US20140237229A1 - Bluetooth device as security access key - Google Patents

Bluetooth device as security access key Download PDF

Info

Publication number
US20140237229A1
US20140237229A1 US14/263,914 US201414263914A US2014237229A1 US 20140237229 A1 US20140237229 A1 US 20140237229A1 US 201414263914 A US201414263914 A US 201414263914A US 2014237229 A1 US2014237229 A1 US 2014237229A1
Authority
US
United States
Prior art keywords
host device
key
electronic key
host
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/263,914
Inventor
Michael Rosenblatt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apple Inc
Original Assignee
Apple Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apple Inc filed Critical Apple Inc
Priority to US14/263,914 priority Critical patent/US20140237229A1/en
Publication of US20140237229A1 publication Critical patent/US20140237229A1/en
Priority to US15/652,099 priority patent/US10362484B2/en
Priority to US16/516,107 priority patent/US10943001B2/en
Priority to US17/182,132 priority patent/US20210248222A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • This invention is directed to a key that uses a short range communications protocol to direct a host S device to perform an operation.
  • a remote controller that directs the device to perform operations based on the user's inputs on the remote controller.
  • the user input is provided directly on the device or remotely, the user must nevertheless press a key, or perform some other action for the device to perform an operation. The operation is not performed in response to the user approaching the device.
  • a system that includes a key for remotely causing a host device to perform an operation is provided.
  • the key may be configured to cause a host device to automatically log in a user associated with the key, or load the user's profile.
  • a key that includes communications circuitry may be provided.
  • the key may be configured to create a relatively short-range personal area network.
  • the key may use any suitable communications protocol to create the personal area network including, for example, Wi-Fi communications (e.g., one of the 802.11 standards), Bluetooth, Nordic, high frequency systems (e.g., 900 MHz, 2.4 GHz, and 5.6 GHz communication systems), short-range radio circuitry (e.g., walkie-talkie type circuitry), infrared, and other relatively localized wireless communication protocols.
  • the key may be incorporated or integrated in any suitable device.
  • the key may be a key fob, a card (e.g., a credit card shaped device), a portable drive (e.g., a flash drive), a widget (e.g., a coin-sized object), or any other suitable device or object that may be unobtrusively carried in or clipped to a user's pocket, bag, or other possession.
  • the key may be inserted inside a user (e.g., surgically inserted under a user's skin).
  • the key or its functionality may be incorporated in an electronic device, for example in a cellular telephone, a mobile communications device, a pocket-sized personal computer (e.g., an iPAQ or a Palm Pilot) a personal media device (e.g., an iPod), a camera, a video recorder, a computer (e.g., a laptop computer), a key (e.g., car keys), a remote controller, or any other suitable electronic device.
  • a cellular telephone e.g., a mobile communications device, a pocket-sized personal computer (e.g., an iPAQ or a Palm Pilot) a personal media device (e.g., an iPod), a camera, a video recorder, a computer (e.g., a laptop computer), a key (e.g., car keys), a remote controller, or any other suitable electronic device.
  • a cellular telephone e.g., a mobile communications device
  • a pocket-sized personal computer e.g., an
  • a host device that includes a transceiver and an actuator may be provided.
  • the transceiver may be configured to communicate with the communications circuitry of the key when the host device is within the personal area network created by the key.
  • the actuator may be any suitable component operative to move the host device from a first position or state to a second position or state.
  • the actuator may include a motor, a switch (e.g., for turning a device or a function on or off, a processor (e.g., for performing an operation in response to instructions from software in an electronic device), or any other suitable actuator.
  • the host device may be any suitable device in which an operation may be performed when a key is brought in proximity of the host device.
  • the host device may include a computer, a cellular telephone, a mobile communications device, a personal media device, a set-top box, a television system, or any other suitable electronic device.
  • the operation may include for example, authenticating a user to the system (e.g., logging in the user), loading a user's settings (e.g., a user's preference profile), dialing a telephone number, opening a program (e.g., opening a user's e-mail software), activating a peripheral, activating a system coupled to the device (e.g., starting an automobile's engine), or any other suitable operation.
  • the host device may include an automobile or other vehicle, a door or window, a gate or turnstile, a garage door, or any other device or system for which a key or pass is required.
  • the host device may include a light or light switch, curtains or shades, an elevator, a conveyer belt, a motorized device, or any other device that can be moved from a first position or state to a second position or state.
  • the communications circuitry of the key and the transceiver of the host device may communicate data.
  • the key may broadcast identification information to the host devices in the personal area network (e.g., broadcast a unique identifier). In response to receiving the broadcast, the host device may transmit identification information to the key.
  • the key may transmit an instruction to the host device to perform an operation. For example, the key may direct the host device to automatically log in a user (e.g., the user associated with the key).
  • the user may specify the instruction sent to the host device by the key (e.g., using a user interface on the key or a base coupled to the key).
  • the host device may retrieve from memory an operation associated with the identified key. The host device may then perform the retrieved operation (e.g., after authenticating the key). In some embodiments, a user may set-up a host device to perform a particular operation when the host device is within the personal area network of the key using the user interface of the device.
  • the host device may be configured to perform the specified operation so long as the host device is within the personal area network created by the key.
  • the host device may periodically request a transmission from the key to determine whether the key is still sufficiently proximate to the device, or the key may periodically send transmissions to notify devices of its presence.
  • the host device may cease to perform the operation.
  • the host device may return to its prior state (e.g., log the user off of the host device).
  • FIG. 1 is a simplified block diagram of a network system that includes a key, a host device and another device in accordance with one embodiment of the invention
  • FIG. 2 is a simplified block diagram of an illustrative key in accordance with one embodiment of the invention.
  • FIG. 3 is a simplified block diagram of a host device or other device in accordance with one embodiment of the invention.
  • FIG. 4 is a block diagram of another host device in accordance with one embodiment of the invention.
  • FIG. 5 shows specific examples of where a key may be placed to create a personal area network in accordance with one embodiment of the present invention
  • FIG. 6 shows specific examples of host devices in accordance with one embodiment of the present invention.
  • FIG. 7 shows a flowchart of an illustrative process for transmitting data with a key to a host device in accordance with one embodiment of the invention
  • FIG. 8 shows a flow chart of an illustrative process for associating a host device with a key in accordance with one embodiment of the invention
  • FIG. 9 shows a flow chart of an illustrative process for entering authentication information to be transmitted to a host device in accordance with one embodiment of the invention.
  • FIG. 10 a shows a flow chart of an illustrative process for creating a secure communications link between a key and a host device in accordance with one embodiment of the invention
  • FIG. 11 shows a flow chart of an illustrative process for performing an operation with a host device when a key is placed in proximity of the host device in accordance with one embodiment of the invention
  • FIG. 12 shows a flowchart of an illustrative process for authenticating a key and performing an operation with a host device in accordance with one embodiment of the invention
  • FIG. 13 shows a flowchart of an illustrative process for performing an operation when a host device is within the personal area network created by a key in accordance with one embodiment of the invention.
  • FIG. 14 shows a flow chart of an illustrative process for associating a key with a host device in accordance with one embodiment of the invention.
  • FIG. 1 is a simplified block diagram of a network system in accordance with one embodiment of the invention.
  • System 100 may include key 110 , host device 120 and other device 130 .
  • system 100 may include a plurality of keys 110 and host and other devices 120 and 130 . To avoid overcomplicating the drawing, only one of each is shown.
  • Key 110 may include circuitry providing communications network 112 , which may be a relatively short-range communications network. Using network 112 , key 110 may be capable of performing wireless communication with a relatively short-range wireless communication protocol such as Wi-Fi (e.g., a 802.11 protocol), Bluetooth (registered trademark), high frequency systems (e.g., 900 MHz, 2.4 GHz, and 5.6 GHz communication systems), infrared, other relatively localized wireless communication protocol, or any combination thereof. Devices located within communications protocol network 112 may wirelessly communicate over a local wireless communication path such as paths 140 and 142. As defined herein, a local wireless communication path enables wireless communication using a short-range communications protocol. When a device (e.g., host device 120 ) is not within network 112 , that device may be out of range and not able to wirelessly communicate with key 110 .
  • a device e.g., host device 120
  • that device may be out of range and not able to wirelessly communicate with key 110 .
  • the short range communications circuitry may be integrated within the packaging of key 110 (e.g., integrated into a printed circuit board of the device), or in other embodiments, may be included in an accessory device that is docked or connected to device 110 .
  • the accessory device may be, for example, a relatively unobtrusive device that provides device 110 with short-range communicating functionality.
  • key 110 may include, for example, a media player such as an iPod available by Apple Computer Inc., of Cupertino, Calif., a key fob, a cellular telephone, pocket-sized personal computers such as an iPAQ Pocket PC available by Hewlett Packard Inc., of Palo Alto, Calif., personal digital assistants (PDAs), a desktop computer, a laptop computer, and any other device capable of communicating wirelessly (with or without the aid of a wireless enabling accessory system).
  • key 110 may be incorporated in an article of clothing, a wallet, a briefcase, a bag, a shoe, or any other item that a user may typically carry or wear.
  • key 110 may be inserted inside a user's body (e.g., surgically inserted under a user's skin).
  • Host device 120 and other device 130 may include transceiver circuitry for wirelessly coupling to key 110 .
  • host device 120 or other device 130 may require the user to initially set up communications links 140 and 142 with key 110 .
  • the user may pair key 110 with host device 120 and other device 130 .
  • Host device 120 and other device 130 may be any device or system that may be moved from at least a first position or state to a second position or state.
  • host device 120 and other device 130 may be any device or system with which a user may access personalized settings or information.
  • host device 120 or other device 130 may include a computer, a workstation, a cellular telephone, a mobile communications device, a personal media device, a set-top box, a television system, or any other suitable electronic device.
  • host device 120 and other device 130 may be any device or system that can be moved to at least two different positions or states (e.g., on/off or open/closed).
  • host device 120 or other device 130 may include a light or light switch, curtains or shades, an elevator, a conveyer belt, a motorized device, or any other device or system that may be moved from at least a first to a second position or state.
  • host device 120 or other device 130 may include an automobile or other vehicle, a door or window (e.g. with a lock), a gate or turnstile, a garage door, or 10 any other device or system for which a key or pass is required.
  • FIG. 2 is a simplified block diagram of an illustrative key in accordance with one embodiment of the invention.
  • Key 200 may include communications circuitry 202 and memory 204 .
  • Communications circuitry 202 or sometimes referred to herein as personal area network circuitry or short-range communications circuitry, may enable key 200 to function as a host for a personal area network. That is, communications circuitry 202 may enable key 200 to wirelessly communicate with one or more devices using a short range communications protocol.
  • communications circuitry 202 may support Wi-Fi communications (e.g., one of the 802.11 standards), Bluetooth, Nordic, high frequency systems (e.g., 900 MHz, 2.4 GHz, and 5.6 GHz communication systems), short-range radio circuitry (e.g., walkie-talkie type circuitry), infrared, and other relatively localized wireless communication protocols.
  • Wi-Fi communications e.g., one of the 802.11 standards
  • Bluetooth e.g., one of the 802.11 standards
  • Nordic high frequency systems
  • high frequency systems e.g., 900 MHz, 2.4 GHz, and 5.6 GHz communication systems
  • short-range radio circuitry e.g., walkie-talkie type circuitry
  • infrared e.g., infrared, and other relatively localized wireless communication protocols.
  • communications circuitry 202 may be configured to create a network for transferring data to and from other devices.
  • the data transferred from key 200 may include, for example, authentication information, identification information, a command or instruction to perform an operation with a host device, an identifier for a user profile or for user preferences, files or other data, or any combination thereof.
  • Communications circuitry 202 may be configured to provide host device-specific data, for example in response to identifying the host device to which key 200 communicates or is “paired” in the network.
  • Memory 204 may include one or more different types of memory which may be used for performing device functions.
  • memory 204 may include cache, Flash, ROM, and/or RAM.
  • Memory may be specifically dedicated to storing firmware
  • Memory 204 may be provided for storing firmware for device applications (e.g., operating system, user interface functions, and processor functions).
  • Memory 204 may store data for pairing itself or communicating with one or more devices (e.g., a host device) using a communications protocol supported by communications circuitry 202 .
  • memory 204 may be configured to store data transmitted by communications circuitry 202 (e.g., authentication information, identification information, an instruction to perform an operation with a host device, an identifier for a user profile or for user preferences, or user profile or user preference data) to a host device to which key 200 is paired.
  • key 200 may be operative to transmit the user profile or user preference information to a host device when the host device is within the network of the key.
  • memory 204 may instead or in addition store files or other data used by the user (e.g., files stored on the user's desktop, or recent files accessed by the user), and transfer the files or other data when a host device is within the network of the key.
  • files or other data used by the user e.g., files stored on the user's desktop, or recent files accessed by the user
  • each user may access a host device with their preferences without requiring the host device to connect to a server to identify and load the proper preferences. This may allow a user to access personal information using a host device even when the host device is not connected to a server (e.g., when the host device is offline, for example a laptop computer in an airplane or in a tunnel).
  • memory 204 may store a communications protocol for pairing key 200 with host devices.
  • Memory 204 may host a database of the host devices to which key 200 was paired, for example, using a serial number or other identifier for the host device.
  • Memory 204 may store instructions that key 200 can transmit to cause each host device to perform one or more operations. For example, if the host device is a computer, memory 204 may store authentication information for key 200 to automatically log the user into the computer. As another example, if the host device is an elevator, memory 204 may store an instruction to call an elevator to go to a particular floor.
  • memory 204 may store an instruction to unlock the vehicle and to start the vehicle's engine, radio, navigation system, other vehicle function, or any combination thereof.
  • memory 204 may store an instruction to turn the light on, or open or unlock the door.
  • the host device may provide the information to key 200 for storing in memory 204 .
  • the host device may automatically provide the information when the host device and key 200 are paired.
  • the user of the host device may direct the host device to provide particular information to key 200 .
  • This approach may be used, for example, to allow the user to select the operation or operations that key 200 will direct a particular host device to perform (e.g., the key may cause an automobile to turn on the media system, activate the navigation system, or turn on the engine).
  • the user may set up key 200 to perform particular operations.
  • key 200 may include a display and user interface allowing the user to set up the operation of the key.
  • key 200 may be coupled to a base or docking station through which the user may set up key 200 .
  • the base may be a standalone device having a display and a user interface, a host device with a display and a user interface, or any other suitable device by which a user may set up key 200 .
  • the user may wirelessly set up one or more keys using the base.
  • key 200 may also include a power supply, a user interface and a display. Key 200 may also include a processor distinct from communications circuitry 202 . The processor can control the operation of some or all of the functions and components included in key 200 . For example, the processor may drive the display and process inputs received from the user interface. In some embodiments, key 200 may include some form of a limited interface such as, for example, an ON/OFF switch. In some embodiments, key 200 may include an interface that the user must select to transmit data from key 200 (e.g., a transmit or broadcast switch).
  • the user interface may allow a user to interact with key 200 .
  • the user input device can take a variety of forms, such as a button, keypad, dial, a click wheel, or a touch screen.
  • the user interface may include a multi-touch screen such as that described in U.S. Pat. No. 6,323,846, which is incorporated by reference herein in its entirety.
  • the user interface may emulate a rotary phone or a multi-button keypad, which may be implemented on a touch screen or the combination of a click wheel or other user input device and a screen.
  • a more detailed discussion of such a rotary phone interface may be found, for example, in U.S. patent application Ser. No. 11/591,752, filed Nov. 1, 2006, entitled “Touch Pad with Symbols based on Mode,” which is incorporated by reference herein in its entirety.
  • Key 200 may be any suitable device that includes at least communications circuitry 202 and memory 204 . Because key 200 may require so few elements, and these elements may be very small in size, key 200 may be a very small device.
  • key 200 may include, or be integrated in, a key fob, a card (e.g., a credit card shaped device), a portable drive (e.g., a flash drive), a widget (e.g., a coin-sized object), or any other suitable device or object that may be unobtrusively carried in a user's pocket, purse or bag.
  • key 200 may include a clip or other connecting mechanism for attaching key 200 to an object that the user typically carries.
  • key 200 may be clipped or attached to a user's wallet, cellular telephone, personal media device (e.g., an iPod), wired headset, wireless headset, watch, bag, belt, article of clothing, or any other suitable object.
  • key 200 may be inserted inside a user (e.g., surgically inserted under a user's skin).
  • key 200 or its functionality may be incorporated in an electronic device.
  • key 200 may be incorporated in a cellular telephone, a mobile communications device, a pocket-sized personal computer (e.g., an iPAQ or a Palm Pilot) a personal media device (e.g., an iPod), a camera, a video recorder, a computer (e.g., a laptop computer), a key (e.g., car keys), a remote controller, or any other suitable electronic or personal device.
  • Key 200 , or the device in which key 200 or its functionality is incorporated may be sized to fit relatively easily into a pocket or hand of the user, and may be taken practically anywhere the user travels
  • FIG. 3 is a simplified block diagram of a host device or other device in accordance with one embodiment of the invention.
  • Host device 300 may include processor 302 , storage device 304 , memory 306 , transceiver 308 , power supply 310 and bus 312 .
  • Processor 302 can control the operation of the functions and components of device 300 .
  • Storage device 304 may include one or more storage mediums, including for example, a hard-drive, flash memory, permanent memory such as ROM, semi-permanent memory such as RAM, or cache.
  • Storage device 304 may store media (e.g., music and video files), software (e.g., for implementing functions on device 300 ), preference information (e.g., media playback preferences), lifestyle information (e.g., food preferences), exercise information (e.g., information obtained by exercise monitoring equipment), transaction information (e.g., information such as credit card information), wireless connection information (e.g., information that may enable device 300 to establish a wireless connection), subscription information (e.g., information that keeps tracks of podcasts or television shows or other media a user subscribes to), contacts information (e.g., telephone numbers and email address), calendar information, and any other suitable data.
  • media e.g., music and video files
  • software e.g., for implementing functions on device 300
  • preference information e.g., media playback preferences
  • storage device 304 may store authentication information for a user to enter prior to accessing the functionality of the device. For example, storage device 304 may store username and password combinations, or algorithms and keys for authenticating a string entered by the user (e.g., using a RSA algorithm). Storage device 304 may store data for pairing itself or communicating with one or more devices (e.g., key 200 , FIG. 2 ) using a short-range communications protocol.
  • authentication information for a user to enter prior to accessing the functionality of the device.
  • storage device 304 may store username and password combinations, or algorithms and keys for authenticating a string entered by the user (e.g., using a RSA algorithm).
  • Storage device 304 may store data for pairing itself or communicating with one or more devices (e.g., key 200 , FIG. 2 ) using a short-range communications protocol.
  • Memory 306 may include one or more different types of memory which may be used for performing device functions.
  • memory 306 may include cache, Flash, ROM, and/or RAM.
  • Memory may be specifically dedicated to storing firmware.
  • memory 306 may be provided for storing firmware for device applications (e.g., operating system, user interface functions, and processor functions).
  • Transceiver 308 may enable device 300 to wirelessly communicate with one or more keys (e.g., key 200 . FIG. 2 ) using a short range communications protocol.
  • transceiver 308 may support Wi-Fi communications (e.g., one of the 802.11 standards), Bluetooth, Nordic, high frequency systems (e.g., 900 MHz, 2.4 GHz, and 5.6 GHz communication systems), infrared, short-range radio circuitry (e.g., walkie-talkie type circuitry), and other relatively short-range wireless communication protocols.
  • Bus 312 may provide a data transfer path for transferring data to, from, or between processor 302 , storage device 304 , memory 306 and transceiver 308 .
  • a coder/decoder may be included to convert digital audio signals into an analog signal, which may be provided to an output port (not shown).
  • Power supply 310 may provide power to the components of device 300 .
  • power supply 310 may be coupled to a power grid (e.g., a personal computer).
  • power supply 310 may include one or more batteries for providing power in a portable device.
  • power supply 310 may be configured to generate power in a portable device from a natural source (e.g., solar power using solar cells).
  • device 300 may include a 15 display and a user interface.
  • the display and user interface may include some or all of the features discussed above in connection with the display and user interface of key 200 .
  • device 300 may be an electronic device in which a user may provide identifier information to receive authorization to access the device, or to access or load the user's personal information.
  • Device 300 may include, for example, a computer, a cellular telephone, a mobile communications device, a personal media device, a set-top box, a television system, or any other suitable electronic device.
  • FIG. 4 is a simplified block diagram of another host device in accordance with one embodiment of the invention.
  • Host device 400 includes transceiver 402 and actuator 404 .
  • Transceiver 402 may enable device 400 to wirelessly communicate with one or more keys (e.g., key 200 , FIG. 2 ) using a short range communications protocol.
  • Transceiver 402 may include one or more of the features described above in connection with transceiver 308 ( FIG. 3 ).
  • Actuator 404 may be any suitable component operative to move device 400 from a first position or state to a second position or state.
  • actuator 404 may include a motor that is configured to move an element within device 400 .
  • actuator 404 may include a motor that is configured to move device 400 .
  • actuator 404 may include a switch, for example for turning a device or a function on or off (e.g., a light switch, a door lock, or an air conditioner or heater).
  • actuator 404 may be processor for performing operations in response to instructions from firmware or software.
  • actuator 404 may be a processor that performs a particular function or operation under the control of a software program.
  • the function or operation may include, for example, authenticating a user to the system (e.g., logging in the user), loading a user's settings (e.g., a user's preference profile), dialing a telephone number, opening a program (e.g., opening a user's e-mail software), activating a peripheral, activating a system coupled to the device (e.g., starting an automobile's engine), or any other suitable operation.
  • authenticating a user to the system e.g., logging in the user
  • loading a user's settings e.g., a user's preference profile
  • dialing a telephone number e.g., a user's preference profile
  • opening a program e.g., opening a user's e-mail software
  • activating a peripheral e.g., starting an automobile's engine
  • a key may be in communication with a host device when the host device is within communications network 112 ( FIG. 1 ). Specific examples of where a key may be placed to create a personal area network are shown in FIG. 5 .
  • FIG. 5 shows person 510 , key fob 520 , clip 530 , mobile telephone 540 , and personal media device 550 , each of which may harbor a key that creates personal area networks 512 , 522 , 532 , 542 and 552 , respectively.
  • the host device may perform an operation.
  • host device 560 is a computer into which the user associated with the key may be automatically logged in when host device 560 is within the personal area network of the key.
  • host device 560 may log out the user or lock the computer when host device 560 is no longer within the personal area network of the key.
  • a personal area network may exist about person 510 .
  • the person may keep the key his or her pocket(s), or alternatively, the key may be kept substantially near the person such as an accessory item (e.g., handbag, backpack, or purse).
  • the key may be integrated with clothing or an accessory item, providing functional fashion having device operation capabilities.
  • the key may be embedded under a user's skin (e.g., surgically implanted).
  • integration of a key refers to placing the key within or attached to an item, or incorporating the key into the item such that it appears to be part of the item.
  • a key may be integrated in any of key fob 520 , object with clip 530 (e.g., a clip configured to be attached to an article of clothing or accessory), mobile telephone 540 , and personal media device 550 using any suitable approach.
  • the host device or other devices may be configured to perform any suitable operation when the key is placed in proximity of the host device such that the personal area network of the key encloses the host device.
  • a host device may perform any suitable operation in response to receiving a signal from the key. Specific examples of host devices and the operations performed in response to entering the network created by are shown in FIG. 6 .
  • FIG. 6 shows computer 610 , laptop 612 , television system 620 , multimedia system 630 , automobile 640 , door 650 , lamp 660 , heating and/or air conditioning system 670 , elevator 680 , and motor 690 .
  • the devices and systems of FIG. 6 may be configured to perform various operations when a key is placed in proximity of the device or system such that the device or system is within the network created by the key.
  • computer 610 and laptop 612 may be configured to automatically log the user associated with the key into the computer system.
  • computer 610 and laptop 612 may automatically load a user's profile or preferences when the key is brought in proximity of the system.
  • the key alone may be sufficient to perform the operation with computer 610 or laptop 612 .
  • the user may be required to enter private information in addition to having the key present to perform an operation (e.g., a password for a more secure login to the computer)
  • the user may provide login data to the key for transmission to computer 110 or 112 .
  • Television system 620 may be configured to automatically load a user's profile or preferences when a key associated with the user is brought in proximity of system 620 .
  • system 620 may be configured to automatically log in the user associated with the key (e.g., to automatically load the user's pin for ordering PPV programs and on-demand content, and setting-up recordings).
  • media system 630 may be configured to automatically load the user profile or preferences of the user associated with the key, or login the user associated with the key (e.g., load the user's music preferences or load the user's playlists).
  • Automobile 640 may be configured to perform any of a number of operations when a key is brought in proximity of the automobile. For example, automobile 640 may unlock one or more of its doors when the key is brought in proximity of the automobile. As another example, automobile 640 may automatically start its engine. As still another example, automobile 640 may automatically turn on the heating or air conditioning system of the automobile. As another example, automobile 640 may automatically activate a navigation system (e.g., a GPS system) or a media system. In some embodiments (e.g., if the key has a user interface), the user may select with the key one or more particular operations for automobile 640 to perform, and direct the key to transmit the user's selections to the automobile.
  • a navigation system e.g., a GPS system
  • media system e.g., if the key has a user interface
  • Door 650 may be any suitable door or gate for preventing ingress and egress.
  • door 650 may be the door to a home, office, or other building.
  • door 650 may be a garage door or other door or gate for preventing vehicles from passing.
  • door 650 may be a gate or a turnstile (e.g., for accessing public transportation, a stadium, or an office building).
  • the door may be configured to unlock or lock automatically.
  • a door may unlock when a key is brought in proximity of the door, and lock as soon as the door is no longer within the network created by the key.
  • the door may switch from locked to unlocked and back each time the door enters the network created by the key.
  • door 650 may automatically open or close when a key is brought in proximity to door 650 (e.g., automatically open a door for a handicapped person in the presence of the key).
  • the user may enter an input on the key or door, in addition to bringing the key in proximity of door 650 .
  • Lamp 660 may be any suitable light source for a user.
  • lamp 660 may be a floor, wall, or ceiling lamp.
  • lamp 660 may be curtains or shades that may be opened to allow light to pass.
  • Lamp 660 may be configured to be turned on or off when a key is brought in proximity of the lamp. For example, as long as lamp 660 is within the network created by the key, lamp 660 may be turned on.
  • lamp 660 may be configured to be turned on a particular level (e.g., dim lights) when the key is brought in proximity of lamp 660 .
  • the user may select with the key whether to turn lamp 660 on or off, or select the intensity for the lamp, and direct the key to transmit the selection to lamp 660 .
  • Heating and/or air conditioning system 670 may be any suitable system for heating or cooling air, for example in a building or vehicle. Heating and/or air conditioning system 670 may be configured to discharge air at a particular temperature when the key is brought in proximity of heating and/or air conditioning system 670 .
  • the key may direct heating and/or air conditioning system 670 to bring the temperature to a specific temperature (e.g., the key may transmit data that specifies a temperature).
  • the user may select with the key a temperature, fan speed, or other setting, and direct the key to transmit the selection to system 670 .
  • Elevator 680 may be any suitable elevator.
  • the elevator When a key is brought in proximity of elevator 680 , for example on a floor that is served by elevator 680 , the elevator may automatically be called to the floor of the key.
  • the key may transmit floor request information for the elevator to automatically select the floor to which the elevator will move.
  • the key may transmit data for two floors, the exit floor and the destination floor (e.g., an office floor or an apartment floor).
  • the elevator may first determine the floor from which the key transmitted. If the floor is one of the ground floor and the destination floor, the elevator may automatically select the other floor.
  • the elevator may select both and prompt the user to confirm the selection of one or the other, or the elevator may not select any floor.
  • the user may select a floor with the key, and direct the key to transmit the selection to the elevator.
  • Motor 690 may be any suitable motor, engine or actuator that is present in any device or system.
  • motor 690 may be part of a vehicle, a security system, or any other suitable device or system.
  • motor 690 may be configured to turn on or off, rotate or actuate at a specific speed in a specific direction, or accelerate or decelerate at a specific rate.
  • the user may select with the key a particular action for motor 690 to perform, and direct the key to transmit the selected action to motor 690 .
  • a plurality of keys may create personal area networks in which a host device is present.
  • a classroom may include many students, each with their own laptop computers, and each with their own key. Each student's key may create a personal area network that includes all of the laptop computers present in the classroom.
  • Each laptop, and more generally speaking each host device may determine which key to communicate with in any suitable manner.
  • the host device may identify the key that transmits a signal exceeding a threshold signal strength, and communicate with the identified key.
  • the host device may identify the key that transmits a signal with the highest signal strength (e.g., the closest key to the host device).
  • the measure of signal strength may be absolute (e.g., the key with the highest actual data transfer rate), or may be relative to each key's capabilities (e.g., the key with the highest ratio of actual data transfer rate to maximum data transfer rate).
  • the host device may prompt the user to select a particular key (e.g., provide a selectable list of available keys in a pop-up menu).
  • the host device may automatically select the key that has previously communicated with the host device (e.g., the laptop computer communicates in class with the same key that the laptop computer communicates with in the user's dorm room).
  • a host device may be configured to perform an operation when it is within the personal area network created by a key using a number of different approaches.
  • the key may transmit instructions to perform one or more specific operations to the host device. For example, once the key has been paired with the host device (e.g., authenticated to the host device), the key may direct the host device to perform an operation.
  • the host device instead may itself identify the operation to perform when it is within the personal area network of a key. For example, the host device may identify the key, and retrieve from memory one or more operations that are associated with the identified key. Both of these approaches will be discussed in more detail in the following flow charts. In addition, the following flow charts refer to a number of processes that can be performed by keys and host devices in accordance with some embodiments of the invention.
  • FIG. 7 shows a flowchart of an illustrative process for transmitting data with a key to a host device in accordance with one embodiment of the invention.
  • Process 700 begins at step 702 .
  • the key broadcasts data, for example to notify other devices of the personal area network created by the key.
  • communications circuitry 202 of key 200 may transmit or broadcast identification information in the personal area network created by communications circuitry 202 .
  • the key may perform only this step. For example, this approach may be used in embodiments where the host device retrieves from memory, based on the identification information, the operation to perform. In such an embodiment, process 700 would then terminate. In some embodiments, however, the key may perform additional steps. These steps will be described below as part of process 700 . It will be understood, however, that in some embodiments, process 700 may terminate after step 704 .
  • the key determines whether a host device is present within the personal area network. For example, communications circuitry 202 may determine whether any transmissions are received from a host device. If the key determines that no host device is present within the personal area network, process 700 returns to step 704 and continues to broadcast data.
  • process 700 may move to step 708 .
  • process 700 may also move to step 704 , and continue to broadcast data for other host devices within the personal area network.
  • the key determines whether the host device that responded at step 706 is known. For example, the key may determine whether identifier information provided by the host device matches identifier information stored in memory 204 ( FIG. 2 ). If the key determines that the host device is unknown, process 700 moves to step 709 , which calls process 800 ( FIG. 8 ), discussed in more detail below.
  • process 700 moves to step 710 .
  • the key identifies the host device that responded. For example, communications circuitry 202 may compare identification information provided by the host device with the identification information of known host devices stored in memory 204 .
  • the key identifies the data to transmit to the identified host device.
  • communications circuitry 202 may retrieve from memory 202 the data for transmission that is associated with the identified host device (e.g., data stored in a database field with the host device identifier).
  • the identified data may include authentication information (e.g., login information), instructions to perform an operation (e.g., instructions to start an engine), parameters for performing an operation (e.g., an elevator floor), a user's working documents (e.g., files), or any other suitable data.
  • the key transmits the data identified at step 712 .
  • communications circuitry 202 may transmit the identified data to the host device using any suitable communications protocol.
  • the data transmission may be encrypted.
  • the key determines whether the host device confirmed receipt of the transmitted data.
  • communications circuitry 202 may request a checksum or other data from host device confirming that the host device in fact received the transmitted data. If the key determines that the host device did not confirm receipt of the transmitted data, process 700 moves back to step 714 and transmits the identified data again.
  • process 700 moves to step 718 .
  • the key ceases to transmit the identified data.
  • communications circuitry 202 may halt transmissions of authentication information.
  • the key may re-transmit the identified data at different intervals (e.g., if the host device requests a new transmission of authentication data).
  • Process 700 then returns to step 704 , where communications circuitry 202 broadcasts data identifying the key in the personal area network.
  • FIG. 8 shows a flow chart of an illustrative process for associating a host device with a key in accordance with one embodiment of the invention.
  • Process 800 begins at step 802 .
  • step 802 may correspond to step 709 of process 700 ( FIG. 7 ).
  • the key prompts the user to associate the identified host device with the key.
  • a display on the key may display a prompt asking the user if the user would like to pair the identified host device with the key.
  • the display may indicate that the user may enter a selection using a user interface of the key.
  • the key determines whether the user provided an instruction to associate the host device with the key. For example, a processor in the key may determine whether the user provided an input using the user interface. In addition, the processor may determine whether the input provided by the user was YES or NO. If the key determines that the user provided no instruction to associate the device with the key, or an instruction not to associate the device with the key, process 800 moves to step 808 and ends.
  • step 806 the key instead determines that the user provided an instruction to associate the device with the key, process 800 moves to step 810 .
  • the key identifies a device operation to be performed by the host device. For example, the key may select a default or standard operation that is performed by the host device (e.g., turning a light on or off). As another example, the user may enter a device operation using the user interface of the key. In some embodiments, the display may provide a confirmation of the selected device operation.
  • the key stores host device identification information. For example, a host device identifier may be stored in memory 204 ( FIG. 2 ).
  • the key stores the identified device operation. For example, the device operation may be stored in memory 204 (e.g., associated with the host device identifier in a suitable data structure).
  • Process 800 then ends at step 808 .
  • FIG. 9 shows a flow chart of an illustrative process for entering authentication information to be 30 transmitted to a host device in accordance with one embodiment of the invention.
  • This process may be used to initially load the user's authentication information in the key for transmission to a host device.
  • the user may perform this process only once, when the key is first set up, and the key subsequently automatically provides the required authentication information to devices in the key's personal area network.
  • Process 900 starts at step 902 .
  • the user enters authentication information for transmission to a host device.
  • the user may enter a username and password combination.
  • the user may enter a unique identifier.
  • the user may enter a seed that is used to generate an identifier using a mathematical algorithm (e.g., an RSA algorithm).
  • a mathematical algorithm e.g., an RSA algorithm
  • the user enters a device identifier to be associated with the authentication information.
  • the user may enter a unique identifier for a device.
  • the user may enter an IP address or other network address for the device.
  • the user may select the device from a menu.
  • the user may enter data in the key using any suitable approach.
  • the user may enter data using an user interface of the key.
  • the user may enter data using a base having an user interface, and couple the key to the base to transfer the data to the key.
  • the user may view inputs using a display integrated in the key or in the base.
  • the key stores the authentication information and device identifier.
  • the key may store the authentication information and device identifier in memory 204 ( FIG. 2 ).
  • Process 900 then ends at step 910 .
  • process 900 was described in the context of entering authentication information in the key for transmission to a host device. It will be understood, however, that that any suitable data, for example a device operation, may be entered in the key for transmission to a host device using process 900 .
  • FIG. 10 shows a flow chart of an illustrative process for creating a secure communications link between a key and a host device in accordance with one embodiment of the invention.
  • Process 1000 starts at step 1002 .
  • the key transmits its public key to the host device.
  • communications circuitry 202 FIG. 2
  • the key receives a public key from the host device.
  • communications circuitry 202 may receive a transmission of the public key from the host device.
  • the key generates an encryption key based on the public key received from the host device and on the private key of the key.
  • a processor in the key may perform an operation on the public key of step 1006 and on the private key of the key to generate an encryption key (e.g., using an RSA algorithm).
  • the key encrypts its transmissions using the encryption key generated at step 1008 .
  • communications circuitry 202 may transmit encrypted data to the host device.
  • Process 1000 then ends at step 1012 .
  • process 1000 was described as using private and public keys (e.g., used for example in the RSA algorithm), any other approach may be used to generate an encryption key to encrypt data transmitted from the key to the host device.
  • FIG. 11 shows a flow chart of an illustrative process for performing an operation with a host device when a key is placed in proximity of the host device in accordance with one embodiment of the invention.
  • Process 1100 begins at step 1102 .
  • the host device monitors for broadcasts from a key.
  • transceiver 308 FIG. 3
  • transceiver 402 FIG. 4
  • the host device determines whether a broadcast from a key has been received.
  • transceiver 308 may determine whether an incoming transmission is from a key (e.g., whether a transmission uses a particular protocol, or has specific identifying information). If the host device determines that no broadcast has been received from a key, process 1100 returns to step 1104 and continues to monitor incoming communications.
  • step 1108 the host device identifies the key from the broadcast data. For example, processor 302 ( FIG. 3 ) may compare the data provided in the broadcast with identification data for various keys stored in storage device 304 ( FIG. 3 ) or memory 306 ( FIG. 3 ). Processor 302 may determine, for example, that a key identifier transmitted in the broadcast data is the same as that for a known key stored in storage device 304 or memory 306 . In some embodiments, if transmissions from many keys are received, processor 302 may identify and select any particular key (e.g., the key with the strongest signal strength, or a key that has been previously used with host device 300 , FIG. 3 ).
  • any particular key e.g., the key with the strongest signal strength, or a key that has been previously used with host device 300 , FIG. 3 ).
  • the host device performs an operation in response to identifying the key.
  • transceiver 308 may receive instructions from the key to perform a particular operation (e.g., log a user into the host device).
  • processor 302 may retrieve from storage 304 or memory 306 an operation associated with the identified key, and perform the retrieved operation.
  • Process 1100 then ends at step 1112 .
  • FIG. 12 shows a flowchart of an illustrative process for authenticating a key and performing an operation in accordance with one embodiment of the invention.
  • Process 1200 begins at step 1202 .
  • the host device transmits host device identification information to a key.
  • transceiver 308 FIG. 3
  • transceiver 402 FIG. 4
  • Process 302 FIG. 2
  • the host device receives key identification information from the key.
  • transceiver 308 may receive a transmission from the key.
  • Processor 302 may process the transmission and extract key identification information.
  • the host device determines whether the key identification information is known. For example, processor 302 may compare the received key identification information with identification information stored in storage device 304 or memory 306 . If the host device determines that the key identification information is not known, process 1200 moves to step 1210 , which calls process 1400 ( FIG. 14 ), discussed in more detail below.
  • process 1200 moves to step 1212 .
  • the host device authenticates the key.
  • processor 302 may receive authentication information from the key that processor 302 can compare to data stored for the key in storage device 304 or memory 306 .
  • Authentication information may include, for example, a username and password combination, a code, a string created based on a secret seed and a known algorithm (e.g., an RSA-based string), or any other suitable information.
  • the host device determines whether the key is authenticated. For example, processor 302 may determine whether the authentication information provided by the key was consistent with the information stored in storage device 304 or memory 306 . If the host device determines that the key is not authenticated, process 1200 moves to step 1216 and terminates.
  • process 1200 moves to step 1218 .
  • process 1200 may go straight to step 1218 from step 1212 , and skip steps 1214 and 1216 .
  • Such an approach may be used, for example, when the identification information transmitted by the key is sufficient to serve as authentication information (e.g., the identification information is sufficiently secret).
  • the host device identifies one or more operations to perform in response to the key's proximity (i.e., the host device is within the personal area network of the key). For example, processor 302 may identify a process to perform from data stored in storage device 304 or memory 306 that is associated with the key. As another example, transceiver 308 may receive an instruction from the key identifying one or more operations to perform.
  • the host device performs one or more operations identified at step 1218 .
  • processor 302 may direct the components of the host device to perform the one or more operations.
  • actuator 404 FIG. 4
  • the operations may be any suitable action that the device is operative to perform. Same operations may include, for example, logging a user into the host device, loading a user's profile, preferences or files, activating a switch, calling a device or system (e.g., placing a call with a telephone, or calling an elevator), or any other suitable operation.
  • Process 1200 then ends at step 1216 .
  • FIG. 13 shows a flowchart of an illustrative process for performing an operation when a host device is within the personal area network created by a key in accordance with one embodiment of the invention.
  • Process 1300 begins at step 1302 .
  • the host device performs an operation.
  • processor 302 FIG. 3
  • the host device may direct one or more components of the host device to perform an operation described above in step 1220 of process 1200 ( FIG. 12 ).
  • the host device determines whether the device is still within the personal area network created by the key.
  • transceiver 308 ( FIG. 3 ) or transceiver 402 ( FIG. 4 ) may monitor incoming communications and determine whether it continues to receive communications from the key.
  • transceiver 308 or transceiver 402 may ping the key and monitor communications for a return communication. If the host device determines that the it is still within the personal area network created by the key, process 1300 returns to step 1304 and continues to perform the operation.
  • process 1300 moves to step 1308 .
  • the host device ceases performing the operation.
  • processor 302 may direct the components of the host device to stop operating.
  • the host device returns to its state prior to beginning to perform the operation.
  • processor 302 may direct one or more components of the host device to return to their previous states (e.g., turn back a switch).
  • Process 1300 then ends at step 1312 .
  • process 1300 may terminate after step 1308 and skip step 1310 .
  • step 1310 may be skipped based on the operation that was performed. For example, if the operation was to log a user into the host device, or load a user's preferences or profile, step 1310 may serve to log the user out of the system and/or delete the user's files or other personal information. As another example, if the operation was to turn on a vehicle's engine, step 1310 would serve to turn the vehicle off. As still another example, if the operation was to turn on a light or set-up air conditioning or heating, step 1310 may not be used (e.g., the user is still within his home, but not in near proximity to the light switch).
  • FIG. 14 shows a flow chart of an illustrative process for associating a key with a host device in accordance with one embodiment of the invention.
  • Process 1400 begins at step 1402 .
  • step 1402 may correspond to step 1210 of process 1200 ( FIG. 12 ).
  • the host device prompts the user to associate a key with the host device.
  • the host device using transceiver 308 ( FIG. 3 ) or transceiver 402 ( FIG. 4 ), may determine that the host device is within the personal area network of a key.
  • Processor 302 FIG. 3
  • the user may associate the key in any suitable manner. For example, the user may select a key displayed on the host device. As another example, the user may enter identification information (e.g., a unique identifier or an IP address) for the key using an user interface.
  • identification information e.g., a unique identifier or an IP address
  • the host device determines whether the user has provided an instruction to associate a key. For example, processor 302 may determine whether the user provided an input using the user interface. If the host device determines that the user has not provided any input, or that the user has instructed the host device not to associate the key, process 1400 moves to step 1408 and ends.
  • step 1406 the host device instead determines that the user has provided an instruction to associate the key with the host device, process 1400 moves to step 1408 .
  • the host device identifies an operation to perform when the host device is within the personal area network of the key. For example, processor 302 may automatically select an operation to perform (e.g., turn a light switch on). In some embodiments, the host device may provide a default operation that is selected in the absence of additional instructions from the user. In some embodiments, the user may specify the operation to perform (e.g., using the user interface).
  • processor 302 may automatically select an operation to perform (e.g., turn a light switch on).
  • the host device may provide a default operation that is selected in the absence of additional instructions from the user.
  • the user may specify the operation to perform (e.g., using the user interface).
  • the host devices stores the key's identification information.
  • processor 302 may direct storage device 304 ( FIG. 3 ) or memory 306 ( FIG. 3 ) to store the key's identification information.
  • the host device stores the operation identified at step 1410 .
  • processor 302 may store the identified operation in storage device 304 or memory 306 .
  • the host device may use any suitable data structure to store one or more keys' identification information, associated operations to perform, and other key-related data. For example, a database in which each key is associated with identifier information and one or more operations associated with the key may be stored in storage device 304 or memory 306 .
  • Process 1400 then ends at step 1416 , which may be step 1218 of process 1200 ( FIG. 12 ).
  • process 1400 may skip steps 1410 and 1414 .
  • the host device may not associate an operation with the key. Instead, each time the key is paired with the host device, the key transmits specific instructions to the host device. This approach may provide benefits when a key is used to cause a plurality of host devices to operate, as the user need only modify the data transmitted by the key using the key's interface to modify the operation of one or more host devices.

Abstract

This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the communications circuitry. When a host device is within the personal area network, the key may transmit data received by a transceiver on the host device. In response to receiving the data, the host device may perform an operation (e.g., an authentication operation). In some embodiments, the key may transmit data identifying an operation for the host device to perform. In some embodiments, the host device may store in memory key identification information and an associated operation which may be retrieved when the key is brought in proximity of the host device.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. application Ser. No. 11/823,656 filed Jun. 27, 2007, of the same title, the contents of which are incorporated herein by reference in their entirety for all purposes.
  • BACKGROUND
  • This invention is directed to a key that uses a short range communications protocol to direct a host S device to perform an operation.
  • To perform an operation with a device, whether an electronic device, mechanical device, or other device, users typically need to provide inputs on a user interface. In some cases, the user may provide inputs using a remote controller that directs the device to perform operations based on the user's inputs on the remote controller.
  • Whether the user input is provided directly on the device or remotely, the user must nevertheless press a key, or perform some other action for the device to perform an operation. The operation is not performed in response to the user approaching the device.
  • There is a need, therefore for a system by which a user can bring a key in a communications proximity with a host device and cause the host device to automatically perform an operation. In particular, there is a need for a system in which a user can bring a key in a communications proximity with an electronic device to cause the electronic device to automatically log in the user or load the user's profile.
  • SUMMARY
  • A system that includes a key for remotely causing a host device to perform an operation is provided. In some embodiments, the key may be configured to cause a host device to automatically log in a user associated with the key, or load the user's profile.
  • A key that includes communications circuitry may be provided. Using the communications circuitry, the key may be configured to create a relatively short-range personal area network. The key may use any suitable communications protocol to create the personal area network including, for example, Wi-Fi communications (e.g., one of the 802.11 standards), Bluetooth, Nordic, high frequency systems (e.g., 900 MHz, 2.4 GHz, and 5.6 GHz communication systems), short-range radio circuitry (e.g., walkie-talkie type circuitry), infrared, and other relatively localized wireless communication protocols.
  • The key may be incorporated or integrated in any suitable device. For example, the key may be a key fob, a card (e.g., a credit card shaped device), a portable drive (e.g., a flash drive), a widget (e.g., a coin-sized object), or any other suitable device or object that may be unobtrusively carried in or clipped to a user's pocket, bag, or other possession. In some embodiments, the key may be inserted inside a user (e.g., surgically inserted under a user's skin). In some embodiments, the key or its functionality may be incorporated in an electronic device, for example in a cellular telephone, a mobile communications device, a pocket-sized personal computer (e.g., an iPAQ or a Palm Pilot) a personal media device (e.g., an iPod), a camera, a video recorder, a computer (e.g., a laptop computer), a key (e.g., car keys), a remote controller, or any other suitable electronic device.
  • A host device that includes a transceiver and an actuator may be provided. The transceiver may be configured to communicate with the communications circuitry of the key when the host device is within the personal area network created by the key. The actuator may be any suitable component operative to move the host device from a first position or state to a second position or state. For example, the actuator may include a motor, a switch (e.g., for turning a device or a function on or off, a processor (e.g., for performing an operation in response to instructions from software in an electronic device), or any other suitable actuator.
  • The host device may be any suitable device in which an operation may be performed when a key is brought in proximity of the host device. For example, the host device may include a computer, a cellular telephone, a mobile communications device, a personal media device, a set-top box, a television system, or any other suitable electronic device. In such cases, the operation may include for example, authenticating a user to the system (e.g., logging in the user), loading a user's settings (e.g., a user's preference profile), dialing a telephone number, opening a program (e.g., opening a user's e-mail software), activating a peripheral, activating a system coupled to the device (e.g., starting an automobile's engine), or any other suitable operation. As another example, the host device may include an automobile or other vehicle, a door or window, a gate or turnstile, a garage door, or any other device or system for which a key or pass is required. As still another example, the host device may include a light or light switch, curtains or shades, an elevator, a conveyer belt, a motorized device, or any other device that can be moved from a first position or state to a second position or state.
  • when a key is brought in proximity of a host device such that the host device is within the personal area network created by the key, the communications circuitry of the key and the transceiver of the host device may communicate data. In some embodiments, the key may broadcast identification information to the host devices in the personal area network (e.g., broadcast a unique identifier). In response to receiving the broadcast, the host device may transmit identification information to the key. Once the key has identified the host device within the personal area network, the key may transmit an instruction to the host device to perform an operation. For example, the key may direct the host device to automatically log in a user (e.g., the user associated with the key). In some embodiments, the user may specify the instruction sent to the host device by the key (e.g., using a user interface on the key or a base coupled to the key).
  • In some embodiments, after receiving a broadcast from the key, the host device may retrieve from memory an operation associated with the identified key. The host device may then perform the retrieved operation (e.g., after authenticating the key). In some embodiments, a user may set-up a host device to perform a particular operation when the host device is within the personal area network of the key using the user interface of the device.
  • In some embodiments, the host device may be configured to perform the specified operation so long as the host device is within the personal area network created by the key. The host device may periodically request a transmission from the key to determine whether the key is still sufficiently proximate to the device, or the key may periodically send transmissions to notify devices of its presence. When a host device is no longer within the personal area network of the key, the host device may cease to perform the operation. In some embodiments, the host device may return to its prior state (e.g., log the user off of the host device).
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The above and other features of the present invention, its nature and various advantages will be more apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings in which:
  • FIG. 1 is a simplified block diagram of a network system that includes a key, a host device and another device in accordance with one embodiment of the invention;
  • FIG. 2 is a simplified block diagram of an illustrative key in accordance with one embodiment of the invention;
  • FIG. 3 is a simplified block diagram of a host device or other device in accordance with one embodiment of the invention;
  • FIG. 4 is a block diagram of another host device in accordance with one embodiment of the invention;
  • FIG. 5 shows specific examples of where a key may be placed to create a personal area network in accordance with one embodiment of the present invention;
  • FIG. 6 shows specific examples of host devices in accordance with one embodiment of the present invention;
  • FIG. 7 shows a flowchart of an illustrative process for transmitting data with a key to a host device in accordance with one embodiment of the invention;
  • FIG. 8 shows a flow chart of an illustrative process for associating a host device with a key in accordance with one embodiment of the invention;
  • FIG. 9 shows a flow chart of an illustrative process for entering authentication information to be transmitted to a host device in accordance with one embodiment of the invention;
  • FIG. 10 a shows a flow chart of an illustrative process for creating a secure communications link between a key and a host device in accordance with one embodiment of the invention;
  • FIG. 11 shows a flow chart of an illustrative process for performing an operation with a host device when a key is placed in proximity of the host device in accordance with one embodiment of the invention;
  • FIG. 12 shows a flowchart of an illustrative process for authenticating a key and performing an operation with a host device in accordance with one embodiment of the invention;
  • FIG. 13 shows a flowchart of an illustrative process for performing an operation when a host device is within the personal area network created by a key in accordance with one embodiment of the invention; and
  • FIG. 14 shows a flow chart of an illustrative process for associating a key with a host device in accordance with one embodiment of the invention.
  • DETAILED DESCRIPTION
  • FIG. 1 is a simplified block diagram of a network system in accordance with one embodiment of the invention. System 100 may include key 110, host device 120 and other device 130. In some embodiments, system 100 may include a plurality of keys 110 and host and other devices 120 and 130. To avoid overcomplicating the drawing, only one of each is shown.
  • Key 110 may include circuitry providing communications network 112, which may be a relatively short-range communications network. Using network 112, key 110 may be capable of performing wireless communication with a relatively short-range wireless communication protocol such as Wi-Fi (e.g., a 802.11 protocol), Bluetooth (registered trademark), high frequency systems (e.g., 900 MHz, 2.4 GHz, and 5.6 GHz communication systems), infrared, other relatively localized wireless communication protocol, or any combination thereof. Devices located within communications protocol network 112 may wirelessly communicate over a local wireless communication path such as paths 140 and 142. As defined herein, a local wireless communication path enables wireless communication using a short-range communications protocol. When a device (e.g., host device 120) is not within network 112, that device may be out of range and not able to wirelessly communicate with key 110.
  • In one embodiment, the short range communications circuitry may be integrated within the packaging of key 110 (e.g., integrated into a printed circuit board of the device), or in other embodiments, may be included in an accessory device that is docked or connected to device 110. The accessory device may be, for example, a relatively unobtrusive device that provides device 110 with short-range communicating functionality. Examples of key 110 may include, for example, a media player such as an iPod available by Apple Computer Inc., of Cupertino, Calif., a key fob, a cellular telephone, pocket-sized personal computers such as an iPAQ Pocket PC available by Hewlett Packard Inc., of Palo Alto, Calif., personal digital assistants (PDAs), a desktop computer, a laptop computer, and any other device capable of communicating wirelessly (with or without the aid of a wireless enabling accessory system). In some embodiments, key 110 may be incorporated in an article of clothing, a wallet, a briefcase, a bag, a shoe, or any other item that a user may typically carry or wear. In some embodiments, key 110 may be inserted inside a user's body (e.g., surgically inserted under a user's skin).
  • Host device 120 and other device 130 may include transceiver circuitry for wirelessly coupling to key 110. In some embodiments, host device 120 or other device 130 may require the user to initially set up communications links 140 and 142 with key 110. For example, the user may pair key 110 with host device 120 and other device 130.
  • Host device 120 and other device 130 may be any device or system that may be moved from at least a first position or state to a second position or state. In some embodiments, host device 120 and other device 130 may be any device or system with which a user may access personalized settings or information. For example, host device 120 or other device 130 may include a computer, a workstation, a cellular telephone, a mobile communications device, a personal media device, a set-top box, a television system, or any other suitable electronic device.
  • In some embodiments, host device 120 and other device 130 may be any device or system that can be moved to at least two different positions or states (e.g., on/off or open/closed). For example, host device 120 or other device 130 may include a light or light switch, curtains or shades, an elevator, a conveyer belt, a motorized device, or any other device or system that may be moved from at least a first to a second position or state. As another example, host device 120 or other device 130 may include an automobile or other vehicle, a door or window (e.g. with a lock), a gate or turnstile, a garage door, or 10 any other device or system for which a key or pass is required.
  • FIG. 2 is a simplified block diagram of an illustrative key in accordance with one embodiment of the invention. Key 200 may include communications circuitry 202 and memory 204. Communications circuitry 202, or sometimes referred to herein as personal area network circuitry or short-range communications circuitry, may enable key 200 to function as a host for a personal area network. That is, communications circuitry 202 may enable key 200 to wirelessly communicate with one or more devices using a short range communications protocol. For example, communications circuitry 202 may support Wi-Fi communications (e.g., one of the 802.11 standards), Bluetooth, Nordic, high frequency systems (e.g., 900 MHz, 2.4 GHz, and 5.6 GHz communication systems), short-range radio circuitry (e.g., walkie-talkie type circuitry), infrared, and other relatively localized wireless communication protocols.
  • Using one or more supported communication protocols, communications circuitry 202 may be configured to create a network for transferring data to and from other devices. The data transferred from key 200 may include, for example, authentication information, identification information, a command or instruction to perform an operation with a host device, an identifier for a user profile or for user preferences, files or other data, or any combination thereof. Communications circuitry 202 may be configured to provide host device-specific data, for example in response to identifying the host device to which key 200 communicates or is “paired” in the network.
  • Memory 204 may include one or more different types of memory which may be used for performing device functions. For example, memory 204 may include cache, Flash, ROM, and/or RAM. Memory may be specifically dedicated to storing firmware Memory 204 may be provided for storing firmware for device applications (e.g., operating system, user interface functions, and processor functions). Memory 204 may store data for pairing itself or communicating with one or more devices (e.g., a host device) using a communications protocol supported by communications circuitry 202.
  • In some embodiments, memory 204 may be configured to store data transmitted by communications circuitry 202 (e.g., authentication information, identification information, an instruction to perform an operation with a host device, an identifier for a user profile or for user preferences, or user profile or user preference data) to a host device to which key 200 is paired. In embodiments in which memory 204 stores a user profile or user preference information, key 200 may be operative to transmit the user profile or user preference information to a host device when the host device is within the network of the key. In some embodiments, memory 204 may instead or in addition store files or other data used by the user (e.g., files stored on the user's desktop, or recent files accessed by the user), and transfer the files or other data when a host device is within the network of the key. With this approach, each user may access a host device with their preferences without requiring the host device to connect to a server to identify and load the proper preferences. This may allow a user to access personal information using a host device even when the host device is not connected to a server (e.g., when the host device is offline, for example a laptop computer in an airplane or in a tunnel).
  • In some embodiments, memory 204 may store a communications protocol for pairing key 200 with host devices. Memory 204 may host a database of the host devices to which key 200 was paired, for example, using a serial number or other identifier for the host device. Memory 204 may store instructions that key 200 can transmit to cause each host device to perform one or more operations. For example, if the host device is a computer, memory 204 may store authentication information for key 200 to automatically log the user into the computer. As another example, if the host device is an elevator, memory 204 may store an instruction to call an elevator to go to a particular floor. As still another example, if the host device is a vehicle, memory 204 may store an instruction to unlock the vehicle and to start the vehicle's engine, radio, navigation system, other vehicle function, or any combination thereof. As a final example, if the host device is a light or door, memory 204 may store an instruction to turn the light on, or open or unlock the door.
  • Any number of approaches may be used to store the required information in memory 204. In some embodiments, when key 200 is first paired with a host device, the host device may provide the information to key 200 for storing in memory 204. For example, the host device may automatically provide the information when the host device and key 200 are paired. As another example, the user of the host device may direct the host device to provide particular information to key 200. This approach may be used, for example, to allow the user to select the operation or operations that key 200 will direct a particular host device to perform (e.g., the key may cause an automobile to turn on the media system, activate the navigation system, or turn on the engine).
  • In some embodiments, the user may set up key 200 to perform particular operations. For example, key 200 may include a display and user interface allowing the user to set up the operation of the key. As another example, key 200 may be coupled to a base or docking station through which the user may set up key 200. The base may be a standalone device having a display and a user interface, a host device with a display and a user interface, or any other suitable device by which a user may set up key 200. In some embodiments, the user may wirelessly set up one or more keys using the base.
  • In some embodiments, key 200 may also include a power supply, a user interface and a display. Key 200 may also include a processor distinct from communications circuitry 202. The processor can control the operation of some or all of the functions and components included in key 200. For example, the processor may drive the display and process inputs received from the user interface. In some embodiments, key 200 may include some form of a limited interface such as, for example, an ON/OFF switch. In some embodiments, key 200 may include an interface that the user must select to transmit data from key 200 (e.g., a transmit or broadcast switch).
  • The user interface may allow a user to interact with key 200. For example, the user input device can take a variety of forms, such as a button, keypad, dial, a click wheel, or a touch screen. The user interface may include a multi-touch screen such as that described in U.S. Pat. No. 6,323,846, which is incorporated by reference herein in its entirety. The user interface may emulate a rotary phone or a multi-button keypad, which may be implemented on a touch screen or the combination of a click wheel or other user input device and a screen. A more detailed discussion of such a rotary phone interface may be found, for example, in U.S. patent application Ser. No. 11/591,752, filed Nov. 1, 2006, entitled “Touch Pad with Symbols based on Mode,” which is incorporated by reference herein in its entirety.
  • Key 200 may be any suitable device that includes at least communications circuitry 202 and memory 204. Because key 200 may require so few elements, and these elements may be very small in size, key 200 may be a very small device. For example, key 200 may include, or be integrated in, a key fob, a card (e.g., a credit card shaped device), a portable drive (e.g., a flash drive), a widget (e.g., a coin-sized object), or any other suitable device or object that may be unobtrusively carried in a user's pocket, purse or bag. In some embodiments, key 200 may include a clip or other connecting mechanism for attaching key 200 to an object that the user typically carries. For example, key 200 may be clipped or attached to a user's wallet, cellular telephone, personal media device (e.g., an iPod), wired headset, wireless headset, watch, bag, belt, article of clothing, or any other suitable object. In some embodiments, key 200 may be inserted inside a user (e.g., surgically inserted under a user's skin).
  • In some embodiments, key 200 or its functionality may be incorporated in an electronic device. For example, key 200 may be incorporated in a cellular telephone, a mobile communications device, a pocket-sized personal computer (e.g., an iPAQ or a Palm Pilot) a personal media device (e.g., an iPod), a camera, a video recorder, a computer (e.g., a laptop computer), a key (e.g., car keys), a remote controller, or any other suitable electronic or personal device. Key 200, or the device in which key 200 or its functionality is incorporated may be sized to fit relatively easily into a pocket or hand of the user, and may be taken practically anywhere the user travels
  • FIG. 3 is a simplified block diagram of a host device or other device in accordance with one embodiment of the invention. Host device 300 may include processor 302, storage device 304, memory 306, transceiver 308, power supply 310 and bus 312. Processor 302 can control the operation of the functions and components of device 300.
  • Storage device 304 may include one or more storage mediums, including for example, a hard-drive, flash memory, permanent memory such as ROM, semi-permanent memory such as RAM, or cache. Storage device 304 may store media (e.g., music and video files), software (e.g., for implementing functions on device 300), preference information (e.g., media playback preferences), lifestyle information (e.g., food preferences), exercise information (e.g., information obtained by exercise monitoring equipment), transaction information (e.g., information such as credit card information), wireless connection information (e.g., information that may enable device 300 to establish a wireless connection), subscription information (e.g., information that keeps tracks of podcasts or television shows or other media a user subscribes to), contacts information (e.g., telephone numbers and email address), calendar information, and any other suitable data.
  • In some embodiments, storage device 304 may store authentication information for a user to enter prior to accessing the functionality of the device. For example, storage device 304 may store username and password combinations, or algorithms and keys for authenticating a string entered by the user (e.g., using a RSA algorithm). Storage device 304 may store data for pairing itself or communicating with one or more devices (e.g., key 200, FIG. 2) using a short-range communications protocol.
  • Memory 306 may include one or more different types of memory which may be used for performing device functions. For example, memory 306 may include cache, Flash, ROM, and/or RAM. Memory may be specifically dedicated to storing firmware. For example, memory 306 may be provided for storing firmware for device applications (e.g., operating system, user interface functions, and processor functions).
  • Transceiver 308 may enable device 300 to wirelessly communicate with one or more keys (e.g., key 200. FIG. 2) using a short range communications protocol. For example, transceiver 308 may support Wi-Fi communications (e.g., one of the 802.11 standards), Bluetooth, Nordic, high frequency systems (e.g., 900 MHz, 2.4 GHz, and 5.6 GHz communication systems), infrared, short-range radio circuitry (e.g., walkie-talkie type circuitry), and other relatively short-range wireless communication protocols.
  • Bus 312 may provide a data transfer path for transferring data to, from, or between processor 302, storage device 304, memory 306 and transceiver 308. In some embodiments, a coder/decoder (CODEC) may be included to convert digital audio signals into an analog signal, which may be provided to an output port (not shown).
  • Power supply 310 may provide power to the components of device 300. In some embodiments, power supply 310 may be coupled to a power grid (e.g., a personal computer). In some embodiments, power supply 310 may include one or more batteries for providing power in a portable device. As another example, power supply 310 may be configured to generate power in a portable device from a natural source (e.g., solar power using solar cells).
  • In some embodiments, device 300 may include a 15 display and a user interface. The display and user interface may include some or all of the features discussed above in connection with the display and user interface of key 200.
  • In some embodiments, device 300 may be an electronic device in which a user may provide identifier information to receive authorization to access the device, or to access or load the user's personal information. Device 300 may include, for example, a computer, a cellular telephone, a mobile communications device, a personal media device, a set-top box, a television system, or any other suitable electronic device.
  • FIG. 4 is a simplified block diagram of another host device in accordance with one embodiment of the invention. Host device 400 includes transceiver 402 and actuator 404. Transceiver 402 may enable device 400 to wirelessly communicate with one or more keys (e.g., key 200, FIG. 2) using a short range communications protocol. Transceiver 402 may include one or more of the features described above in connection with transceiver 308 (FIG. 3).
  • Actuator 404 may be any suitable component operative to move device 400 from a first position or state to a second position or state. For example, actuator 404 may include a motor that is configured to move an element within device 400. As another example, actuator 404 may include a motor that is configured to move device 400. In some embodiments, actuator 404 may include a switch, for example for turning a device or a function on or off (e.g., a light switch, a door lock, or an air conditioner or heater). In some embodiments, actuator 404 may be processor for performing operations in response to instructions from firmware or software. For example, actuator 404 may be a processor that performs a particular function or operation under the control of a software program. The function or operation may include, for example, authenticating a user to the system (e.g., logging in the user), loading a user's settings (e.g., a user's preference profile), dialing a telephone number, opening a program (e.g., opening a user's e-mail software), activating a peripheral, activating a system coupled to the device (e.g., starting an automobile's engine), or any other suitable operation.
  • The key according to embodiments of this invention may be integrated in a number of devices or objects, several of which are described in more detail below. As discussed in connection with FIGS. 1 and 2, a key may be in communication with a host device when the host device is within communications network 112 (FIG. 1). Specific examples of where a key may be placed to create a personal area network are shown in FIG. 5.
  • FIG. 5 shows person 510, key fob 520, clip 530, mobile telephone 540, and personal media device 550, each of which may harbor a key that creates personal area networks 512, 522, 532, 542 and 552, respectively. When the key of any of these locations comes in proximity of a host device, such that the host device is within the personal area network of the key, the host device may perform an operation. In the example of FIG. 5, host device 560 is a computer into which the user associated with the key may be automatically logged in when host device 560 is within the personal area network of the key. In some embodiments, host device 560 may log out the user or lock the computer when host device 560 is no longer within the personal area network of the key.
  • By virtue of the presence of a key, a personal area network may exist about person 510. In this example, the person may keep the key his or her pocket(s), or alternatively, the key may be kept substantially near the person such as an accessory item (e.g., handbag, backpack, or purse). In some embodiments, the key may be integrated with clothing or an accessory item, providing functional fashion having device operation capabilities. In some embodiments, the key may be embedded under a user's skin (e.g., surgically implanted).
  • As defined herein, integration of a key refers to placing the key within or attached to an item, or incorporating the key into the item such that it appears to be part of the item. In some embodiments, a key may be integrated in any of key fob 520, object with clip 530 (e.g., a clip configured to be attached to an article of clothing or accessory), mobile telephone 540, and personal media device 550 using any suitable approach.
  • The host device or other devices according to embodiments of this invention may be configured to perform any suitable operation when the key is placed in proximity of the host device such that the personal area network of the key encloses the host device. As discussed in FIGS. 3 and 4, a host device may perform any suitable operation in response to receiving a signal from the key. Specific examples of host devices and the operations performed in response to entering the network created by are shown in FIG. 6.
  • FIG. 6 shows computer 610, laptop 612, television system 620, multimedia system 630, automobile 640, door 650, lamp 660, heating and/or air conditioning system 670, elevator 680, and motor 690. The devices and systems of FIG. 6 may be configured to perform various operations when a key is placed in proximity of the device or system such that the device or system is within the network created by the key. For example, computer 610 and laptop 612 may be configured to automatically log the user associated with the key into the computer system. As another example, computer 610 and laptop 612 may automatically load a user's profile or preferences when the key is brought in proximity of the system. In some embodiments, the key alone may be sufficient to perform the operation with computer 610 or laptop 612. In some embodiments, however, the user may be required to enter private information in addition to having the key present to perform an operation (e.g., a password for a more secure login to the computer) In some embodiments (e.g., if the key has a user interface), the user may provide login data to the key for transmission to computer 110 or 112.
  • Television system 620 may be configured to automatically load a user's profile or preferences when a key associated with the user is brought in proximity of system 620. As another example, system 620 may be configured to automatically log in the user associated with the key (e.g., to automatically load the user's pin for ordering PPV programs and on-demand content, and setting-up recordings). Similarly, media system 630 may be configured to automatically load the user profile or preferences of the user associated with the key, or login the user associated with the key (e.g., load the user's music preferences or load the user's playlists).
  • Automobile 640 may be configured to perform any of a number of operations when a key is brought in proximity of the automobile. For example, automobile 640 may unlock one or more of its doors when the key is brought in proximity of the automobile. As another example, automobile 640 may automatically start its engine. As still another example, automobile 640 may automatically turn on the heating or air conditioning system of the automobile. As another example, automobile 640 may automatically activate a navigation system (e.g., a GPS system) or a media system. In some embodiments (e.g., if the key has a user interface), the user may select with the key one or more particular operations for automobile 640 to perform, and direct the key to transmit the user's selections to the automobile.
  • Door 650 may be any suitable door or gate for preventing ingress and egress. For example, door 650 may be the door to a home, office, or other building. As another example, door 650 may be a garage door or other door or gate for preventing vehicles from passing. As still another example, door 650 may be a gate or a turnstile (e.g., for accessing public transportation, a stadium, or an office building). When a key is brought in proximity of door 650, the door may be configured to unlock or lock automatically. For example, a door may unlock when a key is brought in proximity of the door, and lock as soon as the door is no longer within the network created by the key. As another example, the door may switch from locked to unlocked and back each time the door enters the network created by the key. In some embodiments, door 650 may automatically open or close when a key is brought in proximity to door 650 (e.g., automatically open a door for a handicapped person in the presence of the key). In some embodiments, the user may enter an input on the key or door, in addition to bringing the key in proximity of door 650.
  • Lamp 660 may be any suitable light source for a user. For example, lamp 660 may be a floor, wall, or ceiling lamp. As another example, lamp 660 may be curtains or shades that may be opened to allow light to pass. Lamp 660 may be configured to be turned on or off when a key is brought in proximity of the lamp. For example, as long as lamp 660 is within the network created by the key, lamp 660 may be turned on. As another example, lamp 660 may be configured to be turned on a particular level (e.g., dim lights) when the key is brought in proximity of lamp 660. In some embodiments (e.g., if the key has a user interface), the user may select with the key whether to turn lamp 660 on or off, or select the intensity for the lamp, and direct the key to transmit the selection to lamp 660.
  • Heating and/or air conditioning system 670 may be any suitable system for heating or cooling air, for example in a building or vehicle. Heating and/or air conditioning system 670 may be configured to discharge air at a particular temperature when the key is brought in proximity of heating and/or air conditioning system 670. In some embodiments, the key may direct heating and/or air conditioning system 670 to bring the temperature to a specific temperature (e.g., the key may transmit data that specifies a temperature). In some embodiments (e.g., if the key has a user interface), the user may select with the key a temperature, fan speed, or other setting, and direct the key to transmit the selection to system 670.
  • Elevator 680 may be any suitable elevator. When a key is brought in proximity of elevator 680, for example on a floor that is served by elevator 680, the elevator may automatically be called to the floor of the key. In some embodiments, the key may transmit floor request information for the elevator to automatically select the floor to which the elevator will move. For example, the key may transmit data for two floors, the exit floor and the destination floor (e.g., an office floor or an apartment floor). When the elevator receives the transmission from the key, it may first determine the floor from which the key transmitted. If the floor is one of the ground floor and the destination floor, the elevator may automatically select the other floor. If the floor is neither the ground floor nor the destination floor, the elevator may select both and prompt the user to confirm the selection of one or the other, or the elevator may not select any floor. In some embodiments (e.g., if the key has a user interface), the user may select a floor with the key, and direct the key to transmit the selection to the elevator.
  • Motor 690 may be any suitable motor, engine or actuator that is present in any device or system. For example, motor 690 may be part of a vehicle, a security system, or any other suitable device or system. When a key is brought in proximity of motor 690, motor 690 may be configured to turn on or off, rotate or actuate at a specific speed in a specific direction, or accelerate or decelerate at a specific rate. In some embodiments (e.g., if the key has a user interface), the user may select with the key a particular action for motor 690 to perform, and direct the key to transmit the selected action to motor 690.
  • In some embodiments, a plurality of keys may create personal area networks in which a host device is present. For example, a classroom may include many students, each with their own laptop computers, and each with their own key. Each student's key may create a personal area network that includes all of the laptop computers present in the classroom. Each laptop, and more generally speaking each host device, may determine which key to communicate with in any suitable manner. In some embodiments, the host device may identify the key that transmits a signal exceeding a threshold signal strength, and communicate with the identified key. In some embodiments, the host device may identify the key that transmits a signal with the highest signal strength (e.g., the closest key to the host device). The measure of signal strength may be absolute (e.g., the key with the highest actual data transfer rate), or may be relative to each key's capabilities (e.g., the key with the highest ratio of actual data transfer rate to maximum data transfer rate). In some embodiments, the host device may prompt the user to select a particular key (e.g., provide a selectable list of available keys in a pop-up menu). In some embodiments,
  • 30 the host device may automatically select the key that has previously communicated with the host device (e.g., the laptop computer communicates in class with the same key that the laptop computer communicates with in the user's dorm room).
  • A host device may be configured to perform an operation when it is within the personal area network created by a key using a number of different approaches. In some embodiments, the key may transmit instructions to perform one or more specific operations to the host device. For example, once the key has been paired with the host device (e.g., authenticated to the host device), the key may direct the host device to perform an operation. In some embodiments, the host device instead may itself identify the operation to perform when it is within the personal area network of a key. For example, the host device may identify the key, and retrieve from memory one or more operations that are associated with the identified key. Both of these approaches will be discussed in more detail in the following flow charts. In addition, the following flow charts refer to a number of processes that can be performed by keys and host devices in accordance with some embodiments of the invention.
  • FIG. 7 shows a flowchart of an illustrative process for transmitting data with a key to a host device in accordance with one embodiment of the invention. Process 700 begins at step 702. At step 704, the key broadcasts data, for example to notify other devices of the personal area network created by the key. For example, communications circuitry 202 of key 200 (FIG. 2) may transmit or broadcast identification information in the personal area network created by communications circuitry 202.
  • In some embodiments, the key may perform only this step. For example, this approach may be used in embodiments where the host device retrieves from memory, based on the identification information, the operation to perform. In such an embodiment, process 700 would then terminate. In some embodiments, however, the key may perform additional steps. These steps will be described below as part of process 700. It will be understood, however, that in some embodiments, process 700 may terminate after step 704.
  • At step 706, the key determines whether a host device is present within the personal area network. For example, communications circuitry 202 may determine whether any transmissions are received from a host device. If the key determines that no host device is present within the personal area network, process 700 returns to step 704 and continues to broadcast data.
  • If, at step 706, the key instead determines that a host device is present within the personal area network, process 700 may move to step 708. In some embodiments, process 700 may also move to step 704, and continue to broadcast data for other host devices within the personal area network. At step 708, the key determines whether the host device that responded at step 706 is known. For example, the key may determine whether identifier information provided by the host device matches identifier information stored in memory 204 (FIG. 2). If the key determines that the host device is unknown, process 700 moves to step 709, which calls process 800 (FIG. 8), discussed in more detail below.
  • If, at step 708, the key instead determines that the host device is known, process 700 moves to step 710. At step 710, the key identifies the host device that responded. For example, communications circuitry 202 may compare identification information provided by the host device with the identification information of known host devices stored in memory 204.
  • At step 712, the key identifies the data to transmit to the identified host device. For example, communications circuitry 202 may retrieve from memory 202 the data for transmission that is associated with the identified host device (e.g., data stored in a database field with the host device identifier). The identified data may include authentication information (e.g., login information), instructions to perform an operation (e.g., instructions to start an engine), parameters for performing an operation (e.g., an elevator floor), a user's working documents (e.g., files), or any other suitable data.
  • At step 714, the key transmits the data identified at step 712. For example, communications circuitry 202 may transmit the identified data to the host device using any suitable communications protocol. In some embodiments, the data transmission may be encrypted. At step 716, the key determines whether the host device confirmed receipt of the transmitted data. For example, communications circuitry 202 may request a checksum or other data from host device confirming that the host device in fact received the transmitted data. If the key determines that the host device did not confirm receipt of the transmitted data, process 700 moves back to step 714 and transmits the identified data again.
  • If, at step 716, the key instead determines that the host device received the transmitted data, process 700 moves to step 718. At step 718, the key ceases to transmit the identified data. For example, communications circuitry 202 may halt transmissions of authentication information. In some embodiments, the key may re-transmit the identified data at different intervals (e.g., if the host device requests a new transmission of authentication data). Process 700 then returns to step 704, where communications circuitry 202 broadcasts data identifying the key in the personal area network.
  • FIG. 8 shows a flow chart of an illustrative process for associating a host device with a key in accordance with one embodiment of the invention. Process 800 begins at step 802. In some embodiments, step 802 may correspond to step 709 of process 700 (FIG. 7). At step 804, the key prompts the user to associate the identified host device with the key. For example, a display on the key may display a prompt asking the user if the user would like to pair the identified host device with the key. The display may indicate that the user may enter a selection using a user interface of the key.
  • At step 806, the key determines whether the user provided an instruction to associate the host device with the key. For example, a processor in the key may determine whether the user provided an input using the user interface. In addition, the processor may determine whether the input provided by the user was YES or NO. If the key determines that the user provided no instruction to associate the device with the key, or an instruction not to associate the device with the key, process 800 moves to step 808 and ends.
  • If, at step 806, the key instead determines that the user provided an instruction to associate the device with the key, process 800 moves to step 810. At step 810, the key identifies a device operation to be performed by the host device. For example, the key may select a default or standard operation that is performed by the host device (e.g., turning a light on or off). As another example, the user may enter a device operation using the user interface of the key. In some embodiments, the display may provide a confirmation of the selected device operation.
  • At step 812, the key stores host device identification information. For example, a host device identifier may be stored in memory 204 (FIG. 2). At step 814, the key stores the identified device operation. For example, the device operation may be stored in memory 204 (e.g., associated with the host device identifier in a suitable data structure). Process 800 then ends at step 808.
  • FIG. 9 shows a flow chart of an illustrative process for entering authentication information to be 30 transmitted to a host device in accordance with one embodiment of the invention. This process may be used to initially load the user's authentication information in the key for transmission to a host device. In some embodiments, the user may perform this process only once, when the key is first set up, and the key subsequently automatically provides the required authentication information to devices in the key's personal area network. Process 900 starts at step 902. At step 904, the user enters authentication information for transmission to a host device. For example, the user may enter a username and password combination. As another example, the user may enter a unique identifier. As still another example, the user may enter a seed that is used to generate an identifier using a mathematical algorithm (e.g., an RSA algorithm).
  • At step 906, the user enters a device identifier to be associated with the authentication information. For example, the user may enter a unique identifier for a device. As another example, the user may enter an IP address or other network address for the device. As still another example, the user may select the device from a menu.
  • The user may enter data in the key using any suitable approach. For example, the user may enter data using an user interface of the key. As another example, the user may enter data using a base having an user interface, and couple the key to the base to transfer the data to the key. In some embodiments, the user may view inputs using a display integrated in the key or in the base.
  • At step 908, the key stores the authentication information and device identifier. For example, the key may store the authentication information and device identifier in memory 204 (FIG. 2). Process 900 then ends at step 910.
  • In the preceding discussion, process 900 was described in the context of entering authentication information in the key for transmission to a host device. It will be understood, however, that that any suitable data, for example a device operation, may be entered in the key for transmission to a host device using process 900.
  • FIG. 10 shows a flow chart of an illustrative process for creating a secure communications link between a key and a host device in accordance with one embodiment of the invention. Process 1000 starts at step 1002. At step 1004, the key transmits its public key to the host device. For example, communications circuitry 202 (FIG. 2) may retrieve the private key from memory 204 (FIG. 2) for transmission to the host device. At step 1006, the key receives a public key from the host device. For example, communications circuitry 202 may receive a transmission of the public key from the host device. At step 1008, the key generates an encryption key based on the public key received from the host device and on the private key of the key. For example, a processor in the key may perform an operation on the public key of step 1006 and on the private key of the key to generate an encryption key (e.g., using an RSA algorithm).
  • At step 1010, the key encrypts its transmissions using the encryption key generated at step 1008. For example, communications circuitry 202 may transmit encrypted data to the host device. Process 1000 then ends at step 1012. Although process 1000 was described as using private and public keys (e.g., used for example in the RSA algorithm), any other approach may be used to generate an encryption key to encrypt data transmitted from the key to the host device.
  • FIG. 11 shows a flow chart of an illustrative process for performing an operation with a host device when a key is placed in proximity of the host device in accordance with one embodiment of the invention. Process 1100 begins at step 1102. At step 1104, the host device monitors for broadcasts from a key. For example, transceiver 308 (FIG. 3) or transceiver 402 (FIG. 4) may monitor incoming communications to identify broadcasts from keys. At step 1106, the host device determines whether a broadcast from a key has been received. For example, transceiver 308 may determine whether an incoming transmission is from a key (e.g., whether a transmission uses a particular protocol, or has specific identifying information). If the host device determines that no broadcast has been received from a key, process 1100 returns to step 1104 and continues to monitor incoming communications.
  • If, at step 1106, the host device determines that a broadcast from a key has been received, process 1100 moves to step 1108. At step 1108, the host device identifies the key from the broadcast data. For example, processor 302 (FIG. 3) may compare the data provided in the broadcast with identification data for various keys stored in storage device 304 (FIG. 3) or memory 306 (FIG. 3). Processor 302 may determine, for example, that a key identifier transmitted in the broadcast data is the same as that for a known key stored in storage device 304 or memory 306. In some embodiments, if transmissions from many keys are received, processor 302 may identify and select any particular key (e.g., the key with the strongest signal strength, or a key that has been previously used with host device 300, FIG. 3).
  • At step 1110, the host device performs an operation in response to identifying the key. For example, transceiver 308 may receive instructions from the key to perform a particular operation (e.g., log a user into the host device). As another example, processor 302 may retrieve from storage 304 or memory 306 an operation associated with the identified key, and perform the retrieved operation. Process 1100 then ends at step 1112.
  • FIG. 12 shows a flowchart of an illustrative process for authenticating a key and performing an operation in accordance with one embodiment of the invention. Process 1200 begins at step 1202. At step 1204, the host device transmits host device identification information to a key. For example, transceiver 308 (FIG. 3) or transceiver 402 (FIG. 4) may transmit host device identification information in response to receiving a communication from a key (i.e., indicating that the host device is within the personal area network created by the key). Process 302 (FIG. 2) may retrieve host device identification information from storage device 304 (FIG. 3) or memory 306 (FIG. 3), and provide the information to transceiver 308 for transmission.
  • At step 1206, the host device receives key identification information from the key. For example, transceiver 308 may receive a transmission from the key. Processor 302 may process the transmission and extract key identification information. At step 1208, the host device determines whether the key identification information is known. For example, processor 302 may compare the received key identification information with identification information stored in storage device 304 or memory 306. If the host device determines that the key identification information is not known, process 1200 moves to step 1210, which calls process 1400 (FIG. 14), discussed in more detail below.
  • If, at step 1208, the host device instead determines that the key identification information is known (e.g., the key identification information was previously stored in storage device 304 or memory 306), process 1200 moves to step 1212. At step 1212, the host device authenticates the key. For example, processor 302 may receive authentication information from the key that processor 302 can compare to data stored for the key in storage device 304 or memory 306. Authentication information may include, for example, a username and password combination, a code, a string created based on a secret seed and a known algorithm (e.g., an RSA-based string), or any other suitable information.
  • At step 1214, the host device determines whether the key is authenticated. For example, processor 302 may determine whether the authentication information provided by the key was consistent with the information stored in storage device 304 or memory 306. If the host device determines that the key is not authenticated, process 1200 moves to step 1216 and terminates.
  • If, at step 1214, the host device instead determines that the key is authenticated, process 1200 moves to step 1218. In some embodiments, process 1200 may go straight to step 1218 from step 1212, and skip steps 1214 and 1216. Such an approach may be used, for example, when the identification information transmitted by the key is sufficient to serve as authentication information (e.g., the identification information is sufficiently secret).
  • At step 1218, the host device identifies one or more operations to perform in response to the key's proximity (i.e., the host device is within the personal area network of the key). For example, processor 302 may identify a process to perform from data stored in storage device 304 or memory 306 that is associated with the key. As another example, transceiver 308 may receive an instruction from the key identifying one or more operations to perform.
  • At step 1220, the host device performs one or more operations identified at step 1218. For example, processor 302 may direct the components of the host device to perform the one or more operations. As another example, actuator 404 (FIG. 4) may perform an operation. The operations may be any suitable action that the device is operative to perform. Same operations may include, for example, logging a user into the host device, loading a user's profile, preferences or files, activating a switch, calling a device or system (e.g., placing a call with a telephone, or calling an elevator), or any other suitable operation. Process 1200 then ends at step 1216.
  • FIG. 13 shows a flowchart of an illustrative process for performing an operation when a host device is within the personal area network created by a key in accordance with one embodiment of the invention. Process 1300 begins at step 1302. At step 1304, the host device performs an operation. For example, processor 302 (FIG. 3) may direct one or more components of the host device to perform an operation described above in step 1220 of process 1200 (FIG. 12). At step 1306, the host device determines whether the device is still within the personal area network created by the key. For example, transceiver 308 (FIG. 3) or transceiver 402 (FIG. 4) may monitor incoming communications and determine whether it continues to receive communications from the key. As another example, transceiver 308 or transceiver 402 may ping the key and monitor communications for a return communication. If the host device determines that the it is still within the personal area network created by the key, process 1300 returns to step 1304 and continues to perform the operation.
  • If, at step 1306, the host device instead determines that the host device is no longer within the personal area network of the key, process 1300 moves to step 1308. At step 1308, the host device ceases performing the operation. For example, processor 302 may direct the components of the host device to stop operating. At step 1310, the host device returns to its state prior to beginning to perform the operation. For example, processor 302 may direct one or more components of the host device to return to their previous states (e.g., turn back a switch). Process 1300 then ends at step 1312.
  • In some embodiments, process 1300 may terminate after step 1308 and skip step 1310. In some embodiments, step 1310 may be skipped based on the operation that was performed. For example, if the operation was to log a user into the host device, or load a user's preferences or profile, step 1310 may serve to log the user out of the system and/or delete the user's files or other personal information. As another example, if the operation was to turn on a vehicle's engine, step 1310 would serve to turn the vehicle off. As still another example, if the operation was to turn on a light or set-up air conditioning or heating, step 1310 may not be used (e.g., the user is still within his home, but not in near proximity to the light switch).
  • FIG. 14 shows a flow chart of an illustrative process for associating a key with a host device in accordance with one embodiment of the invention. Process 1400 begins at step 1402. In some embodiments, step 1402 may correspond to step 1210 of process 1200 (FIG. 12). At step 1404, the host device prompts the user to associate a key with the host device. For example, the host device, using transceiver 308 (FIG. 3) or transceiver 402 (FIG. 4), may determine that the host device is within the personal area network of a key. Processor 302 (FIG. 3) may direct a display to provide a prompt for the user. The user may associate the key in any suitable manner. For example, the user may select a key displayed on the host device. As another example, the user may enter identification information (e.g., a unique identifier or an IP address) for the key using an user interface.
  • At step 1406, the host device determines whether the user has provided an instruction to associate a key. For example, processor 302 may determine whether the user provided an input using the user interface. If the host device determines that the user has not provided any input, or that the user has instructed the host device not to associate the key, process 1400 moves to step 1408 and ends.
  • If, at step 1406, the host device instead determines that the user has provided an instruction to associate the key with the host device, process 1400 moves to step 1408. At step 1408, the host device identifies an operation to perform when the host device is within the personal area network of the key. For example, processor 302 may automatically select an operation to perform (e.g., turn a light switch on). In some embodiments, the host device may provide a default operation that is selected in the absence of additional instructions from the user. In some embodiments, the user may specify the operation to perform (e.g., using the user interface).
  • At step 1412, the host devices stores the key's identification information. For example, processor 302 may direct storage device 304 (FIG. 3) or memory 306 (FIG. 3) to store the key's identification information. At step 1414, the host device stores the operation identified at step 1410. For example, processor 302 may store the identified operation in storage device 304 or memory 306. The host device may use any suitable data structure to store one or more keys' identification information, associated operations to perform, and other key-related data. For example, a database in which each key is associated with identifier information and one or more operations associated with the key may be stored in storage device 304 or memory 306. Process 1400 then ends at step 1416, which may be step 1218 of process 1200 (FIG. 12).
  • In some embodiments, process 1400 may skip steps 1410 and 1414. For example, in approaches where the key directs the host device to perform an operation, the host device may not associate an operation with the key. Instead, each time the key is paired with the host device, the key transmits specific instructions to the host device. This approach may provide benefits when a key is used to cause a plurality of host devices to operate, as the user need only modify the data transmitted by the key using the key's interface to modify the operation of one or more host devices.
  • The above described embodiments of the present invention are presented for purposes of illustration and not of limitation, and the present invention is limited only by the claims which follow.

Claims (20)

What is claimed is:
1. A method for directing a host device to execute at least one instruction received from an electronic key having limited available processing resources and a limited memory, the method comprising:
at the electronic key:
initiating a communication channel with the host device;
establishing an identity of the host device;
in response to establishing the identity of the host device:
retrieving the at least one instruction from the memory, wherein the at least one instruction corresponds to the identity of the host device; and
sending the at least one instruction to the host device to be executed by the host device upon receipt of the at least one instruction by the host device.
2. The method of claim 1, wherein the communication channel is implemented by way of a personal area network that is established between the electronic key and the host device using a short range communications protocol.
3. The method of claim 2, wherein the short range communications protocol is one of Wi-Fi, Bluetooth, Nordic, high frequency transmission, short-range radio circuitry and infrared.
4. The method of claim 1, wherein the limited memory stores, for each host device of a plurality of host devices:
identification information for the host device, and
at least one instruction associated with the host device.
5. The method of claim 4, wherein the plurality of host devices includes the host device.
6. The method of claim 1, further comprising encrypting the at least one instruction prior to sending the at least one instruction to the host device.
7. The method of claim 1, wherein the at least one instruction is identified in response to a determination that host device is known to the electronic key, and the determination involves comparing identification information provided by the host device with identification information associated with known host devices stored in the limited memory of the electronic key.
8. A method for directing a host device to perform an operation, the method comprising:
at the host device:
in response to a determination that the host device is within a personal area network created by an electronic key:
communicating host identification information to the electronic key;
receiving authentication information from the electronic key;
authenticating the electronic key based on the authentication information;
in response to a determination that the electronic key is authenticated:
identifying one or more operations to perform on the host device, wherein said identifying comprises receiving an instruction from the electronic key that identifies the one or more operations, the instruction is based on the host identification information, and the instruction is retrieved from a memory of the electronic key; and
performing the identified one or more operations on the host device.
9. The method of claim 8, further comprising:
in response to a determination that the host device is no longer within the personal area network:
ceasing to perform the identified one or more operations.
10. The method of claim 8, wherein the authentication information includes key identification information that identifies the electronic key, and authenticating the electronic key is performed in response to a determination that the key identification information is known to the host device.
11. The method of claim 8, wherein the memory of the electronic key stores:
host identification information associated with a plurality of host devices that includes the host device, and
at least one instruction for each host device of the plurality of host devices.
12. The method of claim 8, wherein the authentication information is previously associated with the host device identification information and stored in the memory of the electronic key.
13. The method of claim 8, wherein the identified one or more operations comprises logging in a user associated with the electronic key.
14. The method of claim 8, wherein the identified one or more operations comprises loading a user profile provided by the electronic key.
15. The method of claim 8, wherein the identified one or more operations comprises transferring a user file from the electronic key to the host device.
16. The method of claim 8, wherein the identified one or more operations comprises causing the host device or a component of the host device to move from a first position or state to a second position or state.
17. A system for directing a host device to perform an operation, the system comprising:
an electronic key comprising communications circuitry configured to:
broadcast information associated with the electronic key to notify a host device of a personal area network established within a proximity of the electronic key; and
the host device, wherein the hose device comprises a processor configured to:
communicate host identification information to the electronic key,
receive authentication information from the electronic key,
authenticate the electronic key based on the authentication information, and
in response to a determination that the electronic key is authenticated:
identify one or more operations to perform on the host device,
receive an instruction from the electronic key identifying the one or more operations, wherein the instruction is retrieved from a memory of the electronic key, and the instruction is based on the host identification information, and
perform the identified one or more operations on the host device.
18. The system of claim 17, further comprising:
a plurality of electronic keys that each create a personal area network in which the host device is present, wherein the plurality of electronic keys includes the electronic key, and the host device selects the electronic key in response to determining that the electronic key is broadcasting with a highest signal strength in comparison to the other electronic keys included in the plurality of electronic keys.
19. The system of claim 17, further comprising:
a plurality of electronic keys that each create a personal area network in which the host device is present, wherein the plurality of electronic keys includes the electronic key, and the host device selects the electronic key in response to determining that the host device has previously communicated with the electronic key.
20. The system of claim 17, wherein the memory of the electronic key stores, for each host device of a plurality of host devices that includes the host device:
identification information associated with the host device, and
at least one instruction associated with the host device.
US14/263,914 2007-06-27 2014-04-28 Bluetooth device as security access key Abandoned US20140237229A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US14/263,914 US20140237229A1 (en) 2007-06-27 2014-04-28 Bluetooth device as security access key
US15/652,099 US10362484B2 (en) 2007-06-27 2017-07-17 Bluetooth device as security access key
US16/516,107 US10943001B2 (en) 2007-06-27 2019-07-18 Bluetooth device as security access key
US17/182,132 US20210248222A1 (en) 2007-06-27 2021-02-22 Bluetooth device as security access key

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/823,656 US20090006846A1 (en) 2007-06-27 2007-06-27 Bluetooth device as security access key
US14/263,914 US20140237229A1 (en) 2007-06-27 2014-04-28 Bluetooth device as security access key

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/823,656 Continuation US20090006846A1 (en) 2007-06-27 2007-06-27 Bluetooth device as security access key

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/652,099 Continuation US10362484B2 (en) 2007-06-27 2017-07-17 Bluetooth device as security access key

Publications (1)

Publication Number Publication Date
US20140237229A1 true US20140237229A1 (en) 2014-08-21

Family

ID=40162187

Family Applications (5)

Application Number Title Priority Date Filing Date
US11/823,656 Abandoned US20090006846A1 (en) 2007-06-27 2007-06-27 Bluetooth device as security access key
US14/263,914 Abandoned US20140237229A1 (en) 2007-06-27 2014-04-28 Bluetooth device as security access key
US15/652,099 Active US10362484B2 (en) 2007-06-27 2017-07-17 Bluetooth device as security access key
US16/516,107 Active 2027-07-21 US10943001B2 (en) 2007-06-27 2019-07-18 Bluetooth device as security access key
US17/182,132 Abandoned US20210248222A1 (en) 2007-06-27 2021-02-22 Bluetooth device as security access key

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/823,656 Abandoned US20090006846A1 (en) 2007-06-27 2007-06-27 Bluetooth device as security access key

Family Applications After (3)

Application Number Title Priority Date Filing Date
US15/652,099 Active US10362484B2 (en) 2007-06-27 2017-07-17 Bluetooth device as security access key
US16/516,107 Active 2027-07-21 US10943001B2 (en) 2007-06-27 2019-07-18 Bluetooth device as security access key
US17/182,132 Abandoned US20210248222A1 (en) 2007-06-27 2021-02-22 Bluetooth device as security access key

Country Status (1)

Country Link
US (5) US20090006846A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017223411A1 (en) * 2016-06-23 2017-12-28 Jpmorgan Chase Bank, N.A. Systems and methods for implementing a proximity lock using bluetooth low energy
US9932013B2 (en) 2010-10-20 2018-04-03 Christopher J. Hall Utilization of ubiquitous transmitting devices to provide access control to vehicles and /or other controlled access items/areas
US10362484B2 (en) 2007-06-27 2019-07-23 Apple Inc. Bluetooth device as security access key
US10688963B2 (en) 2017-11-14 2020-06-23 Ford Global Technologies, Llc Vehicle with extended range remote control key fob
US11032254B2 (en) * 2016-09-06 2021-06-08 Red Hat, Inc. Binding data to a network in the presence of an entity
US11401134B2 (en) 2016-04-21 2022-08-02 Otis Elevator Company Elevator calling operation based on wrist wearable smart device

Families Citing this family (80)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2724292C (en) 2003-05-30 2014-09-30 Privaris, Inc. An in-circuit security system and methods for controlling access to and use of sensitive data
US7596439B2 (en) * 2005-01-20 2009-09-29 General Motors Corporation Method for controlling a remote monitoring device
US7657849B2 (en) 2005-12-23 2010-02-02 Apple Inc. Unlocking a device by performing gestures on an unlock image
US20080064442A1 (en) * 2006-09-11 2008-03-13 Utstarcom, :Inc. Identity and payment modem module for handsets
EP2947592B1 (en) 2007-09-24 2021-10-27 Apple Inc. Embedded authentication systems in an electronic device
KR101442169B1 (en) * 2007-11-27 2014-11-03 삼성전자주식회사 A Public Key Infrastructure-based Bluetooth Smart-Key System and Operating Method Thereof
EP2073544A1 (en) * 2007-12-20 2009-06-24 Gemplus System, portable object and terminal for decoding encoded audio and/or video data
US20090177892A1 (en) * 2008-01-09 2009-07-09 Microsoft Corporation Proximity authentication
CN101616408B (en) * 2008-06-23 2012-04-18 华为技术有限公司 Key derivation method, key derivation device and system
US8190129B2 (en) 2009-06-22 2012-05-29 Mourad Ben Ayed Systems for three factor authentication
US8260262B2 (en) 2009-06-22 2012-09-04 Mourad Ben Ayed Systems for three factor authentication challenge
US8112066B2 (en) 2009-06-22 2012-02-07 Mourad Ben Ayed System for NFC authentication based on BLUETOOTH proximity
US8498618B2 (en) 2009-06-22 2013-07-30 Mourad Ben Ayed Systems for intelligent authentication based on proximity
KR101103045B1 (en) 2009-06-30 2012-01-05 주식회사 에스티에프 Security method and apparatus for user terminal
US8775825B2 (en) * 2009-08-17 2014-07-08 Cram Worldwide Llc Digital content management and delivery
US8422420B1 (en) 2009-12-17 2013-04-16 Qualcomm Incorporated Transmit power adaptation for wireless communication systems
CA2789216C (en) * 2010-02-08 2017-02-14 Daniel Friedlaender Method, apparatus, and use of presence detection
US9274594B2 (en) * 2010-05-28 2016-03-01 Microsoft Technology Licensing, Llc Cloud-based personal trait profile data
US8528072B2 (en) 2010-07-23 2013-09-03 Apple Inc. Method, apparatus and system for access mode control of a device
US9633391B2 (en) 2011-03-30 2017-04-25 Cram Worldwide, Llc Secure pre-loaded drive management at kiosk
US8689350B2 (en) 2011-09-24 2014-04-01 Elwha Llc Behavioral fingerprint controlled theft detection and recovery
US9825967B2 (en) 2011-09-24 2017-11-21 Elwha Llc Behavioral fingerprinting via social networking interaction
US8869241B2 (en) 2011-09-24 2014-10-21 Elwha Llc Network acquired behavioral fingerprint for authentication
US9015860B2 (en) 2011-09-24 2015-04-21 Elwha Llc Behavioral fingerprinting via derived personal relation
US8555077B2 (en) 2011-11-23 2013-10-08 Elwha Llc Determining device identity using a behavioral fingerprint
US9621404B2 (en) 2011-09-24 2017-04-11 Elwha Llc Behavioral fingerprinting with social networking
US8713704B2 (en) 2011-09-24 2014-04-29 Elwha Llc Behavioral fingerprint based authentication
US9298900B2 (en) 2011-09-24 2016-03-29 Elwha Llc Behavioral fingerprinting via inferred personal relation
US9083687B2 (en) 2011-09-24 2015-07-14 Elwha Llc Multi-device behavioral fingerprinting
US9729549B2 (en) 2011-09-24 2017-08-08 Elwha Llc Behavioral fingerprinting with adaptive development
US9348985B2 (en) * 2011-11-23 2016-05-24 Elwha Llc Behavioral fingerprint controlled automatic task determination
US9002322B2 (en) 2011-09-29 2015-04-07 Apple Inc. Authentication with secondary approver
GB2495704B (en) * 2011-10-12 2014-03-26 Technology Business Man Ltd ID Authentication
US9131370B2 (en) * 2011-12-29 2015-09-08 Mcafee, Inc. Simplified mobile communication device
US8407759B1 (en) * 2012-02-24 2013-03-26 Monolith Innovations, LLC Device, method, and system for secure mobile data storage
US9547761B2 (en) 2012-04-09 2017-01-17 Mcafee, Inc. Wireless token device
US20130268687A1 (en) 2012-04-09 2013-10-10 Mcafee, Inc. Wireless token device
US9262592B2 (en) * 2012-04-09 2016-02-16 Mcafee, Inc. Wireless storage device
BR112014028774B1 (en) 2012-05-18 2022-05-10 Apple Inc Method, electronic device, computer readable storage medium and information processing apparatus
US8769657B2 (en) 2012-08-10 2014-07-01 Kaspersky Lab Zao System and method for controlling user's access to protected resources using multi-level authentication
US9549323B2 (en) 2012-12-03 2017-01-17 Samsung Electronics Co., Ltd. Method and mobile terminal for controlling screen lock
JP5842800B2 (en) * 2012-12-20 2016-01-13 カシオ計算機株式会社 Control system, information processing apparatus, terminal apparatus, control method, and control program
US9038142B2 (en) 2013-02-05 2015-05-19 Google Inc. Authorization flow initiation using short-term wireless communication
WO2014143776A2 (en) 2013-03-15 2014-09-18 Bodhi Technology Ventures Llc Providing remote interactions with host device using a wireless device
US9225714B2 (en) 2013-06-04 2015-12-29 Gxm Consulting Llc Spatial and temporal verification of users and/or user devices
US20150005908A1 (en) * 2013-06-26 2015-01-01 Kambiz Tom Kalili Method and Apparatus for Automatic Ambient Device Control
US20150172920A1 (en) * 2013-12-16 2015-06-18 Mourad Ben Ayed System for proximity based encryption and decryption
JP2017504107A (en) * 2014-01-03 2017-02-02 マカフィー, インコーポレイテッド A mechanism to conserve resources on wearable devices
US20160203315A1 (en) * 2014-01-21 2016-07-14 Everykey Inc System and method for granting access to secured environments
US9449165B2 (en) 2014-02-06 2016-09-20 Untethered Labs, Inc. System and method for wireless proximity-based access to a computing device
CZ2014126A3 (en) * 2014-03-03 2015-09-16 AVAST Software s.r.o. Method of and assembly for securing control of bank account
US20180289120A1 (en) * 2014-04-02 2018-10-11 Shadecraft, Inc. Intelligent Umbrella and Intelligent Shading Charging System Receiving Messages from a Mobile Computing or Communications Device
US11256294B2 (en) 2014-05-30 2022-02-22 Apple Inc. Continuity of applications across devices
EP3152650B1 (en) * 2014-06-03 2019-09-11 Samsung Electronics Co., Ltd. High-speed application for installation on mobile devices for permitting remote configuration of such mobile devices
US20170289155A1 (en) * 2014-09-11 2017-10-05 Nokia Technologies Oy Communication between devices without establishing a persistent connection
DE102014222427A1 (en) * 2014-11-04 2016-05-04 Bayerische Motoren Werke Aktiengesellschaft Adaptation of an association between a user profile and a radio key
US9923896B2 (en) 2014-11-24 2018-03-20 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Providing access to a restricted resource via a persistent authenticated device network
US10917767B2 (en) * 2016-03-31 2021-02-09 Intel Corporation IOT device selection
US10097948B2 (en) 2016-03-31 2018-10-09 Intel Corporation Point-and-connect bluetooth pairing
DK201670622A1 (en) 2016-06-12 2018-02-12 Apple Inc User interfaces for transactions
US10505909B2 (en) 2016-12-21 2019-12-10 Intel Corporation Dual physical channel secure connection
CN106761130A (en) * 2017-01-11 2017-05-31 上海应用技术大学 A kind of intelligent accelerator control system
US10992795B2 (en) 2017-05-16 2021-04-27 Apple Inc. Methods and interfaces for home media control
US11431836B2 (en) 2017-05-02 2022-08-30 Apple Inc. Methods and interfaces for initiating media playback
GB2562485A (en) * 2017-05-15 2018-11-21 Airbus Operations Ltd Aircraft door control
CN111343060B (en) 2017-05-16 2022-02-11 苹果公司 Method and interface for home media control
US20220279063A1 (en) 2017-05-16 2022-09-01 Apple Inc. Methods and interfaces for home media control
US10647545B2 (en) 2017-06-30 2020-05-12 Otis Elevator Company Dispatching optimization based on presence
US10506069B2 (en) * 2017-08-08 2019-12-10 Microsoft Technology Licensing, Llc Virtual profile for Bluetooth
US11144624B2 (en) 2018-01-22 2021-10-12 Apple Inc. Secure login with authentication based on a visual representation of data
US10490008B2 (en) 2018-02-16 2019-11-26 Carrier Corporation Method for selectively opening a second lock from a first lock using short-range communications (SRC)
WO2020174289A2 (en) 2019-02-27 2020-09-03 Louisiana-Pacific Corporation Fire-resistant manufactured-wood based siding
CN113748408A (en) 2019-05-31 2021-12-03 苹果公司 User interface for audio media controls
US11010121B2 (en) 2019-05-31 2021-05-18 Apple Inc. User interfaces for audio media control
US11184351B2 (en) 2019-09-04 2021-11-23 Bank Of America Corporation Security tool
US11102197B2 (en) 2019-09-04 2021-08-24 Bank Of America Corporation Security tool
US11102198B2 (en) 2019-11-19 2021-08-24 Bank Of America Corporation Portable security tool for user authentication
US11392291B2 (en) 2020-09-25 2022-07-19 Apple Inc. Methods and interfaces for media control with dynamic feedback
US11847378B2 (en) 2021-06-06 2023-12-19 Apple Inc. User interfaces for audio routing
WO2022261628A1 (en) 2021-06-08 2022-12-15 Mewt LLC Wireless kill switch

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5960085A (en) * 1997-04-14 1999-09-28 De La Huerga; Carlos Security badge for automated access control and secure data gathering
US6067477A (en) * 1998-01-15 2000-05-23 Eutech Cybernetics Pte Ltd. Method and apparatus for the creation of personalized supervisory and control data acquisition systems for the management and integration of real-time enterprise-wide applications and systems
US20010021980A1 (en) * 2000-03-08 2001-09-13 Mikael Linden Method for entering a key code in an electronic device, and an electronic device
US20020081972A1 (en) * 2000-11-09 2002-06-27 Koninklijke Philips Electronics N.V. System control through portable devices
US20020082921A1 (en) * 2000-12-27 2002-06-27 Koninklijke Philips Electronics N.V. Credit system and method
US6430358B1 (en) * 1988-12-23 2002-08-06 Gemstar Development Corporation Universal remote including apparatus using compressed codes for video recorder control
US20020130834A1 (en) * 2001-03-16 2002-09-19 Emsquare Research, Inc. System and method for universal control of devices
US20020141586A1 (en) * 2001-03-29 2002-10-03 Aladdin Knowledge Systems Ltd. Authentication employing the bluetooth communication protocol
US20030028811A1 (en) * 2000-07-12 2003-02-06 Walker John David Method, apparatus and system for authenticating fingerprints, and communicating and processing commands and information based on the fingerprint authentication
US20030025604A1 (en) * 2001-07-31 2003-02-06 Freeman Curtis W. System to automatically locally control a device according to preferences of a user entering a local area of the device from a remote area
US20030065918A1 (en) * 2001-04-06 2003-04-03 Willey William Daniel Device authentication in a PKI
US20030220114A1 (en) * 2001-06-05 2003-11-27 Koninklijke Philips Electronics N.V. Consensual data delivery through beacons
US20040111360A1 (en) * 2003-07-14 2004-06-10 David Albanese System and method for personal and business information exchange
US20040137855A1 (en) * 2002-07-31 2004-07-15 Wiley Anthony John Wireless mobile printing
US20040163073A1 (en) * 2002-06-27 2004-08-19 Openpeak Inc. Method, system, and computer program product for automatically managing components within a controlled environment
US6836843B2 (en) * 2001-06-29 2004-12-28 Hewlett-Packard Development Company, L.P. Access control through secure channel using personal identification system
US20050015618A1 (en) * 2003-06-20 2005-01-20 Gary Schneider System and method for establishing authenticated wireless connection between mobile unit and host
US6851054B2 (en) * 2000-08-04 2005-02-01 First Data Corporation Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource
US20050062238A1 (en) * 2003-03-28 2005-03-24 Laird Broadfield Point of care station
US20050076242A1 (en) * 2003-10-01 2005-04-07 Rolf Breuer Wireless access management and control for personal computing devices
US20050204144A1 (en) * 2004-03-10 2005-09-15 Kabushiki Kaisha Toshiba Image processing apparatus and personal information management program
US6996402B2 (en) * 2000-08-29 2006-02-07 Logan James D Rules based methods and apparatus for generating notification messages based on the proximity of electronic devices to one another
US20060128351A1 (en) * 2004-12-15 2006-06-15 Microsoft Corporation Ultra wide band power save
US20060259184A1 (en) * 2003-11-04 2006-11-16 Universal Electronics Inc. System and methods for home appliance identification and control in a networked environment
US7158756B2 (en) * 2003-06-25 2007-01-02 Nokia Corporation Method and system for establishing short-range service sessions
US20070197261A1 (en) * 2004-03-19 2007-08-23 Humbel Roger M Mobile Telephone All In One Remote Key Or Software Regulating Card For Radio Bicycle Locks, Cars, Houses, And Rfid Tags, With Authorisation And Payment Function
US7589616B2 (en) * 2005-01-20 2009-09-15 Avaya Inc. Mobile devices including RFID tag readers
US7636549B2 (en) * 2006-04-21 2009-12-22 Abbott Medical Optics Inc. Automated bonding for wireless devices
US7821386B1 (en) * 2005-10-11 2010-10-26 Avaya Inc. Departure-based reminder systems

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1717682B1 (en) * 1998-01-26 2017-08-16 Apple Inc. Method and apparatus for integrating manual input
US7643817B2 (en) * 2005-05-18 2010-01-05 General Dynamics C4 Systems, Inc. Method and apparatus for rapid secure session establishment on half-duplex AD-hoc group voice cellular network channels
US20070152983A1 (en) * 2005-12-30 2007-07-05 Apple Computer, Inc. Touch pad with symbols based on mode
JP2007267128A (en) * 2006-03-29 2007-10-11 Toshiba Corp Electronic apparatus and communication control method
EP1942468A1 (en) * 2007-01-03 2008-07-09 Actividentity Inc. Configurable digital badge holder
US20090006846A1 (en) 2007-06-27 2009-01-01 Apple Inc. Bluetooth device as security access key

Patent Citations (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6430358B1 (en) * 1988-12-23 2002-08-06 Gemstar Development Corporation Universal remote including apparatus using compressed codes for video recorder control
US5960085A (en) * 1997-04-14 1999-09-28 De La Huerga; Carlos Security badge for automated access control and secure data gathering
US6067477A (en) * 1998-01-15 2000-05-23 Eutech Cybernetics Pte Ltd. Method and apparatus for the creation of personalized supervisory and control data acquisition systems for the management and integration of real-time enterprise-wide applications and systems
US20010021980A1 (en) * 2000-03-08 2001-09-13 Mikael Linden Method for entering a key code in an electronic device, and an electronic device
US20030028811A1 (en) * 2000-07-12 2003-02-06 Walker John David Method, apparatus and system for authenticating fingerprints, and communicating and processing commands and information based on the fingerprint authentication
US6851054B2 (en) * 2000-08-04 2005-02-01 First Data Corporation Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource
US6996402B2 (en) * 2000-08-29 2006-02-07 Logan James D Rules based methods and apparatus for generating notification messages based on the proximity of electronic devices to one another
US20020081972A1 (en) * 2000-11-09 2002-06-27 Koninklijke Philips Electronics N.V. System control through portable devices
US20020082921A1 (en) * 2000-12-27 2002-06-27 Koninklijke Philips Electronics N.V. Credit system and method
US20020130834A1 (en) * 2001-03-16 2002-09-19 Emsquare Research, Inc. System and method for universal control of devices
US20020141586A1 (en) * 2001-03-29 2002-10-03 Aladdin Knowledge Systems Ltd. Authentication employing the bluetooth communication protocol
US20030065918A1 (en) * 2001-04-06 2003-04-03 Willey William Daniel Device authentication in a PKI
US7516325B2 (en) * 2001-04-06 2009-04-07 Certicom Corp. Device authentication in a PKI
US20030220114A1 (en) * 2001-06-05 2003-11-27 Koninklijke Philips Electronics N.V. Consensual data delivery through beacons
US6836843B2 (en) * 2001-06-29 2004-12-28 Hewlett-Packard Development Company, L.P. Access control through secure channel using personal identification system
US20030025604A1 (en) * 2001-07-31 2003-02-06 Freeman Curtis W. System to automatically locally control a device according to preferences of a user entering a local area of the device from a remote area
US20040163073A1 (en) * 2002-06-27 2004-08-19 Openpeak Inc. Method, system, and computer program product for automatically managing components within a controlled environment
US20040137855A1 (en) * 2002-07-31 2004-07-15 Wiley Anthony John Wireless mobile printing
US20050062238A1 (en) * 2003-03-28 2005-03-24 Laird Broadfield Point of care station
US20050015618A1 (en) * 2003-06-20 2005-01-20 Gary Schneider System and method for establishing authenticated wireless connection between mobile unit and host
US7158756B2 (en) * 2003-06-25 2007-01-02 Nokia Corporation Method and system for establishing short-range service sessions
US20040111360A1 (en) * 2003-07-14 2004-06-10 David Albanese System and method for personal and business information exchange
US20050076242A1 (en) * 2003-10-01 2005-04-07 Rolf Breuer Wireless access management and control for personal computing devices
US20060259184A1 (en) * 2003-11-04 2006-11-16 Universal Electronics Inc. System and methods for home appliance identification and control in a networked environment
US20050204144A1 (en) * 2004-03-10 2005-09-15 Kabushiki Kaisha Toshiba Image processing apparatus and personal information management program
US20070197261A1 (en) * 2004-03-19 2007-08-23 Humbel Roger M Mobile Telephone All In One Remote Key Or Software Regulating Card For Radio Bicycle Locks, Cars, Houses, And Rfid Tags, With Authorisation And Payment Function
US20060128351A1 (en) * 2004-12-15 2006-06-15 Microsoft Corporation Ultra wide band power save
US7589616B2 (en) * 2005-01-20 2009-09-15 Avaya Inc. Mobile devices including RFID tag readers
US7821386B1 (en) * 2005-10-11 2010-10-26 Avaya Inc. Departure-based reminder systems
US7636549B2 (en) * 2006-04-21 2009-12-22 Abbott Medical Optics Inc. Automated bonding for wireless devices

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10362484B2 (en) 2007-06-27 2019-07-23 Apple Inc. Bluetooth device as security access key
US10943001B2 (en) 2007-06-27 2021-03-09 Apple Inc. Bluetooth device as security access key
US9932013B2 (en) 2010-10-20 2018-04-03 Christopher J. Hall Utilization of ubiquitous transmitting devices to provide access control to vehicles and /or other controlled access items/areas
US11401134B2 (en) 2016-04-21 2022-08-02 Otis Elevator Company Elevator calling operation based on wrist wearable smart device
WO2017223411A1 (en) * 2016-06-23 2017-12-28 Jpmorgan Chase Bank, N.A. Systems and methods for implementing a proximity lock using bluetooth low energy
US10135798B2 (en) 2016-06-23 2018-11-20 Jpmorgan Chase Bank, N.A. Systems and methods for implementing a proximity lock using bluetooth low energy
US11032254B2 (en) * 2016-09-06 2021-06-08 Red Hat, Inc. Binding data to a network in the presence of an entity
US20210281550A1 (en) * 2016-09-06 2021-09-09 Red Hat, Inc. Binding data to a network in the presence of an entity
US10688963B2 (en) 2017-11-14 2020-06-23 Ford Global Technologies, Llc Vehicle with extended range remote control key fob

Also Published As

Publication number Publication date
US20090006846A1 (en) 2009-01-01
US20210248222A1 (en) 2021-08-12
US20180041902A1 (en) 2018-02-08
US10362484B2 (en) 2019-07-23
US10943001B2 (en) 2021-03-09
US20200015086A1 (en) 2020-01-09

Similar Documents

Publication Publication Date Title
US10943001B2 (en) Bluetooth device as security access key
US11137872B2 (en) Remote control of electronic devices via mobile device
US8056117B2 (en) Network and domain-creating method thereof
AU2011305067B2 (en) Remote control and remote control systems
US20170195866A1 (en) Iot device environment detection, identification and caching
US20120315848A1 (en) Processing near field communications between active/passive devices and a control system
US20150281240A1 (en) Iot device environment detection, identification and caching
US20100097178A1 (en) Vehicle biometric systems and methods
CN110249608B (en) Device pairing
CN104871482A (en) Device and method for reproducing content in home network system
WO2004004229A2 (en) Bluetooth remote access device
CN101719291A (en) Method and system for realizing door control by using domestic information terminal equipment
CN204303150U (en) A kind of control system of wireless remote control
CN105207994A (en) Account number binding method and device
US10178182B2 (en) Signal cloning
TW202027462A (en) Home device control system and method thereof
CN105763734A (en) Emergency communication method, device, and apparatus
JP6810638B2 (en) Relay device and electric lock
KR101237830B1 (en) The Method And Mobile Phone for Auto Change Of Control Mode in Home Network
KR101788668B1 (en) System and method for smart key materialization using mobile communication terminal
EP1732050A1 (en) Apparatus control system
KR100547870B1 (en) Wireless remote control system and its control method
JP6892411B2 (en) Shared system and connection method switching method
JP2016010149A (en) Home individualization condition control system and method
KR20180020770A (en) Door lock system and method for controling door lock

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION