Motion Limited Pairing to a Wireless Peripheral Device at the Lock-Screen
US20080011827A1 (en) * 2006-07-17 2008-01-17 Research In Motion Limited Automatic management of security information for a security token access device with multiple connections
US20080055116A1 (en) * 2006-08-28 2008-03-06 Yi Luo Vehicle locating using GPS
US7545259B2 (en) * 2006-08-28 2009-06-09 Lear Corporation Vehicle locating using GPS
US20080070501A1 (en) * 2006-08-30 2008-03-20 Apple Computer, Inc. Pairing of wireless devices using a wired medium
US20080113619A1 (en) * 2006-11-09 2008-05-15 Cambridge Silicon Radio Limited Authenticating Devices For RF Communications
US20080160914A1 (en) * 2006-12-29 2008-07-03 Mcrae Matthew B Secure pairing of networked devices
US20080168368A1 (en) * 2007-01-07 2008-07-10 Louch John O Dashboards, Widgets and Devices
US8160815B2 (en) * 2007-01-10 2012-04-17 Tomtom International B.V. Navigation device and method for informational screen display
US20080165024A1 (en) * 2007-01-10 2008-07-10 Mark Gretton Remote control system
US9066199B2 (en) * 2007-06-28 2015-06-23 Apple Inc. Location-aware mobile device
US20090061896A1 (en) * 2007-08-31 2009-03-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Location assistance in a paired device
US20090058821A1 (en) * 2007-09-04 2009-03-05 Apple Inc. Editing interface
US20090061837A1 (en) * 2007-09-04 2009-03-05 Chaudhri Imran A Audio file interface
US20090077464A1 (en) * 2007-09-13 2009-03-19 Apple Inc. Input methods for device having multi-language environment
JP2009301476A (en) * 2008-06-17 2009-12-24 Kyocera Mita Corp Key management server device
US20100289951A1 (en) * 2009-05-12 2010-11-18 Ryu Jae-Kyung Synchronization method

Cited By (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11540124B2 (en) 2007-10-10 2022-12-27 Apple Inc. Activation of cryptographically paired device
US10405177B2 (en) 2007-10-10 2019-09-03 Apple Inc. Activation of cryptographically paired device
US10405178B2 (en) 2007-10-10 2019-09-03 Apple Inc. Activation of cryptographically paired device
US10869191B2 (en) 2007-10-10 2020-12-15 Apple Inc. Activation of cryptographically paired device
US20150104016A1 (en) * 2007-12-28 2015-04-16 Cellspinsoft Inc. Automatic Multimedia Upload For Publishing Data And Multimedia Content
US10425806B2 (en) * 2007-12-28 2019-09-24 Cellspinsoft Inc. Automatic multimedia upload for publishing data and multimedia content
US9749847B2 (en) * 2007-12-28 2017-08-29 Cellspinsoft Inc. Automatic multimedia upload for publishing data and multimedia content
US9319870B2 (en) * 2007-12-28 2016-04-19 Cellspinsoft Inc. Automatic multimedia upload for publishing data and multimedia content
US20170325086A1 (en) * 2007-12-28 2017-11-09 Cellspinsoft Inc. Automatic Multimedia Upload For Publishing Data And Multimedia Content
US9900766B2 (en) * 2007-12-28 2018-02-20 Cellspinsoft Inc. Automatic multimedia upload for publishing data and multimedia content
US20150104015A1 (en) * 2007-12-28 2015-04-16 Cellspinsoft Inc. Automatic Multimedia Upload For Publishing Data And Multimedia Content
US8936552B2 (en) * 2008-05-14 2015-01-20 Heartmiles, Llc Physical activity monitor and data collection unit
US20150073235A1 (en) * 2008-05-14 2015-03-12 Heartmiles, Llc Physical activity monitor and data collection unit
US20110152637A1 (en) * 2008-05-14 2011-06-23 Kateraas Espen D Physical activity monitor and data collection unit
US20110208834A1 (en) * 2008-12-05 2011-08-25 Soichi Nagano Onboard information system
US9204096B2 (en) 2009-05-29 2015-12-01 Cisco Technology, Inc. System and method for extending communications between participants in a conferencing environment
US9250097B2 (en) * 2009-07-23 2016-02-02 Broadcom Corporation Coupled GPS phone and navigation system
US20110018759A1 (en) * 2009-07-23 2011-01-27 Broadcom Corporation Coupled gps phone and navigation system
US9082297B2 (en) 2009-08-11 2015-07-14 Cisco Technology, Inc. System and method for verifying parameters in an audiovisual environment
US20110181780A1 (en) * 2010-01-25 2011-07-28 Barton James M Displaying Content on Detected Devices
US20110185036A1 (en) * 2010-01-25 2011-07-28 Brian Lanier Playing Multimedia Content on Multiple Devices
US9369776B2 (en) 2010-01-25 2016-06-14 Tivo Inc. Playing multimedia content on multiple devices
US20110181496A1 (en) * 2010-01-25 2011-07-28 Brian Lanier Playing Multimedia Content on a Device Based on Distance from Other Devices
US20110183654A1 (en) * 2010-01-25 2011-07-28 Brian Lanier Concurrent Use of Multiple User Interface Devices
US20110184862A1 (en) * 2010-01-25 2011-07-28 Brian Lanier Selecting a Device to Display Content
US10469891B2 (en) 2010-01-25 2019-11-05 Tivo Solutions Inc. Playing multimedia content on multiple devices
US10349107B2 (en) 2010-01-25 2019-07-09 Tivo Solutions Inc. Playing multimedia content on multiple devices
US20110185312A1 (en) * 2010-01-25 2011-07-28 Brian Lanier Displaying Menu Options
US9973883B2 (en) 2010-03-15 2018-05-15 Welch Allyn, Inc. Personal area network pairing
US9504388B2 (en) 2010-03-15 2016-11-29 Welch Allyn, Inc. Personal area network pairing
US20110221590A1 (en) * 2010-03-15 2011-09-15 Welch Allyn, Inc. Personal Area Network Pairing
US9000914B2 (en) * 2010-03-15 2015-04-07 Welch Allyn, Inc. Personal area network pairing
US9662016B2 (en) 2010-03-15 2017-05-30 Welch Allyn, Inc. Personal area network pairing
US9225916B2 (en) 2010-03-18 2015-12-29 Cisco Technology, Inc. System and method for enhancing video images in a conferencing environment
US9313452B2 (en) 2010-05-17 2016-04-12 Cisco Technology, Inc. System and method for providing retracting optics in a video conferencing environment
US8957777B2 (en) 2010-06-30 2015-02-17 Welch Allyn, Inc. Body area network pairing improvements for clinical workflows
US10136817B2 (en) 2010-06-30 2018-11-27 Welch Allyn, Inc. Body area network pairing improvements for clinical workflows
US9386924B2 (en) 2010-06-30 2016-07-12 Welch Allyn, Inc. Body area network pairing improvements for clinical workflows
US8907782B2 (en) 2010-06-30 2014-12-09 Welch Allyn, Inc. Medical devices with proximity detection
US9402545B2 (en) 2010-06-30 2016-08-02 Welch Allyn, Inc. Medical devices with proximity detection
US20120092441A1 (en) * 2010-10-19 2012-04-19 Cisco Technology, Inc. System and method for providing a paring mechanism in a video environment
US9111138B2 (en) 2010-11-30 2015-08-18 Cisco Technology, Inc. System and method for gesture interface control
US9367281B2 (en) 2010-12-31 2016-06-14 Ebay Inc. Methods and systems for displaying content on multiple network devices with a simple command
US20120188147A1 (en) * 2010-12-31 2012-07-26 Ebay, Inc. Methods and systems for displaying content on multiple networked devices with a simple command
US10747491B2 (en) 2010-12-31 2020-08-18 Ebay Inc. Methods and systems for displaying content on multiple networked devices with a simple command
US8749452B2 (en) * 2010-12-31 2014-06-10 Ebay Inc. Methods and systems for displaying content on multiple networked devices with a simple command
US11269583B2 (en) 2010-12-31 2022-03-08 Ebay Inc. Methods and systems for displaying content on multiple networked devices with a simple command
US11650781B2 (en) 2010-12-31 2023-05-16 Ebay Inc. Methods and systems for displaying content on multiple networked devices with a simple command
US10007477B2 (en) 2010-12-31 2018-06-26 Ebay Inc. Methods and systems for displaying content on multiple networked devices with a simple command
US8934026B2 (en) 2011-05-12 2015-01-13 Cisco Technology, Inc. System and method for video coding in a dynamic environment
US11200755B2 (en) 2011-09-02 2021-12-14 Ivsc Ip Llc Systems and methods for pairing of for-hire vehicle meters and medallions
US9037852B2 (en) 2011-09-02 2015-05-19 Ivsc Ip Llc System and method for independent control of for-hire vehicles
US9242618B2 (en) 2011-11-07 2016-01-26 Kabushiki Kaisha Tokai Rika Denki Seisakusho Wireless communication system for communication and displaying vehicle information on a portable device
US10013857B2 (en) * 2011-12-21 2018-07-03 Qualcomm Incorporated Using haptic technologies to provide enhanced media experiences
US20130227410A1 (en) * 2011-12-21 2013-08-29 Qualcomm Incorporated Using haptic technologies to provide enhanced media experiences
US20130325479A1 (en) * 2012-05-29 2013-12-05 Apple Inc. Smart dock for activating a voice recognition mode of a portable electronic device
US9711160B2 (en) * 2012-05-29 2017-07-18 Apple Inc. Smart dock for activating a voice recognition mode of a portable electronic device
US10404946B2 (en) * 2012-09-26 2019-09-03 Waldstock, Ltd System and method for real-time audiovisual interaction with a target location
US11716447B2 (en) 2012-09-26 2023-08-01 Waldstock, Ltd. System and method for real-time audiovisual interaction with a target location
US20140085400A1 (en) * 2012-09-26 2014-03-27 Waldstock Ltd System and method for real-time audiovisual interaction with a target location
US9054743B2 (en) * 2012-12-20 2015-06-09 Asa Electronics, Inc. Auto-pairing wireless audio/visual system
US20140179228A1 (en) * 2012-12-20 2014-06-26 Asa Electronics, Inc. Auto-pairing wireless audio/visual system
US10008060B2 (en) * 2013-03-07 2018-06-26 Denso Corporation Smart entry system
US20160005250A1 (en) * 2013-03-07 2016-01-07 Denso Corporation Smart entry system
US20150070132A1 (en) * 2013-09-11 2015-03-12 Sony Corporation Secure remote control for operating closures such as garage doors
US9373208B2 (en) * 2013-09-11 2016-06-21 Sony Corporation Secure remote control for operating closures such as garage doors
US9672368B2 (en) * 2014-04-30 2017-06-06 Visteon Global Technologies, Inc. Providing selective control of information shared from a first device to a second device
US20150317484A1 (en) * 2014-04-30 2015-11-05 Upton Beall Bowden Providing selective control of information shared from a first device to a second device
US10715654B1 (en) 2014-05-20 2020-07-14 Invincea, Inc. Methods and devices for secure authentication to a compute device
US10306052B1 (en) 2014-05-20 2019-05-28 Invincea, Inc. Methods and devices for secure authentication to a compute device
US11128750B1 (en) 2014-05-20 2021-09-21 Invincea, Inc. Methods and devices for secure authentication to a compute device
US20160058285A1 (en) * 2014-08-29 2016-03-03 Nihon Kohden Corporation Medical device system and medical device
US10568509B2 (en) * 2014-08-29 2020-02-25 Nihon Kohden Corporation Medical device system and medical device
US10374804B2 (en) 2014-09-11 2019-08-06 Samsung Electronics Co., Ltd. Method of controlling electronic device using wearable device and method of operating electronic device
US20160196420A1 (en) * 2015-01-07 2016-07-07 Htc Corporation Electronic system and device unlock method of the same
US10437981B2 (en) * 2015-01-07 2019-10-08 Htc Corporation Electronic system and device unlock method of the same
US10366582B2 (en) 2016-06-21 2019-07-30 Bank Of America Corporation Devices and systems for detecting unauthorized communication of data from a magnetic stripe device or embedded smart chip device
US9681471B1 (en) 2016-08-31 2017-06-13 Bank Of America Corporation Pairing of devices for activation/deactivation of a paired device
US11014515B2 (en) * 2016-12-21 2021-05-25 Audi Ag Method for configuring a vehicle
US9955519B1 (en) 2017-04-28 2018-04-24 Sonova Ag Systems and methods for license-enabled signal processing
US11757629B2 (en) * 2019-07-23 2023-09-12 Mastercard International Incorporated Methods and computing devices for auto-submission of user authentication credential
US20220067139A1 (en) * 2020-08-25 2022-03-03 Kyndryl, Inc. Loss prevention of devices

Also Published As

Publication number Publication date
US10869191B2 (en) 2020-12-15
US10034167B1 (en) 2018-07-24
US20200059781A1 (en) 2020-02-20
US20210058778A1 (en) 2021-02-25
US11540124B2 (en) 2022-12-27
US20180270655A1 (en) 2018-09-20
US20180270656A1 (en) 2018-09-20
US10405177B2 (en) 2019-09-03
US10405178B2 (en) 2019-09-03

Similar Documents

Publication Publication Date Title
US11540124B2 (en) Activation of cryptographically paired device
US20230145972A1 (en) Intelligent restriction of device operations
WO2019205065A1 (en) Method for quickly opening application or application function, and terminal
JP2020505676A (en) Application display method and related products
US9723471B2 (en) Method, mobile device and computer program product for triggering an event of interest based on communications established with nearby wireless devices
EP3565129A1 (en) Method and apparatus for unlocking electronic appliance
CN102687492A (en) Method and apparatus for user interaction while device is locked
US10567572B2 (en) Mobile device lock-out system
JP6858256B2 (en) Payment application separation methods and devices, as well as terminals
WO2014090132A1 (en) Electronic equipment and unlocking method of screen thereof
CN108781234B (en) Function control method and terminal
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
US20200342076A1 (en) Varying Computing Device Behavior For Different Authenticators
US20150148018A1 (en) Vehicle operator specific user device management
CN106447325B (en) NFC communication-based processing method and device and mobile terminal
WO2019024882A1 (en) Method for automatically encrypting short message, storage device and mobile terminal
KR20150041337A (en) Mobile terminal and auxiliary device for mobile terminal and method for controlling the same
JP2013085053A (en) Portable terminal, control method therefor, and program
WO2020192415A1 (en) Permission configuration method and terminal device
EP3667537B1 (en) Method for unlocking electronic device, electronic device, storage medium, and program product
EP3462719B1 (en) Method for unlocking a blocked portable electronic device in a vehicle
CN112863150B (en) Prompting method, prompting device, storage medium and mobile terminal
WO2019144357A1 (en) Unlocking method by emergency contact and user input, and terminal
KR20150042572A (en) Mobile terminal

Legal Events

Date Code Title Description
AS Assignment

Owner name: APPLE INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GRAESSLEY, JOSHUA V.;REEL/FRAME:021549/0602

Effective date: 20080813

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION