US20050026595A1 - Proximity based security protocol for processor-based systems - Google Patents
Proximity based security protocol for processor-based systems Download PDFInfo
- Publication number
- US20050026595A1 US20050026595A1 US10/631,126 US63112603A US2005026595A1 US 20050026595 A1 US20050026595 A1 US 20050026595A1 US 63112603 A US63112603 A US 63112603A US 2005026595 A1 US2005026595 A1 US 2005026595A1
- Authority
- US
- United States
- Prior art keywords
- processor
- wireless
- based system
- access
- mobile device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004891 communication Methods 0.000 claims description 11
- 230000001413 cellular effect Effects 0.000 claims description 3
- 238000000034 method Methods 0.000 claims 7
- 238000012544 monitoring process Methods 0.000 claims 1
- 229910003460 diamond Inorganic materials 0.000 description 4
- 239000010432 diamond Substances 0.000 description 4
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
- H04W12/64—Location-dependent; Proximity-dependent using geofenced areas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- This invention relates generally to processor-based systems.
- Processor-based systems may be wired or wireless, portable and less portable. Wired devices may be connected by physical wires to one another and to electrical connections. A portable device may be coupled by wireless signals to other devices and may use a battery as a source of power.
- Portable processor-based systems include, for example, laptop computers, cellular telephones, handheld devices, and personal digital assistants.
- Processor-based systems are subject to two security concerns.
- the first concern relates to the security of the data actually stored on the processor-based system.
- the second security concern relates to the potential theft of the processor-based system. Particularly with portable processor-based systems, theft is easy.
- FIG. 1 is a schematic depiction of one embodiment of the present invention
- FIG. 2 is a flow chart of a first embodiment of software for securing a processor-based system
- FIG. 3 is a flow chart for a second embodiment for securing a processor-based system
- FIG. 4 is a flow chart for a remote or handheld device in accordance with one embodiment of the present invention.
- FIG. 5 is a schematic depiction of a processor-based system to be secured in accordance with one embodiment of the present invention.
- FIG. 6 is a schematic depiction of a remote or handheld device in accordance with one embodiment of the present invention.
- a processor-based device 12 may be associated with a handheld or portable device 14 .
- the processor-based system 12 may be a portable, battery powered device in accordance with one embodiment of the present invention. It may also be capable of wireless communication over one or more wireless protocols.
- the processor-based system 12 may communicate over a first wireless protocol 15 with a device 14 in the form of a cellular telephone and over a second wireless protocol 13 with an access point 16 .
- the wireless protocol 15 may be a short range wireless protocol having a range, for example, on the order of about ten feet.
- One such protocol having such a range is described as the Bluetooth Specification V.1.OB (2003).
- the range of the protocol 15 is indicated by the arrow A. So long as the handheld device 14 is within the distance A of the processor-based system 12 , wireless communication is possible. If the device 14 strays into the region B, wireless communication may no longer be established.
- a network 10 may be formed of the devices 12 , 14 , and 16 , as well as other devices.
- the range of the wireless network 10 may be limited by the range of the various wireless protocols 13 and 15 that may be utilized.
- the processor-based device 12 may be a laptop computer in one embodiment of the present invention. Laptop computers are particularly prone to being stolen. However, the processor-based device 12 may be any processor-based device.
- the user may carry the handheld device 14 on his or her person, for example in the user's pocket or it may be held in the user's hand.
- the handheld device 14 is closely associated with the location of a user. That same user may own a processor-based system 12 .
- wireless communication with the processor-based system 12 is discontinued. This may be used as an indication that someone who is attempting to use the processor-based system 12 is unauthorized. Since it can be determined that the authorized user is not proximate to the processor-based system 12 , the system 12 may determine that it is not appropriate to allow the person attempting to use the processor-based system to have access. This may provide data security, preventing the unauthorized user from accessing the computer. It may also provide physical security since there is no incentive to steal the processor-based system 12 if it can never be used.
- the system 12 determines whether the user is proximate by attempting to establish wireless communications with the handheld device 14 . If such communications are not possible, the processor-based system 12 implements a security protocol that may include denying access, initiating a phone call to the user or others, initiating an alarm, or simply turning the processor-based system 12 permanently off.
- a security protocol may include denying access, initiating a phone call to the user or others, initiating an alarm, or simply turning the processor-based system 12 permanently off.
- the access control software 20 a may be resident on the processor-based system 12 . Initially, it determines whether there is a request for access as indicated at diamond 22 . If so, a proximity check is implemented as determined in diamond 24 . In one embodiment, the proximity check may simply determine whether communication is possible with the handheld device 14 . In one embodiment of the present invention, various wireless protocols, such as the Bluetooth protocol, may automatically provide an indication of sufficiently proximate devices and their identifiers. If no such communication can be established with the handheld device 14 normally carried by the user's person, a secure system command 28 may be issued. The secure system command 28 may prevent access, may activate an alarm, may automatically initiate a telephone call to an appropriate entity to provide security, or any of a variety of other actions. If the proximity check is successful, access may be allowed as indicated in block 26 .
- various wireless protocols such as the Bluetooth protocol
- the access control software may also initially receive a request for access as indicated in diamond 22 .
- the handheld device 14 may be automatically contacted as indicated in block 32 . Only if the authorization code is received from the handheld device 14 , as determined in diamond 34 , is access allowed, as indicated in block 26 . Otherwise the system 12 is secured as indicated in block 28 . In some cases, requiring the access protocol may be a more reliable way of ensuring that access is not permitted when the user is not proximate to the access processor-based system 12 .
- the handheld device 14 may include the software 22 shown in FIG. 4 .
- an authentication protocol is implemented. If the access contact is the remote processor-based system 12 , security credentials may be provided as indicated in block 32 .
- the handheld device 14 is outside the wireless range of the processor-based system 12 , the security credentials will never be received and, therefore, access will not be permitted.
- a distance measurement solution may be used.
- a signal strength indication (SSI) may be used to determine whether the user is farther from the system 12 than a predetermined distance.
- the processor 40 is coupled by a bus 42 to an input/output device 46 .
- a wireless interface 44 may implement one or more appropriate wireless protocols, including a short range wireless protocol, such as the Bluetooth protocol.
- the wireless interface may be coupled to an antenna 50 such as a dipole antenna.
- the bus 42 may also be coupled to a storage device 45 and in one embodiment of the present invention may be a hard disk drive and in another embodiment of the present invention may be a semiconductor memory.
- the storage 45 may store the access control software 20 a and 20 b.
- the handheld device 14 may have the exemplary architecture illustrated.
- the architecture illustrated is only one example of a potential architecture for implementing the handheld device 14 .
- a processor 40 is coupled through a bus 42 to the wireless interface 44 and the input/output device 46 .
- the antenna 50 is coupled to the interface 44 .
- the storage device 45 may store the software 20 c in one embodiment of the present invention.
- the storage device 45 may be a semiconductor memory such as a flash memory. However, it can also be any other type of non-volatile storage including a hard disk drive.
- any suitable authentication protocol on the processor-based device 12 and the handheld device 14 may be utilized for exchanging credentials.
- an 802.1X supplicant on a handheld device 14 and an 802.1X authenticator on the processor-based system 12 may be used to exchange credentials using the Bluetooth personal area network (PAN) profile.
- the 802.1X protocol may be the IEEE 802.11 protocols currently specified or their successors. See IEEE 802.11 (1999) specification available from IEEE, New York, N.Y. (ISBN 0-7381-2315-3; Product No.: SH94842-TBR).
- Security credentials may be stored on the handheld device 14 and a subscriber information module (SIM) 52 to perform the 802.1X authentication of user and processor-based system 12 to the network 10 .
- SIM subscriber information module
- a single SIM 52 in the user's handheld device 14 serves multiple functions, including user authentication to the handheld device by a personal identification number protected access, user and handheld device authentication to the processor-based system 12 , user and processor-based system 12 authentication to a network 10 , for example via 802.1X, and verification of user possession of the processor-based system 12 .
- An 802.1X supplicant on the processor-based system 12 may then use these credentials to respond to an 802.1X authentication protocol from an 802.11 access point 16 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A security protocol may be implemented on a processor-based system by providing a wireless signal to a handheld device normally carried by the user. If a response is not received, it may be determined that the user is not sufficiently proximate to the device being accessed and that, therefore, the person accessing the device is not authorized. An appropriate security protocol may be implemented as a result.
Description
- This invention relates generally to processor-based systems.
- Processor-based systems may be wired or wireless, portable and less portable. Wired devices may be connected by physical wires to one another and to electrical connections. A portable device may be coupled by wireless signals to other devices and may use a battery as a source of power. Portable processor-based systems include, for example, laptop computers, cellular telephones, handheld devices, and personal digital assistants.
- Processor-based systems are subject to two security concerns. The first concern relates to the security of the data actually stored on the processor-based system. The second security concern relates to the potential theft of the processor-based system. Particularly with portable processor-based systems, theft is easy.
- Thus, there is a need for better ways to provide security for processor-based systems.
-
FIG. 1 is a schematic depiction of one embodiment of the present invention; -
FIG. 2 is a flow chart of a first embodiment of software for securing a processor-based system; -
FIG. 3 is a flow chart for a second embodiment for securing a processor-based system; -
FIG. 4 is a flow chart for a remote or handheld device in accordance with one embodiment of the present invention; -
FIG. 5 is a schematic depiction of a processor-based system to be secured in accordance with one embodiment of the present invention; and -
FIG. 6 is a schematic depiction of a remote or handheld device in accordance with one embodiment of the present invention. - Referring to
FIG. 1 , a processor-baseddevice 12 may be associated with a handheld orportable device 14. The processor-basedsystem 12 may be a portable, battery powered device in accordance with one embodiment of the present invention. It may also be capable of wireless communication over one or more wireless protocols. For example, the processor-basedsystem 12 may communicate over a firstwireless protocol 15 with adevice 14 in the form of a cellular telephone and over a secondwireless protocol 13 with anaccess point 16. - The
wireless protocol 15 may be a short range wireless protocol having a range, for example, on the order of about ten feet. One such protocol having such a range is described as the Bluetooth Specification V.1.OB (2003). The range of theprotocol 15 is indicated by the arrow A. So long as thehandheld device 14 is within the distance A of the processor-basedsystem 12, wireless communication is possible. If thedevice 14 strays into the region B, wireless communication may no longer be established. - Thus, a
network 10 may be formed of the 12, 14, and 16, as well as other devices. The range of thedevices wireless network 10 may be limited by the range of the various 13 and 15 that may be utilized.wireless protocols - The processor-based
device 12 may be a laptop computer in one embodiment of the present invention. Laptop computers are particularly prone to being stolen. However, the processor-baseddevice 12 may be any processor-based device. - In one embodiment of the present invention, the user may carry the
handheld device 14 on his or her person, for example in the user's pocket or it may be held in the user's hand. Thus, thehandheld device 14 is closely associated with the location of a user. That same user may own a processor-basedsystem 12. When the user strays beyond the distance A, wireless communication with the processor-basedsystem 12 is discontinued. This may be used as an indication that someone who is attempting to use the processor-basedsystem 12 is unauthorized. Since it can be determined that the authorized user is not proximate to the processor-basedsystem 12, thesystem 12 may determine that it is not appropriate to allow the person attempting to use the processor-based system to have access. This may provide data security, preventing the unauthorized user from accessing the computer. It may also provide physical security since there is no incentive to steal the processor-basedsystem 12 if it can never be used. - Thus, in one embodiment of the present invention, the
system 12 determines whether the user is proximate by attempting to establish wireless communications with thehandheld device 14. If such communications are not possible, the processor-basedsystem 12 implements a security protocol that may include denying access, initiating a phone call to the user or others, initiating an alarm, or simply turning the processor-basedsystem 12 permanently off. - Referring the
FIG. 2 , in accordance with one embodiment of the present invention, theaccess control software 20 a may be resident on the processor-basedsystem 12. Initially, it determines whether there is a request for access as indicated atdiamond 22. If so, a proximity check is implemented as determined indiamond 24. In one embodiment, the proximity check may simply determine whether communication is possible with thehandheld device 14. In one embodiment of the present invention, various wireless protocols, such as the Bluetooth protocol, may automatically provide an indication of sufficiently proximate devices and their identifiers. If no such communication can be established with thehandheld device 14 normally carried by the user's person, asecure system command 28 may be issued. Thesecure system command 28 may prevent access, may activate an alarm, may automatically initiate a telephone call to an appropriate entity to provide security, or any of a variety of other actions. If the proximity check is successful, access may be allowed as indicated inblock 26. - In accordance with another embodiment of the present invention, shown in
FIG. 3 , the access control software may also initially receive a request for access as indicated indiamond 22. Upon receiving a request for access, thehandheld device 14 may be automatically contacted as indicated inblock 32. Only if the authorization code is received from thehandheld device 14, as determined indiamond 34, is access allowed, as indicated inblock 26. Otherwise thesystem 12 is secured as indicated inblock 28. In some cases, requiring the access protocol may be a more reliable way of ensuring that access is not permitted when the user is not proximate to the access processor-basedsystem 12. - In accordance with one embodiment of the present invention, the
handheld device 14 may include thesoftware 22 shown inFIG. 4 . When a mobile access contact is implemented, as indicated atblock 30, an authentication protocol is implemented. If the access contact is the remote processor-basedsystem 12, security credentials may be provided as indicated inblock 32. Of course, if thehandheld device 14 is outside the wireless range of the processor-basedsystem 12, the security credentials will never be received and, therefore, access will not be permitted. - In another embodiment, a distance measurement solution may be used. For example, a signal strength indication (SSI) may be used to determine whether the user is farther from the
system 12 than a predetermined distance. - Referring to
FIG. 5 , one exemplary architecture for the processor-basedsystem 12 is illustrated. Of course, any other architecture may be utilized as well. In the illustrated architecture, theprocessor 40 is coupled by abus 42 to an input/output device 46. Awireless interface 44 may implement one or more appropriate wireless protocols, including a short range wireless protocol, such as the Bluetooth protocol. The wireless interface may be coupled to anantenna 50 such as a dipole antenna. - The
bus 42 may also be coupled to astorage device 45 and in one embodiment of the present invention may be a hard disk drive and in another embodiment of the present invention may be a semiconductor memory. Thestorage 45 may store the 20 a and 20 b.access control software - Referring to
FIG. 6 , thehandheld device 14 may have the exemplary architecture illustrated. As mentioned above, the architecture illustrated is only one example of a potential architecture for implementing thehandheld device 14. In this embodiment, aprocessor 40 is coupled through abus 42 to thewireless interface 44 and the input/output device 46. Theantenna 50 is coupled to theinterface 44. Thestorage device 45 may store thesoftware 20 c in one embodiment of the present invention. Thestorage device 45 may be a semiconductor memory such as a flash memory. However, it can also be any other type of non-volatile storage including a hard disk drive. - Any suitable authentication protocol on the processor-based
device 12 and thehandheld device 14 may be utilized for exchanging credentials. As an example, an 802.1X supplicant on ahandheld device 14 and an 802.1X authenticator on the processor-basedsystem 12 may be used to exchange credentials using the Bluetooth personal area network (PAN) profile. For example, the 802.1X protocol may be the IEEE 802.11 protocols currently specified or their successors. See IEEE 802.11 (1999) specification available from IEEE, New York, N.Y. (ISBN 0-7381-2315-3; Product No.: SH94842-TBR). Security credentials may be stored on thehandheld device 14 and a subscriber information module (SIM) 52 to perform the 802.1X authentication of user and processor-basedsystem 12 to thenetwork 10. In this way, asingle SIM 52 in the user'shandheld device 14 serves multiple functions, including user authentication to the handheld device by a personal identification number protected access, user and handheld device authentication to the processor-basedsystem 12, user and processor-basedsystem 12 authentication to anetwork 10, for example via 802.1X, and verification of user possession of the processor-basedsystem 12. An 802.1X supplicant on the processor-basedsystem 12 may then use these credentials to respond to an 802.1X authentication protocol from an 802.11access point 16. - While the present invention has been described with respect to a limited number of embodiments, those skilled in the art will appreciate numerous modifications and variations therefrom. It is intended that the appended claims cover all such modifications and variations as fall within the true spirit and scope of this-present invention.
Claims (15)
1. A method comprising:
receiving a wireless signal in a handheld device in response to a request for access to a processor-based system; and
accessing credential information in a subscriber information module; and
transmitting information related to said credential information to said processor-based system to enable access to said system.
2. The method of claim 1 including receiving a wireless signal pursuant to a protocol with a relatively short range to generate said wireless signal.
3. The method of claim 2 including receiving a wireless signal pursuant to a wireless protocol that has a range of approximately 10 feet.
4. A processor-based system comprising:
a wireless interface;
a subscriber information module; and
a device, coupled to said module, to receive a wireless request to access a remote processor-based system, to obtain credential information from said module, and to provide said credential information to said remote processor-based system to enable use of said remote processor-based system.
5. The system of claim 4 wherein said wireless interface is a short range wireless interface.
6. The system of claim 5 wherein said short range wireless interface has a range of approximately 10 feet.
7. The system of claim 5 wherein said wireless interface includes a dipole antenna.
8. The system of claim 4 wherein said system is a cellular telephone.
9. An article comprising a medium storing instructions that, if executed, enable a processor-based system to:
receive a wireless signal in a handheld device in response to a request for access to a processor-based system; and
access credential information in a subscriber information module; and
transmit information related to said credential information to said processor-based system to enable access to said system.
10. The article of claim 9 further storing instructions that, if executed, enable the processor-based system to use a wireless protocol with a relatively short range to receive said wireless signal.
11. The article of claim 9 further storing instructions that, if executed, enable the processor-based system to use a wireless protocol that has a range of approximately 10 feet.
12. A method comprising:
establishing a wireless communication link between a mobile device and a computer system when within a communication range;
authenticating a user of the mobile device as an authorized user of the computer system using credential information stored in a portable identification module included in the mobile device, the credential information transmitted from the mobile device using the wireless link; and
monitoring the wireless link between the mobile device and the computer system such that when the link is interrupted an audible alarm on the mobile device is generated.
13. The method of claim 12 wherein the portable identification module is a subscriber information module.
14. The method of claim 12 wherein the communication link is a Bluetooth link.
15. The method of claim 12 wherein the mobile device is a mobile telephone.
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/631,126 US20050026595A1 (en) | 2003-07-31 | 2003-07-31 | Proximity based security protocol for processor-based systems |
| US11/481,319 US8320881B2 (en) | 2003-07-31 | 2006-07-05 | Proximity based security protocol for processor-based systems |
| US13/683,309 US8521134B2 (en) | 2003-07-31 | 2012-11-21 | Proximity based security protocol for processor-based systems |
| US14/010,795 US8750833B2 (en) | 2003-07-31 | 2013-08-27 | Proximity based security protocol for processor-based systems |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/631,126 US20050026595A1 (en) | 2003-07-31 | 2003-07-31 | Proximity based security protocol for processor-based systems |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/481,319 Division US8320881B2 (en) | 2003-07-31 | 2006-07-05 | Proximity based security protocol for processor-based systems |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20050026595A1 true US20050026595A1 (en) | 2005-02-03 |
Family
ID=34104010
Family Applications (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/631,126 Abandoned US20050026595A1 (en) | 2003-07-31 | 2003-07-31 | Proximity based security protocol for processor-based systems |
| US11/481,319 Expired - Fee Related US8320881B2 (en) | 2003-07-31 | 2006-07-05 | Proximity based security protocol for processor-based systems |
| US13/683,309 Expired - Fee Related US8521134B2 (en) | 2003-07-31 | 2012-11-21 | Proximity based security protocol for processor-based systems |
| US14/010,795 Expired - Fee Related US8750833B2 (en) | 2003-07-31 | 2013-08-27 | Proximity based security protocol for processor-based systems |
Family Applications After (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/481,319 Expired - Fee Related US8320881B2 (en) | 2003-07-31 | 2006-07-05 | Proximity based security protocol for processor-based systems |
| US13/683,309 Expired - Fee Related US8521134B2 (en) | 2003-07-31 | 2012-11-21 | Proximity based security protocol for processor-based systems |
| US14/010,795 Expired - Fee Related US8750833B2 (en) | 2003-07-31 | 2013-08-27 | Proximity based security protocol for processor-based systems |
Country Status (1)
| Country | Link |
|---|---|
| US (4) | US20050026595A1 (en) |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050239505A1 (en) * | 2004-04-08 | 2005-10-27 | Alcatel | Wireless telecommunication terminal with at least two different communication interfaces and method for operating the same |
| US20090172809A1 (en) * | 2007-12-31 | 2009-07-02 | Po Yuan | Method And System For Creating And Accessing A Secure Storage Area In A Non-Volatile Memory Card |
| US20100050241A1 (en) * | 2008-08-20 | 2010-02-25 | Mei Yan | Accessing memory device content using a network |
| US20100048169A1 (en) * | 2008-08-20 | 2010-02-25 | Mei Yan | Memory device upgrade |
| US20130340073A1 (en) * | 2012-06-14 | 2013-12-19 | Shinoj Bhaskaran | Identification to Access Portable Computing Device |
| US20140051389A1 (en) * | 2004-07-15 | 2014-02-20 | Avaya Inc. | Proximity-Based Authorization |
| US20140171027A1 (en) * | 2012-12-19 | 2014-06-19 | Telefonaktiebolaget L M Ericsson (Publ) | Device Authentication by Tagging |
| US9986414B1 (en) * | 2006-09-29 | 2018-05-29 | Sprint Communications Company L.P. | Dynamic CSCF assignment |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050026595A1 (en) * | 2003-07-31 | 2005-02-03 | Huckins Jeffrey L. | Proximity based security protocol for processor-based systems |
| GB2490310A (en) | 2011-04-18 | 2012-10-31 | Nearfield Comm Ltd | Method and system for controlling access to a service. |
| US8806524B1 (en) * | 2013-01-29 | 2014-08-12 | Telefonaktiebolaget L M Ericsson (Publ) | Restricting use of a direct-to-home digital broadcast satellite signal |
| EP3050037B1 (en) | 2013-09-29 | 2018-11-14 | InVue Security Products, Inc. | Systems and methods for protecting retail display merchandise from theft |
| US9380426B2 (en) | 2014-05-08 | 2016-06-28 | At&T Intellectual Property I, L.P. | Methods, devices, and computer readable storage devices for tracking the locations of mobile target communication devices with respect to the location of a host communication device over time |
| US9426657B2 (en) | 2014-08-15 | 2016-08-23 | Facebook, Inc. | Bluetooth transmission security pattern |
| US10094907B2 (en) | 2014-08-15 | 2018-10-09 | Facebook, Inc. | Bluetooth crowd-sourced triangualtion |
| US9603013B2 (en) * | 2014-08-15 | 2017-03-21 | Facebook, Inc. | Bluetooth beacon protocol |
| US9667352B2 (en) | 2015-01-09 | 2017-05-30 | Facebook, Inc. | Ultrasonic communications for wireless beacons |
| WO2016133975A1 (en) | 2015-02-18 | 2016-08-25 | Invue Security Products Inc. | System and method for calibrating a wireless security range |
| JP2016178385A (en) * | 2015-03-18 | 2016-10-06 | キヤノン株式会社 | Communication system, information processing apparatus, communication control method, and program |
| US10482739B2 (en) | 2015-06-25 | 2019-11-19 | Invue Security Products Inc. | Wireless merchandise security system |
| US10863562B2 (en) * | 2015-08-20 | 2020-12-08 | Hewlett-Packard Development Company, L.P. | Peripheral device pairing |
| US20180241577A1 (en) * | 2017-02-21 | 2018-08-23 | Digital Kerosene Inc. | Proximity-Based Security |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6230002B1 (en) * | 1997-11-19 | 2001-05-08 | Telefonaktiebolaget L M Ericsson (Publ) | Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network |
| US20050009469A1 (en) * | 2002-12-20 | 2005-01-13 | Sakari Kotola | Client software download in bluetooth device bonding |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2931276B2 (en) * | 1997-09-04 | 1999-08-09 | 豊喜 笹倉 | Equipment use restriction device |
| US6871063B1 (en) * | 2000-06-30 | 2005-03-22 | Intel Corporation | Method and apparatus for controlling access to a computer system |
| EP1178445A1 (en) * | 2000-07-31 | 2002-02-06 | Alcatel | Method for performing short-range wireless transactions between an hybrid wireless terminal and a service terminal |
| US20020113705A1 (en) * | 2000-08-17 | 2002-08-22 | Terence Wallace | Device and method for preventing the theft or loss of a personal item |
| EP1417659A1 (en) * | 2001-07-13 | 2004-05-12 | Juan Carlos Cordoba | An alarm system for a portable device |
| US6983312B1 (en) * | 2001-07-16 | 2006-01-03 | At&T Corp. | Method for using scheduled hyperlinks to record multimedia content |
| WO2003009620A1 (en) * | 2001-07-18 | 2003-01-30 | Wizard Mobile Solutions Limited | Data security device |
| US7016334B2 (en) * | 2001-08-17 | 2006-03-21 | Ixi Mobile ( Israel) Ltd. | Device, system, method and computer readable medium for fast recovery of IP address change |
| US6658091B1 (en) * | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
| US20050026595A1 (en) * | 2003-07-31 | 2005-02-03 | Huckins Jeffrey L. | Proximity based security protocol for processor-based systems |
| US8442485B2 (en) * | 2006-06-19 | 2013-05-14 | Cisco Technology, Inc. | System and method for measuring and reporting service usage |
| EP2664187A1 (en) * | 2011-01-14 | 2013-11-20 | Interdigital Patent Holdings, Inc. | Local internet protocol access connection handling during circuit switched fallback and handover |
-
2003
- 2003-07-31 US US10/631,126 patent/US20050026595A1/en not_active Abandoned
-
2006
- 2006-07-05 US US11/481,319 patent/US8320881B2/en not_active Expired - Fee Related
-
2012
- 2012-11-21 US US13/683,309 patent/US8521134B2/en not_active Expired - Fee Related
-
2013
- 2013-08-27 US US14/010,795 patent/US8750833B2/en not_active Expired - Fee Related
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6230002B1 (en) * | 1997-11-19 | 2001-05-08 | Telefonaktiebolaget L M Ericsson (Publ) | Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network |
| US20050009469A1 (en) * | 2002-12-20 | 2005-01-13 | Sakari Kotola | Client software download in bluetooth device bonding |
Cited By (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050239505A1 (en) * | 2004-04-08 | 2005-10-27 | Alcatel | Wireless telecommunication terminal with at least two different communication interfaces and method for operating the same |
| US20140051389A1 (en) * | 2004-07-15 | 2014-02-20 | Avaya Inc. | Proximity-Based Authorization |
| US9031534B2 (en) * | 2004-07-15 | 2015-05-12 | Avaya Inc. | Proximity-based authorization |
| US9986414B1 (en) * | 2006-09-29 | 2018-05-29 | Sprint Communications Company L.P. | Dynamic CSCF assignment |
| US20090172809A1 (en) * | 2007-12-31 | 2009-07-02 | Po Yuan | Method And System For Creating And Accessing A Secure Storage Area In A Non-Volatile Memory Card |
| US8146153B2 (en) | 2007-12-31 | 2012-03-27 | Sandisk Technologies Inc. | Method and system for creating and accessing a secure storage area in a non-volatile memory card |
| US8997214B2 (en) | 2007-12-31 | 2015-03-31 | Sandisk Technologies Inc. | Method and system for creating and accessing a secure storage area in a non-volatile memory card |
| USRE46023E1 (en) | 2008-08-20 | 2016-05-31 | Sandisk Technologies Inc. | Memory device upgrade |
| US8984645B2 (en) | 2008-08-20 | 2015-03-17 | Sandisk Technologies Inc. | Accessing memory device content using a network |
| US8428649B2 (en) | 2008-08-20 | 2013-04-23 | Sandisk Technologies Inc. | Memory device upgrade |
| US20100048169A1 (en) * | 2008-08-20 | 2010-02-25 | Mei Yan | Memory device upgrade |
| US20100050241A1 (en) * | 2008-08-20 | 2010-02-25 | Mei Yan | Accessing memory device content using a network |
| US20130340073A1 (en) * | 2012-06-14 | 2013-12-19 | Shinoj Bhaskaran | Identification to Access Portable Computing Device |
| US9542547B2 (en) * | 2012-06-14 | 2017-01-10 | Hewlett-Packard Development Company, L.P. | Identification to access portable computing device |
| US20140171027A1 (en) * | 2012-12-19 | 2014-06-19 | Telefonaktiebolaget L M Ericsson (Publ) | Device Authentication by Tagging |
| US9992673B2 (en) * | 2012-12-19 | 2018-06-05 | Telefonaktiebolaget Lm Ericsson (Publ) | Device authentication by tagging |
Also Published As
| Publication number | Publication date |
|---|---|
| US20130344846A1 (en) | 2013-12-26 |
| US8750833B2 (en) | 2014-06-10 |
| US20130078955A1 (en) | 2013-03-28 |
| US20060252411A1 (en) | 2006-11-09 |
| US8521134B2 (en) | 2013-08-27 |
| US8320881B2 (en) | 2012-11-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8750833B2 (en) | Proximity based security protocol for processor-based systems | |
| US7561691B2 (en) | System and method for providing secured access to mobile devices | |
| US8112066B2 (en) | System for NFC authentication based on BLUETOOTH proximity | |
| US7322043B2 (en) | Allowing an electronic device accessing a service to be authenticated | |
| US8190129B2 (en) | Systems for three factor authentication | |
| US8045961B2 (en) | Systems for wireless authentication based on bluetooth proximity | |
| US8260262B2 (en) | Systems for three factor authentication challenge | |
| JP5112700B2 (en) | A system for identifying individuals in electronic transactions | |
| EP3063921B1 (en) | Authentication for application | |
| US8880036B2 (en) | Retrieving data wirelessly from a mobile device | |
| US8498618B2 (en) | Systems for intelligent authentication based on proximity | |
| US8750797B2 (en) | Proximity access and alarm apparatus | |
| JP4524306B2 (en) | Authorization method | |
| CN101422058B (en) | Method of securing access to a proximity communication module in a mobile terminal | |
| US9699594B2 (en) | Mobile user device and method of communication over a wireless medium | |
| US20110169654A1 (en) | Multi Function Bluetooth Apparatus | |
| JP2004220402A (en) | E-commerce authentication system and method | |
| CN101315710A (en) | Mobile-based identification in security and asset management systems | |
| JP5260908B2 (en) | Control device, communication device, control system, control method, and control program | |
| WO2002071786A1 (en) | Mobile communication system and apparatus constituting the same | |
| JPWO2005062219A1 (en) | Personal information storage device and portable terminal | |
| KR101659294B1 (en) | An apparatus for secure usb memory using beacon signals and the operating method thereof | |
| EP1675076A1 (en) | System and related kit for personal authentication and managing data in integrated networks | |
| JP2005117430A (en) | Unauthorized use preventing method and portable terminal when lost | |
| JP2005301454A (en) | User identification system and charger/radio ic chip reader |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: INTEL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HUCKINS, JEFFREY L.;REEL/FRAME:014365/0156 Effective date: 20030729 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |