US20130154796A1 - Secure Profile Setting In A Shared Device - Google Patents

Secure Profile Setting In A Shared Device Download PDF

Info

Publication number
US20130154796A1
US20130154796A1 US13/764,992 US201313764992A US2013154796A1 US 20130154796 A1 US20130154796 A1 US 20130154796A1 US 201313764992 A US201313764992 A US 201313764992A US 2013154796 A1 US2013154796 A1 US 2013154796A1
Authority
US
United States
Prior art keywords
user
shared device
rfid transponder
module
transponder module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/764,992
Inventor
Wael W. Diab
Mohammad Issa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avago Technologies International Sales Pte Ltd
Original Assignee
Broadcom Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Broadcom Corp filed Critical Broadcom Corp
Priority to US13/764,992 priority Critical patent/US20130154796A1/en
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ISSA, MOHAMMAD, DIAB, WAEL W.
Publication of US20130154796A1 publication Critical patent/US20130154796A1/en
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENT reassignment BANK OF AMERICA, N.A., AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: BROADCOM CORPORATION
Assigned to AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. reassignment AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BROADCOM CORPORATION
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS Assignors: BANK OF AMERICA, N.A., AS COLLATERAL AGENT
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B1/00Comparing elements, i.e. elements for effecting comparison directly or indirectly between a desired value and existing or anticipated values
    • G05B1/01Comparing elements, i.e. elements for effecting comparison directly or indirectly between a desired value and existing or anticipated values electric
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Definitions

  • the present invention relates generally to electronic systems. More particularly, the present invention relates to configuring electronic systems.
  • a shared device which can be used by any one of a number of authorized users, such as a Voice over Internet Protocol (VoIP) telephone, typically provides access to a user by requiring the user to manually input some form of identification data, such as a user ID and a password.
  • the identification data is typically associated with a profile of the user, which may include a particular configuration of settings for the shared device.
  • a profile may include the personalized settings of the user and settings which grant the user access to a particular set of features in the shared device. Therefore, once a user provides the identification data, the profile of the user can be set in the shared device by adjusting the settings in the shared device in accordance with the configuration of settings included in the profile.
  • requiring the user of the shared device to recall and manually enter the abovementioned identification data each time the shared device is to be used can greatly inconvenience the user.
  • the known methods used to overcome the abovementioned difficulties associated with requiring the user to manually enter a user ID and password involve allowing the user to physically plug in a device representing a token into the shared device.
  • one such known method involves the use of a USB device which can be plugged directly into a USB port that is provided on the shared device.
  • the USB device can be associated with a particular user and can include the user's identification data as well as the profile of the user.
  • the USB device can introduce significant drawbacks. For example, each user will typically be required to carry an assigned USB device with them at all times in order to gain access to the shared device, which can inconvenience the user since such USB devices can be bulky.
  • the USB port provided on the shared device typically includes an exposed metal pad, which can make the shared device more vulnerable to damage caused by electrostatic discharge (ESD) as well as increase the difficulty of passing an ESD test.
  • ESD electrostatic discharge
  • FIG. 1 is a block diagram illustrating a system for secure profile setting in a shared device, according to one embodiment of the present invention
  • FIG. 2 is a flow diagram illustrating a method for secure profile setting of at least one shared device, according to one embodiment of the present invention.
  • FIG. 3 is a block diagram illustrating a system for secure profile setting in a shared device, according to one embodiment of the present invention
  • FIG. 4 is a flow diagram illustrating a method for secure profile setting of at least one shared device, according to one embodiment of the present invention.
  • FIG. 1 shows a block diagram of an exemplary system for secure profile setting in a shared device in accordance with one embodiment of the invention.
  • System 100 in FIG. 1 includes shared device 102 , RFID transponder module 104 , and database 106 .
  • Shared device 102 can be, for example, any device that be used and configured by multiple users, such as a VoIP telephone, a laptop computer, or a cellular telephone.
  • shared device 102 includes central processing unit (CPU) 108 and radio frequency identification (RFID) reader module 110 .
  • CPU 108 can communicate with RFID reader module 110 via bus 112 .
  • RFID reader module 110 can be, for example, an RFID reader that is embedded in shared device 102 .
  • system 100 includes RFID transponder module 104 , which can communicate with shared device 102 via RFID reader module 110 in a manner known in the art.
  • RFID transponder module 104 and RFID reader module 110 can establish a communication link between one another, such as communication link 116 , using radio frequency signals.
  • system 100 includes database 106 , which is in communication with shared device 102 via communication path 114 .
  • Communication path 114 can be a physical connection, such as a bus, or a wired or wireless data link that enables communication over a network.
  • Database 106 can be a database that is accessible over a network.
  • shared device 102 can be configured to cache a copy of database 106 and to access the cached copy of database 106 locally.
  • Database 106 can include a number of profiles, where each profile includes a configuration of settings for shared device 102 .
  • the configuration of settings can include, for example, the personalized settings of the user and settings which grant the user access to a particular set of features in shared device 102 . Accordingly, each profile in database 106 can correspond to a particular user of shared device 102 .
  • RFID transponder module 104 in FIG. 1 can include, for example, a chip-based RFID tag capable of storing data and transmitting data to an RFID reader using radio frequency signals.
  • RFID transponder module 104 can store authentication data that can be used by shared device 102 to establish the identity of a user, such as a number associated with a particular user (e.g., an employee number) or biometric authentication data associated with a particular user, such as a fingerprint template or a voice template.
  • FIG. 1 depicts a single RFID transponder module (i.e., RFID transponder module 104 )
  • system 100 can include additional RFID transponder modules.
  • system 100 can include additional shared devices.
  • each user of shared device 102 can be associated with a particular RFID transponder module, such as RFID transponder module 104 .
  • FIG. 2 illustrates flowchart 200 for performing an exemplary method for secure profile setting in a shared device in accordance with one embodiment of the present invention.
  • the method for secure profile setting can be initiated by a signal transmitted from RFID transponder module 104 in FIG. 1 , which can be associated with a user of shared device 102 .
  • the user may place RFID transponder module 104 within a suitable range of shared device 102 to allow communication link 116 to be established between RFID transponder module 104 and RFID reader module 110 embedded in shared device 102 .
  • Communication link 116 can be established, for example, when RFID transponder module 104 receives adequate incoming radio frequency signals from RFID reader module 110 which then enables RFID transponder module 104 to transmit a signal back to RFID reader module 110 .
  • shared device 102 in FIG. 1 can be a VoIP telephone having an embedded RFID reader module.
  • a user can place the associated RFID transponder module within a suitable range of the VoIP telephone to allow a communication link to be established between the RFID transponder module and the embedded RFID reader module using radio frequency signals.
  • the signal transmitted by RFID transponder module 104 to RFID reader module 110 is used by shared device 102 to identify the user.
  • RFID transponder module 104 can include a chip-based RFID tag that is capable of storing data and transmitting the stored data.
  • the signal transmitted by RFID transponder module 110 can include various types of authentication data that can be associated with the user, such as biometric authentication data.
  • RFID transponder module 104 can include biometric authentication data associated with a particular user, such as a fingerprint template or a voice template.
  • RFID reader module 110 can provide the authentication data to CPU 108 via bus 112 to properly identify the user.
  • the user may be prompted by shared device 102 to provide a voice sample, which can be achieved by having the user speak into a microphone coupled to shared device 102 (not shown in FIG. 1 ).
  • the voice sample can then be compared to the voice template acquired from RFID transponder module 104 , and if the voice sample matches the voice template, the user can be positively identified by shared device 102 .
  • shared device 102 retrieves a profile stored in database 106 that corresponds to the user identified in step 204 .
  • database 106 can include a number of profiles, such that each profile corresponds to a particular user. Therefore, once the identity of a user is established in step 204 , shared device 102 can proceed to query database 106 , for example, for the profile corresponding to the identified user and can retrieve the profile via communication path 114 .
  • the profile retrieved in step 206 is set in shared device 102 by determining from the profile, for example, a configuration of settings for shared device 102 .
  • the configuration of settings can include, for example, the personalized settings of the user and other settings which can grant the user access to a particular set of features in shared device 102 .
  • shared device 102 is a VoIP telephone
  • a user's profile may require that the volume on the VoIP telephone be set to a particular level and to bill calls placed by the user to a particular account.
  • the profile can be set in shared device 102 by adjusting the settings in shared device 102 in accordance with the configuration of settings included in the user's profile.
  • FIG. 3 shows a block diagram of an exemplary system for secure profile setting in a shared device in accordance with one embodiment of the invention.
  • System 300 in FIG. 3 includes shared device 302 , which includes CPU 308 , RFID reader module 310 , and bus 312 .
  • System 300 further includes database 306 and communication path 314 .
  • Shared device 302 , CPU 308 , RFID reader module 310 , bus 312 , database 306 , and communication path 314 in FIG. 3 correspond to shared device 102 , CPU 108 , RFID reader module 110 , bus 112 , database 106 , and communication path 114 in FIG. 1 , respectively.
  • System 300 further includes RFID transponder module 304 .
  • RFID transponder module 304 includes RFID tag 318 and fingerprint scanner module 322 .
  • Fingerprint scanner module 322 can communicate with RFID tag 318 via bus 320 .
  • Fingerprint scanner module 322 can include a fingerprint scanner which can be used to acquire fingerprint data directly from the user.
  • Fingerprint scanner module 322 can further include a microchip which can compare the acquired fingerprint data to a fingerprint template stored in RFID tag 318 to determine if there is a match, in which case the user can be positively identified as the person associated with RFID transponder module 304 .
  • RFID transponder module 304 can be configured to transmit a signal to RFID reader module 310 only if the acquired fingerprint data matches the fingerprint template stored in RFID tag 318 .
  • the signal can include identification data, such as a name or an employee number of the user, which can allow shared device 302 to establish the identity of the user and to eventually grant the user access to shared device 302 .
  • the abovementioned microchip can be included in RFID reader module 310 .
  • RFID transponder module 304 can be configured to transmit a signal to RFID reader module 310 that includes both the acquired fingerprint data and the fingerprint template stored in RFID tag 318 .
  • the acquired fingerprint data and the fingerprint template can be compared using the microchip included in RFID module 304 to determine if there is a match, in which case the user can be positively identified.
  • a non-authorized user whose fingerprint data does not match the fingerprint template stored in the RFID tag of a particular RFID transponder module cannot gain access to the shared device.
  • FIG. 4 illustrates flowchart 400 for performing an exemplary method for secure profile setting in a shared device in accordance with one embodiment of the present invention.
  • the method for secure profile setting can be initiated by acquiring the user's fingerprint data using fingerprint scanner module 322 included in RFID transponder module 304 .
  • the fingerprint data is compared to the fingerprint template stored in RFID tag 318 to determine if there is a match. If the there is no match, step 402 can be repeated. If there is a match, then at step 406 , a signal is transmitted from RFID transponder module 304 to shared device 302 .
  • the user may place RFID transponder module 304 within a suitable range of shared device 302 to allow communication link 316 to be established between RFID transponder module 304 and RFID reader module 310 embedded in shared device 302 .
  • Communication link 316 can be established, for example, when RFID transponder module 304 receives adequate incoming radio frequency signals from RFID reader module 310 which then enables RFID transponder module 304 to transmit a signal back to RFID reader module 310 .
  • the signal transmitted by RFID transponder module 304 to RFID reader module 310 is used by shared device 302 to identify the user.
  • RFID tag 318 can be a chip-based RFID tag that is capable of storing data and transmitting the stored data
  • the signal transmitted by RFID transponder module 304 can include various types of authentication data that can be associated with the user, such as a name of the user, an employee number, or biometric authentication data. Therefore, once RFID reader module 310 acquires the authentication data from RFID transponder module 304 , RFID reader module 310 can provide the authentication data to CPU 308 via bus 312 to properly identify the user.
  • shared device 302 retrieves a profile stored in database 306 that corresponds to the user identified in step 408 .
  • database 306 can include a number of profiles, such that each profile corresponds to a particular user. Therefore, once the identity of a user is established in step 408 , shared device 302 can proceed to query database 306 , for example, for the profile corresponding to the identified user and can retrieve the profile via communication path 314 .
  • the profile retrieved in step 410 is set in shared device 302 by determining from the profile, for example, a configuration of settings for shared device 302 .
  • the configuration of settings can include, for example, the personalized settings of the user and other settings which can grant the user access to a particular set of features in shared device 302 .
  • shared device 302 is a VoIP telephone
  • a user's profile may require that the volume on the VoIP telephone be set to a particular level and to bill calls placed by the user to a particular account.
  • the profile can be set in shared device 302 by adjusting the settings in shared device 302 in accordance with the configuration of settings included in the user's profile.
  • the present invention can be implemented in various shared devices where a user's profile can be set in the shared device.
  • the invention can be implemented in a corporate cellular telephone which can be shared among a number of associates in a corporation or a telecommunication terminal, such as a VoIP telephone terminal, that is coupled to a network.
  • the invention can also be implemented in a computer terminal that is coupled to a network as well as a laptop computer or other portable electronic device.
  • the invention can be implemented in a motor vehicle, for example, by allowing a user to set a profile in the motor vehicle which includes the user's seating and mirror positions or other types of settings preferred by a user.
  • the invention enables a user to set a profile in a shared device by placing an RFID transponder module (e.g., RFID transponder module 104 ) associated with the user within a suitable range of the shared device to establish a communication link (e.g., communication link is 116 ) between the RFID transponder module and the RFID reader module embedded in the shared device.
  • an RFID transponder module e.g., RFID transponder module 104
  • a communication link e.g., communication link is 116
  • the abovementioned exemplary security features of the invention such as the fingerprint scanner that may be included in the RFID transponder module, can provide secure profile setting in the shared device by ensuring that the user of the shared device is authorized to use the shared device.
  • the present invention can be implemented without inconveniencing the user of the shared device.
  • the RFID transponder module of the present invention can include a small RFID tag
  • the RFID transponder module can be conveniently placed in an identification badge or other small object which a user, for example, is already required to carry. Consequently, the present invention advantageously avoids requiring the user to carry additional bulky devices, such as a USB device.
  • the present invention in further contrast to the conventional system including the USB device, the present invention's ability to set a profile in a shared device by the transmission of data between an RFID transponder module and an RFID reader module embedded in the shared device can advantageously maintain the electrical isolation of the shared device. More specifically, since the present invention does not require additional ports to be included on the shared device, such as a USB port, the present invention does not introduce any exposed metal pads which can increase the shared device's vulnerability to damage caused by ESD and which can increase the difficulty of passing an ESD test.

Abstract

There is provided a system for secure profile setting that includes at least one shared device and an RFID reader module embedded in the at least one shared device. The system further includes a database that is in communication with the at least one shared device. In the system, an RFID transponder module associated with a user transmits a signal that enables the at least one shared device to identify the user. The RFID transponder module can include a fingerprint scanner module, which can be used to acquire a user's fingerprint data to authenticate the user. Thus, after identifying the user, the at least one shared device retrieves a profile corresponding to the user from the database and sets the profile.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates generally to electronic systems. More particularly, the present invention relates to configuring electronic systems.
  • 2. Background Art
  • A shared device which can be used by any one of a number of authorized users, such as a Voice over Internet Protocol (VoIP) telephone, typically provides access to a user by requiring the user to manually input some form of identification data, such as a user ID and a password. The identification data is typically associated with a profile of the user, which may include a particular configuration of settings for the shared device. For example, a profile may include the personalized settings of the user and settings which grant the user access to a particular set of features in the shared device. Therefore, once a user provides the identification data, the profile of the user can be set in the shared device by adjusting the settings in the shared device in accordance with the configuration of settings included in the profile. However, requiring the user of the shared device to recall and manually enter the abovementioned identification data each time the shared device is to be used can greatly inconvenience the user.
  • The known methods used to overcome the abovementioned difficulties associated with requiring the user to manually enter a user ID and password involve allowing the user to physically plug in a device representing a token into the shared device. In particular, one such known method involves the use of a USB device which can be plugged directly into a USB port that is provided on the shared device. The USB device can be associated with a particular user and can include the user's identification data as well as the profile of the user. However, the USB device can introduce significant drawbacks. For example, each user will typically be required to carry an assigned USB device with them at all times in order to gain access to the shared device, which can inconvenience the user since such USB devices can be bulky. Moreover, the USB port provided on the shared device typically includes an exposed metal pad, which can make the shared device more vulnerable to damage caused by electrostatic discharge (ESD) as well as increase the difficulty of passing an ESD test.
  • Thus, there is a strong need in the art for a system, which allows convenient and secure profile setting in a shared device.
  • SUMMARY OF THE INVENTION
  • There are provided systems and methods for secure profile setting in a shared device, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The features and advantages of the present invention will become more readily apparent to those ordinarily skilled in the art after reviewing the following detailed description and accompanying drawings, wherein:
  • FIG. 1 is a block diagram illustrating a system for secure profile setting in a shared device, according to one embodiment of the present invention;
  • FIG. 2 is a flow diagram illustrating a method for secure profile setting of at least one shared device, according to one embodiment of the present invention.
  • FIG. 3 is a block diagram illustrating a system for secure profile setting in a shared device, according to one embodiment of the present invention;
  • FIG. 4 is a flow diagram illustrating a method for secure profile setting of at least one shared device, according to one embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Although the invention is described with respect to specific embodiments, the principles of the invention, as defined by the claims appended herein, can obviously be applied beyond the specifically described embodiments of the invention described herein. Moreover, in the description of the present invention, certain details have been left out in order to not obscure the inventive aspects of the invention. The details left out are within the knowledge of a person of ordinary skill in the art.
  • The drawings in the present application and their accompanying detailed description are directed to merely example embodiments of the invention. To maintain brevity, other embodiments of the invention which use the principles of the present invention are not specifically described in the present application and are not specifically illustrated by the present drawings. It should be borne in mind that, unless noted otherwise, like or corresponding elements among the figures may be indicated by like or corresponding reference numerals.
  • FIG. 1 shows a block diagram of an exemplary system for secure profile setting in a shared device in accordance with one embodiment of the invention. System 100 in FIG. 1 includes shared device 102, RFID transponder module 104, and database 106. Shared device 102 can be, for example, any device that be used and configured by multiple users, such as a VoIP telephone, a laptop computer, or a cellular telephone.
  • As shown in FIG. 1, shared device 102 includes central processing unit (CPU) 108 and radio frequency identification (RFID) reader module 110. As also shown in FIG. 1, CPU 108 can communicate with RFID reader module 110 via bus 112. RFID reader module 110 can be, for example, an RFID reader that is embedded in shared device 102. As also shown in FIG. 1, system 100 includes RFID transponder module 104, which can communicate with shared device 102 via RFID reader module 110 in a manner known in the art. For example, RFID transponder module 104 and RFID reader module 110 can establish a communication link between one another, such as communication link 116, using radio frequency signals.
  • As further shown in FIG. 1, system 100 includes database 106, which is in communication with shared device 102 via communication path 114. Communication path 114, for example, can be a physical connection, such as a bus, or a wired or wireless data link that enables communication over a network. Database 106, for example, can be a database that is accessible over a network. In one embodiment, shared device 102 can be configured to cache a copy of database 106 and to access the cached copy of database 106 locally. Database 106, for example, can include a number of profiles, where each profile includes a configuration of settings for shared device 102. The configuration of settings can include, for example, the personalized settings of the user and settings which grant the user access to a particular set of features in shared device 102. Accordingly, each profile in database 106 can correspond to a particular user of shared device 102.
  • RFID transponder module 104 in FIG. 1 can include, for example, a chip-based RFID tag capable of storing data and transmitting data to an RFID reader using radio frequency signals. For example, RFID transponder module 104 can store authentication data that can be used by shared device 102 to establish the identity of a user, such as a number associated with a particular user (e.g., an employee number) or biometric authentication data associated with a particular user, such as a fingerprint template or a voice template. It should be noted that although FIG. 1 depicts a single RFID transponder module (i.e., RFID transponder module 104), system 100 can include additional RFID transponder modules. Moreover, system 100 can include additional shared devices. Thus, in exemplary system 100, each user of shared device 102 can be associated with a particular RFID transponder module, such as RFID transponder module 104.
  • FIG. 2 illustrates flowchart 200 for performing an exemplary method for secure profile setting in a shared device in accordance with one embodiment of the present invention. As shown in FIG. 2, at step 202 of flowchart 200, the method for secure profile setting can be initiated by a signal transmitted from RFID transponder module 104 in FIG. 1, which can be associated with a user of shared device 102. For example, the user may place RFID transponder module 104 within a suitable range of shared device 102 to allow communication link 116 to be established between RFID transponder module 104 and RFID reader module 110 embedded in shared device 102. Communication link 116 can be established, for example, when RFID transponder module 104 receives adequate incoming radio frequency signals from RFID reader module 110 which then enables RFID transponder module 104 to transmit a signal back to RFID reader module 110. Thus, in one exemplary embodiment of the invention, shared device 102 in FIG. 1 can be a VoIP telephone having an embedded RFID reader module. In such an embodiment, a user can place the associated RFID transponder module within a suitable range of the VoIP telephone to allow a communication link to be established between the RFID transponder module and the embedded RFID reader module using radio frequency signals.
  • As shown in FIG. 2, at step 204 of flowchart 200, the signal transmitted by RFID transponder module 104 to RFID reader module 110 is used by shared device 102 to identify the user. As previously discussed, RFID transponder module 104 can include a chip-based RFID tag that is capable of storing data and transmitting the stored data. Thus, the signal transmitted by RFID transponder module 110 can include various types of authentication data that can be associated with the user, such as biometric authentication data. For example, RFID transponder module 104 can include biometric authentication data associated with a particular user, such as a fingerprint template or a voice template. Therefore, once RFID reader module 110 acquires the authentication data from RFID transponder module 104, RFID reader module 110 can provide the authentication data to CPU 108 via bus 112 to properly identify the user. For example, the user may be prompted by shared device 102 to provide a voice sample, which can be achieved by having the user speak into a microphone coupled to shared device 102 (not shown in FIG. 1). The voice sample can then be compared to the voice template acquired from RFID transponder module 104, and if the voice sample matches the voice template, the user can be positively identified by shared device 102.
  • As shown in FIG. 2, at step 206 of flowchart 200, shared device 102 retrieves a profile stored in database 106 that corresponds to the user identified in step 204. As previously mentioned, database 106 can include a number of profiles, such that each profile corresponds to a particular user. Therefore, once the identity of a user is established in step 204, shared device 102 can proceed to query database 106, for example, for the profile corresponding to the identified user and can retrieve the profile via communication path 114.
  • As shown in FIG. 2, at step 208 of flowchart 200, the profile retrieved in step 206 is set in shared device 102 by determining from the profile, for example, a configuration of settings for shared device 102. The configuration of settings can include, for example, the personalized settings of the user and other settings which can grant the user access to a particular set of features in shared device 102. For example, in the embodiment of the invention where shared device 102 is a VoIP telephone, a user's profile may require that the volume on the VoIP telephone be set to a particular level and to bill calls placed by the user to a particular account. Thus, once the configuration of settings are determined from the profile, the profile can be set in shared device 102 by adjusting the settings in shared device 102 in accordance with the configuration of settings included in the user's profile.
  • FIG. 3 shows a block diagram of an exemplary system for secure profile setting in a shared device in accordance with one embodiment of the invention. System 300 in FIG. 3 includes shared device 302, which includes CPU 308, RFID reader module 310, and bus 312. System 300 further includes database 306 and communication path 314. Shared device 302, CPU 308, RFID reader module 310, bus 312, database 306, and communication path 314 in FIG. 3 correspond to shared device 102, CPU 108, RFID reader module 110, bus 112, database 106, and communication path 114 in FIG. 1, respectively. System 300 further includes RFID transponder module 304.
  • As shown in FIG. 3, RFID transponder module 304 includes RFID tag 318 and fingerprint scanner module 322. Fingerprint scanner module 322 can communicate with RFID tag 318 via bus 320. Fingerprint scanner module 322 can include a fingerprint scanner which can be used to acquire fingerprint data directly from the user. Fingerprint scanner module 322 can further include a microchip which can compare the acquired fingerprint data to a fingerprint template stored in RFID tag 318 to determine if there is a match, in which case the user can be positively identified as the person associated with RFID transponder module 304. For example, RFID transponder module 304 can be configured to transmit a signal to RFID reader module 310 only if the acquired fingerprint data matches the fingerprint template stored in RFID tag 318. Thus, the signal can include identification data, such as a name or an employee number of the user, which can allow shared device 302 to establish the identity of the user and to eventually grant the user access to shared device 302.
  • In another embodiment, the abovementioned microchip can be included in RFID reader module 310. In such an embodiment, RFID transponder module 304 can be configured to transmit a signal to RFID reader module 310 that includes both the acquired fingerprint data and the fingerprint template stored in RFID tag 318. As such, the acquired fingerprint data and the fingerprint template can be compared using the microchip included in RFID module 304 to determine if there is a match, in which case the user can be positively identified. Thus, a non-authorized user whose fingerprint data does not match the fingerprint template stored in the RFID tag of a particular RFID transponder module cannot gain access to the shared device.
  • FIG. 4 illustrates flowchart 400 for performing an exemplary method for secure profile setting in a shared device in accordance with one embodiment of the present invention. As shown in FIG. 4, at step 402 of flowchart 400, the method for secure profile setting can be initiated by acquiring the user's fingerprint data using fingerprint scanner module 322 included in RFID transponder module 304. Thereafter, at decision step 404, the fingerprint data is compared to the fingerprint template stored in RFID tag 318 to determine if there is a match. If the there is no match, step 402 can be repeated. If there is a match, then at step 406, a signal is transmitted from RFID transponder module 304 to shared device 302. For example, the user may place RFID transponder module 304 within a suitable range of shared device 302 to allow communication link 316 to be established between RFID transponder module 304 and RFID reader module 310 embedded in shared device 302. Communication link 316 can be established, for example, when RFID transponder module 304 receives adequate incoming radio frequency signals from RFID reader module 310 which then enables RFID transponder module 304 to transmit a signal back to RFID reader module 310.
  • As shown in FIG. 4, at step 408 of flowchart 400, the signal transmitted by RFID transponder module 304 to RFID reader module 310 is used by shared device 302 to identify the user. Since RFID tag 318 can be a chip-based RFID tag that is capable of storing data and transmitting the stored data, the signal transmitted by RFID transponder module 304 can include various types of authentication data that can be associated with the user, such as a name of the user, an employee number, or biometric authentication data. Therefore, once RFID reader module 310 acquires the authentication data from RFID transponder module 304, RFID reader module 310 can provide the authentication data to CPU 308 via bus 312 to properly identify the user.
  • As shown in FIG. 4, at step 410 of flowchart 400, shared device 302 retrieves a profile stored in database 306 that corresponds to the user identified in step 408. As previously mentioned, database 306 can include a number of profiles, such that each profile corresponds to a particular user. Therefore, once the identity of a user is established in step 408, shared device 302 can proceed to query database 306, for example, for the profile corresponding to the identified user and can retrieve the profile via communication path 314.
  • As shown in FIG. 4, at step 412 of flowchart 400, the profile retrieved in step 410 is set in shared device 302 by determining from the profile, for example, a configuration of settings for shared device 302. The configuration of settings can include, for example, the personalized settings of the user and other settings which can grant the user access to a particular set of features in shared device 302. For example, in the embodiment of the invention where shared device 302 is a VoIP telephone, a user's profile may require that the volume on the VoIP telephone be set to a particular level and to bill calls placed by the user to a particular account. Thus, once the configuration of settings are determined from the profile, the profile can be set in shared device 302 by adjusting the settings in shared device 302 in accordance with the configuration of settings included in the user's profile.
  • Therefore, the present invention can be implemented in various shared devices where a user's profile can be set in the shared device. For example, the invention can be implemented in a corporate cellular telephone which can be shared among a number of associates in a corporation or a telecommunication terminal, such as a VoIP telephone terminal, that is coupled to a network. The invention can also be implemented in a computer terminal that is coupled to a network as well as a laptop computer or other portable electronic device. Furthermore, the invention can be implemented in a motor vehicle, for example, by allowing a user to set a profile in the motor vehicle which includes the user's seating and mirror positions or other types of settings preferred by a user.
  • Thus, the invention enables a user to set a profile in a shared device by placing an RFID transponder module (e.g., RFID transponder module 104) associated with the user within a suitable range of the shared device to establish a communication link (e.g., communication link is 116) between the RFID transponder module and the RFID reader module embedded in the shared device. Moreover, the abovementioned exemplary security features of the invention, such as the fingerprint scanner that may be included in the RFID transponder module, can provide secure profile setting in the shared device by ensuring that the user of the shared device is authorized to use the shared device.
  • In contrast to the conventional system including the USB device discussed above, the present invention can be implemented without inconveniencing the user of the shared device. For example, since the RFID transponder module of the present invention can include a small RFID tag, the RFID transponder module can be conveniently placed in an identification badge or other small object which a user, for example, is already required to carry. Consequently, the present invention advantageously avoids requiring the user to carry additional bulky devices, such as a USB device.
  • In further contrast to the conventional system including the USB device, the present invention's ability to set a profile in a shared device by the transmission of data between an RFID transponder module and an RFID reader module embedded in the shared device can advantageously maintain the electrical isolation of the shared device. More specifically, since the present invention does not require additional ports to be included on the shared device, such as a USB port, the present invention does not introduce any exposed metal pads which can increase the shared device's vulnerability to damage caused by ESD and which can increase the difficulty of passing an ESD test.
  • From the above description of the invention it is manifest that various techniques can be used for implementing the concepts of the present invention without departing from its scope. Moreover, while the invention has been described with specific reference to certain embodiments, a person of ordinary skill in the art would recognize that changes can be made in form and detail without departing from the spirit and the scope of the invention. For example, it is contemplated that the circuitry disclosed herein can be implemented in software, or vice versa. The described embodiments are to be considered in all respects as illustrative and not restrictive. It should also be understood that the invention is not limited to the particular embodiments described herein, but is capable of many rearrangements, modifications, and substitutions without departing from the scope of the invention.

Claims (15)

1-20. (canceled)
21. A motor vehicle for communication with an RFID transponder module, wherein said RFID transponder module is associated with a user of said motor vehicle, the motor vehicle comprising:
an RFID reader module;
a database;
wherein said RFID reader module is configured to receive a signal from said RFID transponder module and identify said user in response to said RFID reader module receiving said signal, wherein said motor vehicle is further configured to retrieve a profile corresponding to said user from said database in response to identifying said user, and wherein said profile includes personalized settings of said user for using said motor vehicle.
22. The motor vehicle of claim 21, wherein said RFID transponder module is configured to acquire biometric data, including fingerprint data, from said user and to transmit said signal if said fingerprint data matches a fingerprint template of said user's biometric data stored in said RFID transponder module.
23. The motor vehicle of claim 21, wherein said RFID transponder module is configured to acquire biometric data, including fingerprint data, from said user and to include said fingerprint data and a fingerprint template stored in said RFID transponder module in said signal.
24. The motor vehicle of claim 21, wherein said motor vehicle identifies said user by matching a voice template of said user's biometric data stored in said transponder to a voice of said user.
25. The motor vehicle of claim 21, wherein said RFID transponder module includes a fingerprint scanner.
26. The motor vehicle of claim 21, wherein said personalized settings include a seating position for said user.
27. The motor vehicle of claim 21, wherein said personalized settings include a mirror position for said user.
28. A method for use by a motor vehicle having an RFID reader module and a database, the method comprising:
receiving a signal from a RFID transponder module using said RFID reader module, wherein said RFID transponder module is associated with a user of said motor vehicle
identifying said user in response to said RFID reader module receiving said signal;
retrieving a profile corresponding to said user from said database in response to identifying said user;
wherein said profile includes personalized settings of said user for using said motor vehicle.
29. The method of claim 28, wherein said RFID transponder module is configured to acquire biometric data, including fingerprint data, from said user and to transmit said signal if said fingerprint data matches a fingerprint template of said user's biometric data stored in said RFID transponder module.
30. The method of claim 28, wherein said RFID transponder module is configured to acquire biometric data, including fingerprint data, from said user and to include said fingerprint data and a fingerprint template stored in said RFID transponder module in said signal.
31. The method of claim 28, wherein said motor vehicle identifies said user by matching a voice template of said user's biometric data stored in said transponder to a voice of said user.
32. The method of claim 28, wherein said RFID transponder module includes a fingerprint scanner.
33. The method of claim 28, wherein said personalized settings include a seating position for said user.
34. The method of claim 28, wherein said personalized settings include a mirror position for said user.
US13/764,992 2006-10-30 2013-02-12 Secure Profile Setting In A Shared Device Abandoned US20130154796A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/764,992 US20130154796A1 (en) 2006-10-30 2013-02-12 Secure Profile Setting In A Shared Device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/590,204 US8395478B2 (en) 2006-10-30 2006-10-30 Secure profile setting in a shared device
US13/764,992 US20130154796A1 (en) 2006-10-30 2013-02-12 Secure Profile Setting In A Shared Device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/590,204 Continuation US8395478B2 (en) 2006-10-30 2006-10-30 Secure profile setting in a shared device

Publications (1)

Publication Number Publication Date
US20130154796A1 true US20130154796A1 (en) 2013-06-20

Family

ID=39329426

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/590,204 Active 2029-10-10 US8395478B2 (en) 2006-10-30 2006-10-30 Secure profile setting in a shared device
US13/764,992 Abandoned US20130154796A1 (en) 2006-10-30 2013-02-12 Secure Profile Setting In A Shared Device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/590,204 Active 2029-10-10 US8395478B2 (en) 2006-10-30 2006-10-30 Secure profile setting in a shared device

Country Status (1)

Country Link
US (2) US8395478B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10291624B1 (en) 2015-12-30 2019-05-14 Synaptics Incorporated Trusted system for a user profile

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101622849B (en) * 2007-02-02 2014-06-11 网圣公司 System and method for adding context to prevent data leakage over a computer network
US9130986B2 (en) * 2008-03-19 2015-09-08 Websense, Inc. Method and system for protection against information stealing software
US8407784B2 (en) * 2008-03-19 2013-03-26 Websense, Inc. Method and system for protection against information stealing software
US9015842B2 (en) 2008-03-19 2015-04-21 Websense, Inc. Method and system for protection against information stealing software
US20100122289A1 (en) * 2008-11-10 2010-05-13 At&T Intellectual Property I, L.P. Portable Client-Side Settings for a Multimedia Content Distribution Network
US8347360B2 (en) * 2009-05-15 2013-01-01 Verizon Patent And Licensing Inc. Shared device identity manager
US9130972B2 (en) * 2009-05-26 2015-09-08 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
CN102348005B (en) * 2010-08-05 2014-06-18 鸿富锦精密工业(深圳)有限公司 Internet protocol (IP) phone and method for performing telephone communication by utilizing same
CN102457601B (en) * 2010-10-22 2015-08-19 国民技术股份有限公司 A kind of RFID smart card cell phone incoming call information notifying system and method
WO2013040328A1 (en) 2011-09-14 2013-03-21 Service Heartbeat Llc Automated login initialization on detection of identifying information
US8942623B2 (en) 2011-12-02 2015-01-27 Qualcomm Incorporated Reducing NFC peer mode connection times
JP2015505284A (en) * 2011-12-29 2015-02-19 インテル コーポレイション System, method and apparatus for identifying vehicle occupants
US9054750B2 (en) 2012-04-23 2015-06-09 Qualcomm Incorporated Methods and apparatus for improving RF discovery for peer mode communications
US8923761B2 (en) * 2012-05-17 2014-12-30 Qualcomm Incorporated Methods and apparatus for improving NFC RF discovery loop tuning based on device sensor measurements
US9241259B2 (en) 2012-11-30 2016-01-19 Websense, Inc. Method and apparatus for managing the transfer of sensitive information to mobile devices
US9244448B2 (en) * 2013-02-08 2016-01-26 Caterpillar Inc. Serviceability strategy for machine control system
US20140230019A1 (en) * 2013-02-14 2014-08-14 Google Inc. Authentication to a first device using a second device
US9117451B2 (en) * 2013-02-20 2015-08-25 Google Inc. Methods and systems for sharing of adapted voice profiles
US9230430B2 (en) 2013-11-27 2016-01-05 Google Inc. Detecting removal of wearable authentication device
KR102461325B1 (en) 2015-10-29 2022-10-31 삼성전자주식회사 Portable biometric authentication device and terminal device using near field communication
KR102467033B1 (en) 2015-10-29 2022-11-14 삼성전자주식회사 Stack type semiconductor device
EP3315977A1 (en) * 2016-10-31 2018-05-02 Rohde & Schwarz GmbH & Co. KG Measuring device for measuring signals and data handling method
US11258789B2 (en) 2018-12-04 2022-02-22 Forcepoint Llc System and method for fingerprint validation

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6041410A (en) * 1997-12-22 2000-03-21 Trw Inc. Personal identification fob
US6356838B1 (en) * 2000-07-25 2002-03-12 Sunil Paul System and method for determining an efficient transportation route
US20020107010A1 (en) * 2000-12-22 2002-08-08 Witte Markus Valter Communication system for use with a vehicle
US6505780B1 (en) * 2001-12-05 2003-01-14 Koninklijke Philips Electronics N.V. Personalize vehicle settings using RF tags
US20030098774A1 (en) * 2000-03-21 2003-05-29 Chornenky Todd E. Security apparatus
US20030222758A1 (en) * 2002-01-24 2003-12-04 Robin Willats Vehicle access control and start system
US20030223624A1 (en) * 2002-05-30 2003-12-04 Laurence Hamid Method and apparatus for hashing data
US20040093155A1 (en) * 2002-11-12 2004-05-13 Simonds Craig John System and method for providing vehicle context information
US20040098179A1 (en) * 2002-11-14 2004-05-20 Sokoloski Darren Scott Vehicle security device
US20040220798A1 (en) * 2003-05-01 2004-11-04 Visteon Global Technologies, Inc. Remote voice identification system
US6819219B1 (en) * 2000-10-13 2004-11-16 International Business Machines Corporation Method for biometric-based authentication in wireless communication for access control
US20040252013A1 (en) * 2003-06-10 2004-12-16 Visteon Global Technologies, Inc. Biometric keyless entry system
US20060170530A1 (en) * 2005-02-02 2006-08-03 Enenia Biometrics, Inc. Fingerprint-based authentication using radio frequency identification
US20060219776A1 (en) * 2003-11-17 2006-10-05 Dpd Patent Trust Rfid reader with multiple interfaces
US20060244588A1 (en) * 2005-03-18 2006-11-02 Hannah Stephen E Two-way communication system for tracking locations and statuses of wheeled vehicles
US7228213B2 (en) * 2003-05-08 2007-06-05 Fujitsu Ten Limited Vehicle environment control device
US20070247279A1 (en) * 2006-03-29 2007-10-25 Vladimir Safonov Method of unauthorized access prevention to a restricted object and a biometric security identification system
US7301442B2 (en) * 2004-09-07 2007-11-27 General Motors Corporation Multi-functional fob
US7408480B2 (en) * 2005-04-22 2008-08-05 Mark Iv Industries Corp. Dual mode electronic toll collection transponder
US20080224836A1 (en) * 2007-03-15 2008-09-18 Carl Anthony Pickering Security system for a motor vehicle
US7826645B1 (en) * 2006-02-22 2010-11-02 Cayen Joseph D Wireless fingerprint attendance system

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6792084B1 (en) * 1997-09-08 2004-09-14 Mci, Inc. Single telephone number access to multiple communications services
US6078265A (en) * 1998-02-11 2000-06-20 Nettel Technologies, Inc. Fingerprint identification security system
US6609656B1 (en) * 1998-03-27 2003-08-26 Micron Technology, Inc. Method and system for identifying lost or stolen devices
US6542515B1 (en) * 1999-05-19 2003-04-01 Sun Microsystems, Inc. Profile service
US7219123B1 (en) * 1999-10-08 2007-05-15 At Road, Inc. Portable browser device with adaptive personalization capability
US6473751B1 (en) * 1999-12-10 2002-10-29 Koninklijke Philips Electronics N.V. Method and apparatus for defining search queries and user profiles and viewing search results
US7376740B1 (en) * 2000-06-13 2008-05-20 Microsoft Corporation Phone application state management mechanism
US6600418B2 (en) * 2000-12-12 2003-07-29 3M Innovative Properties Company Object tracking and management system and method using radio-frequency identification tags
US7805310B2 (en) * 2001-02-26 2010-09-28 Rohwer Elizabeth A Apparatus and methods for implementing voice enabling applications in a converged voice and data network environment
US6961000B2 (en) * 2001-07-05 2005-11-01 Amerasia International Technology, Inc. Smart tag data encoding method
US7360689B2 (en) * 2001-07-10 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a FOB
US7495544B2 (en) * 2003-02-03 2009-02-24 Ingrid, Inc. Component diversity in a RFID security network
JP4207717B2 (en) * 2003-08-26 2009-01-14 株式会社日立製作所 Personal authentication device
US7471199B2 (en) * 2004-01-09 2008-12-30 Intermec Ip Corp. Mobile key using read/write RFID tag
US7545784B2 (en) * 2004-02-11 2009-06-09 Yahoo! Inc. System and method for wireless communication between previously known and unknown users
WO2005083988A1 (en) * 2004-02-23 2005-09-09 Dyna Llc Systems and methods for enhancing the provisioning and functionality of wireless instruments
US7493082B2 (en) * 2004-05-12 2009-02-17 Nokia Corporation Methods, apparatus and computer program instructions for enhancing service discovery at a mobile terminal
US7081028B1 (en) * 2004-06-04 2006-07-25 Brunswick Corporation Portable control device used as a security and safety component of a marine propulsion system
US7573373B2 (en) * 2004-08-25 2009-08-11 Hap Nguyen Anti-carjacking apparatus, systems, and methods for hi-speed pursuit avoidance and occupant safety
US7747797B2 (en) * 2004-09-28 2010-06-29 Microsoft Corporation Mass storage device with near field communications
US8019692B2 (en) * 2004-10-19 2011-09-13 Yahoo! Inc. System and method for location based social networking
US7870202B2 (en) * 2004-12-03 2011-01-11 Clairmail Inc. Apparatus for executing an application function using a smart card and methods therefor
US7356394B2 (en) * 2005-01-11 2008-04-08 Electronic Data Systems Corporation RFID vehicle management system and method
US7489946B2 (en) * 2005-04-14 2009-02-10 Sudharshan Srinivasan Cellular phone in form factor of a conventional audio cassette
US20070008130A1 (en) * 2005-06-21 2007-01-11 Nortel Networks Limited Telecommunications device using RFID data for device function execution
KR100657327B1 (en) * 2005-07-25 2006-12-14 삼성전자주식회사 Common using printer managing system using rfid and method for the same
CA2531552C (en) * 2005-08-08 2013-02-26 Bce Inc Method, system and apparatus for controlling a voice recorder
US7702087B2 (en) * 2005-09-02 2010-04-20 Cisco Technology, Inc Method and apparatus for activating and managing VoIP phone with RFID
US7624417B2 (en) * 2006-01-27 2009-11-24 Robin Dua Method and system for accessing media content via the internet
AU2007215469A1 (en) * 2006-02-13 2007-08-23 All Protect Llc Method and system for controlling a vehicle given to a third party
US20080106390A1 (en) * 2006-04-05 2008-05-08 White Steven C Vehicle power inhibiter
US8015245B2 (en) * 2006-04-24 2011-09-06 Microsoft Corporation Personalized information communications
US8090944B2 (en) * 2006-07-05 2012-01-03 Rockstar Bidco Lp Method and apparatus for authenticating users of an emergency communication network
US7342503B1 (en) * 2007-08-24 2008-03-11 Light Elliott D System and method for providing visual and physiological cues in a matching system

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6041410A (en) * 1997-12-22 2000-03-21 Trw Inc. Personal identification fob
US20030098774A1 (en) * 2000-03-21 2003-05-29 Chornenky Todd E. Security apparatus
US6356838B1 (en) * 2000-07-25 2002-03-12 Sunil Paul System and method for determining an efficient transportation route
US6819219B1 (en) * 2000-10-13 2004-11-16 International Business Machines Corporation Method for biometric-based authentication in wireless communication for access control
US20020107010A1 (en) * 2000-12-22 2002-08-08 Witte Markus Valter Communication system for use with a vehicle
US6917801B2 (en) * 2000-12-22 2005-07-12 Ford Global Technologies, Llc Communication system for use with a vehicle
US6505780B1 (en) * 2001-12-05 2003-01-14 Koninklijke Philips Electronics N.V. Personalize vehicle settings using RF tags
US20030222758A1 (en) * 2002-01-24 2003-12-04 Robin Willats Vehicle access control and start system
US20030223624A1 (en) * 2002-05-30 2003-12-04 Laurence Hamid Method and apparatus for hashing data
US7274804B2 (en) * 2002-05-30 2007-09-25 Activcard Ireland Limited Method and apparatus for hashing data
US20040093155A1 (en) * 2002-11-12 2004-05-13 Simonds Craig John System and method for providing vehicle context information
US20040098179A1 (en) * 2002-11-14 2004-05-20 Sokoloski Darren Scott Vehicle security device
US20040220798A1 (en) * 2003-05-01 2004-11-04 Visteon Global Technologies, Inc. Remote voice identification system
US7228213B2 (en) * 2003-05-08 2007-06-05 Fujitsu Ten Limited Vehicle environment control device
US6992562B2 (en) * 2003-06-10 2006-01-31 Visteon Global Technologies, Inc. Biometric keyless entry system
US20040252013A1 (en) * 2003-06-10 2004-12-16 Visteon Global Technologies, Inc. Biometric keyless entry system
US20060219776A1 (en) * 2003-11-17 2006-10-05 Dpd Patent Trust Rfid reader with multiple interfaces
US7301442B2 (en) * 2004-09-07 2007-11-27 General Motors Corporation Multi-functional fob
US20060170530A1 (en) * 2005-02-02 2006-08-03 Enenia Biometrics, Inc. Fingerprint-based authentication using radio frequency identification
US20060244588A1 (en) * 2005-03-18 2006-11-02 Hannah Stephen E Two-way communication system for tracking locations and statuses of wheeled vehicles
US7408480B2 (en) * 2005-04-22 2008-08-05 Mark Iv Industries Corp. Dual mode electronic toll collection transponder
US7826645B1 (en) * 2006-02-22 2010-11-02 Cayen Joseph D Wireless fingerprint attendance system
US20070247279A1 (en) * 2006-03-29 2007-10-25 Vladimir Safonov Method of unauthorized access prevention to a restricted object and a biometric security identification system
US20080224836A1 (en) * 2007-03-15 2008-09-18 Carl Anthony Pickering Security system for a motor vehicle

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10291624B1 (en) 2015-12-30 2019-05-14 Synaptics Incorporated Trusted system for a user profile

Also Published As

Publication number Publication date
US20080100414A1 (en) 2008-05-01
US8395478B2 (en) 2013-03-12

Similar Documents

Publication Publication Date Title
US8395478B2 (en) Secure profile setting in a shared device
US8595804B2 (en) System and method for device security with a plurality of authentication modes
US8646056B2 (en) User-friendly multifactor mobile authentication
US9275212B2 (en) Secure element biometric authentication system
US9059991B2 (en) System and method for unlocking a device
US20090193151A1 (en) Optimized Biometric Authentication Method and System
US20050066179A1 (en) Method and apparatus for authenticating a user at an access terminal
US20060075486A1 (en) Self-contained token device for installing and running a variety of applications
US20100088749A1 (en) System and method for personal authentication using anonymous devices
EP1564619A1 (en) Biometric access control using a mobile telephone terminal
CN105894616A (en) Access Management System And Method
KR101937136B1 (en) System and method for authenticating identity using multi-biometrics
CN105656871A (en) Secure communication method and device
US20180349586A1 (en) Biometric authentication
US11388007B2 (en) Mobile device, verification terminal device and identity verification method
US20180249312A1 (en) Mobile Device as a Form of Identification via Bluetooth
CN107371160B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
KR20190052405A (en) Computer security system and method using authentication function in smart phone
KR20190035226A (en) Certification processing system without user identity module and method thereof
KR101703942B1 (en) Financial security system and method using speaker verification
KR20080040859A (en) User authentication system using human body communication
CA2712525C (en) Optimized biometric authentication method and system
US20070232356A1 (en) Plagiarization-proof function for a SIM card
KR20020042004A (en) method and apparatus for authentication with iris recognition
JP2002176492A (en) Terminal user authentication system by mobile phone, method and recording medium for recording user authentication program

Legal Events

Date Code Title Description
AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DIAB, WAEL W.;ISSA, MOHAMMAD;SIGNING DATES FROM 20061020 TO 20061027;REEL/FRAME:029812/0047

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

AS Assignment

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:041712/0001

Effective date: 20170119