Abstract: This disclosure relates to systems and methods for accessing a device using a paired device in its proximity. In one embodiment, a resource sharing method is disclosed, comprising: obtaining a proximal device identifier associated with a proximal device; identifying a proximal device profile associated with the proximal device identifier; retrieving access privilege data stored in the proximal device profile; generating, via a processor, user interface data based on the access privilege data; and providing the user interface data for display. The method may further comprise: providing, for the proximal device, an authentication key identifier and a request for user security input format data; obtaining, from the proximal device: an authentication key associated with the authentication key identifier, and user security input format data; determining that the proximal device is authenticated, based on the authentication key; and displaying a user security input interface based on the user security input format data. FIG. 1A
CLIAMS:We claim:
1. A resource sharing apparatus, comprising:
a processor; and
a memory storing processor-executable instructions comprising instructions for:
obtaining a proximal device identifier associated with a proximal device;
identifying a proximal device profile associated with the proximal device identifier;
retrieving access privilege data stored in the proximal device profile;
generating user interface data based on the access privilege data; and
providing the user interface data for display.
2. The apparatus of claim 1, the instructions further comprising instructions for:
providing, for the proximal device, an authentication key identifier and a request for user security input format data;
obtaining, from the proximal device:
an authentication key associated with the authentication key identifier, and
user security input format data;
determining that the proximal device is authenticated, based on the authentication key; and
displaying a user security input interface based on the user security input format data.
3. The apparatus of claim 2, the instructions further comprising instructions for:
obtaining a user security input via the user security input interface;
providing, for the proximal device:
the user security input, and
a second authentication key identifier;
obtaining, from the proximal device, a second authentication key associated with the second authentication key identifier; and
determining that the user security input is valid, based on the second authentication key;
wherein providing the user interface data for display is performed after determining that the user security input is valid.
4. The apparatus of claim 1, wherein the user interface data is provided for display on a display device operatively connected to the resource sharing apparatus.
5. The apparatus of claim 1, wherein the apparatus is one of: a mobile device; a set-top box; a television; and a computer.
6. The apparatus of claim 1, wherein the proximal device is one of: a mobile device; a set-top box; a television; and a computer.
7. The apparatus of claim 1, wherein the proximal device identifier is one of: a media access control (MAC) address; a computer network address; and an Internet Protocol (IP) address.
8. The apparatus of claim 1, wherein the access privilege data includes data relating to at least one of: a data access privilege; a user profile access privilege; an application access privilege; an operating system access privilege; and/or a hardware access privilege.
9. The apparatus of claim 8, wherein the user interface data includes data relating to an application accessible under the application access privilege.
10. The apparatus of claim 8, wherein the user interface data includes data relating to a data file accessible under the data access privilege.
11. The apparatus of claim 8, wherein the user interface data includes data relating to a hardware component accessible under the hardware access privilege.
12. The apparatus of claim 11, wherein the hardware component is one of: a communication device; an encryption device; a storage device; and a communication port.
13. A resource sharing method, comprising:
obtaining a proximal device identifier associated with a proximal device;
identifying a proximal device profile associated with the proximal device identifier;
retrieving access privilege data stored in the proximal device profile;
generating, via a processor, user interface data based on the access privilege data; and
providing the user interface data for display.
14. The method of claim 13, further comprising:
providing, for the proximal device, an authentication key identifier and a request for user security input format data;
obtaining, from the proximal device:
an authentication key associated with the authentication key identifier, and
user security input format data;
determining that the proximal device is authenticated, based on the authentication key; and
displaying a user security input interface based on the user security input format data.
15. The method of claim 14, further comprising:
obtaining a user security input via the user security input interface;
providing, for the proximal device:
the user security input, and
a second authentication key identifier;
obtaining, from the proximal device, a second authentication key associated with the second authentication key identifier; and
determining that the user security input is valid, based on the second authentication key;
wherein providing the user interface data for display is performed after determining that the user security input is valid.
16. The method of claim 13, wherein the user interface data is provided for display on a display device operatively connected to the resource sharing apparatus.
17. The method of claim 13, wherein the apparatus is one of: a mobile device; a set-top box; a television; and a computer.
18. The method of claim 13, wherein the proximal device is one of: a mobile device; a set-top box; a television; and a computer.
19. The method of claim 13, wherein the proximal device identifier is one of: a media access control (MAC) address; a computer network address; and an Internet Protocol (IP) address.
20. The method of claim 13, wherein the access privilege data includes data relating to at least one of: a data access privilege; a user profile access privilege; an application access privilege; an operating system access privilege; and/or a hardware access privilege.
21. The method of claim 20, wherein the user interface data includes data relating to an application accessible under the application access privilege.
22. The method of claim 20, wherein the user interface data includes data relating to a data file accessible under the data access privilege.
23. The method of claim 20, wherein the user interface data includes data relating to a hardware component accessible under the hardware access privilege.
24. The method of claim 23, wherein the hardware component is one of: a communication device; an encryption device; a storage device; and a communication port.
25. A non-transitory computer-readable medium storing computer-executable resource sharing instructions, the instructions comprising instructions for:
obtaining a proximal device identifier associated with a proximal device;
identifying a proximal device profile associated with the proximal device identifier;
retrieving access privilege data stored in the proximal device profile;
generating user interface data based on the access privilege data; and
providing the user interface data for display.
26. The medium of claim 25, the instructions further comprising instructions for:
providing, for the proximal device, an authentication key identifier and a request for user security input format data;
obtaining, from the proximal device:
an authentication key associated with the authentication key identifier, and
user security input format data;
determining that the proximal device is authenticated, based on the authentication key; and
displaying a user security input interface based on the user security input format data.
27. The medium of claim 26, the instructions further comprising instructions for:
obtaining a user security input via the user security input interface;
providing, for the proximal device:
the user security input, and
a second authentication key identifier;
obtaining, from the proximal device, a second authentication key associated with the second authentication key identifier; and
determining that the user security input is valid, based on the second authentication key;
wherein providing the user interface data for display is performed after determining that the user security input is valid.
28. The medium of claim 25, wherein the user interface data is provided for display on a display device operatively connected to the resource sharing apparatus.
29. The medium of claim 25, wherein the apparatus is one of: a mobile device; a set-top box; a television; and a computer.
30. The medium of claim 25, wherein the proximal device is one of: a mobile device; a set-top box; a television; and a computer.
31. The medium of claim 25, wherein the proximal device identifier is one of: a media access control (MAC) address; a computer network address; and an Internet Protocol (IP) address.
32. The medium of claim 25, wherein the access privilege data includes data relating to at least one of: a data access privilege; a user profile access privilege; an application access privilege; an operating system access privilege; and/or a hardware access privilege.
33. The medium of claim 32, wherein the user interface data includes data relating to an application accessible under the application access privilege.
34. The medium of claim 32, wherein the user interface data includes data relating to a data file accessible under the data access privilege.
35. The medium of claim 32, wherein the user interface data includes data relating to a hardware component accessible under the hardware access privilege.
36. The medium of claim 35, wherein the hardware component is one of: a communication device; an encryption device; a storage device; and a communication port.
Dated this 31st day of July, 2013
R Ramya Rao
Of K&S Partners
Agent for the Applicant
,TagSPECI:TECHNICAL FIELD
This disclosure relates generally to access control systems, and more particularly to systems and methods for accessing a device using a paired device in its proximity.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 3458-CHE-2013 FORM-9 31-07-2013.pdf | 2013-07-31 |
| 1 | 3458-CHE-2013-US(14)-HearingNotice-(HearingDate-10-11-2020).pdf | 2021-10-17 |
| 2 | 3458-CHE-2013-Correspondence to notify the Controller [26-10-2020(online)].pdf | 2020-10-26 |
| 2 | 3458-CHE-2013 FORM-18 31-07-2013.pdf | 2013-07-31 |
| 3 | IP24470-specification.pdf | 2013-08-05 |
| 3 | 3458-CHE-2013-ABSTRACT [26-12-2019(online)].pdf | 2019-12-26 |
| 4 | IP24470-drawings.pdf | 2013-08-05 |
| 4 | 3458-CHE-2013-CLAIMS [26-12-2019(online)].pdf | 2019-12-26 |
| 5 | Form 5.pdf | 2013-08-05 |
| 5 | 3458-CHE-2013-CORRESPONDENCE [26-12-2019(online)].pdf | 2019-12-26 |
| 6 | Form 3.pdf | 2013-08-05 |
| 6 | 3458-CHE-2013-FER_SER_REPLY [26-12-2019(online)].pdf | 2019-12-26 |
| 7 | abstract3458-CHE-2013.jpg | 2013-08-13 |
| 7 | 3458-CHE-2013-FORM 3 [26-12-2019(online)].pdf | 2019-12-26 |
| 8 | 3458-CHE-2013-OTHERS [26-12-2019(online)].pdf | 2019-12-26 |
| 8 | 3458-CHE-2013-FER.pdf | 2019-06-26 |
| 9 | 3458-CHE-2013-OTHERS [26-12-2019(online)].pdf | 2019-12-26 |
| 9 | 3458-CHE-2013-FER.pdf | 2019-06-26 |
| 10 | 3458-CHE-2013-FORM 3 [26-12-2019(online)].pdf | 2019-12-26 |
| 10 | abstract3458-CHE-2013.jpg | 2013-08-13 |
| 11 | Form 3.pdf | 2013-08-05 |
| 11 | 3458-CHE-2013-FER_SER_REPLY [26-12-2019(online)].pdf | 2019-12-26 |
| 12 | Form 5.pdf | 2013-08-05 |
| 12 | 3458-CHE-2013-CORRESPONDENCE [26-12-2019(online)].pdf | 2019-12-26 |
| 13 | IP24470-drawings.pdf | 2013-08-05 |
| 13 | 3458-CHE-2013-CLAIMS [26-12-2019(online)].pdf | 2019-12-26 |
| 14 | IP24470-specification.pdf | 2013-08-05 |
| 14 | 3458-CHE-2013-ABSTRACT [26-12-2019(online)].pdf | 2019-12-26 |
| 15 | 3458-CHE-2013-Correspondence to notify the Controller [26-10-2020(online)].pdf | 2020-10-26 |
| 15 | 3458-CHE-2013 FORM-18 31-07-2013.pdf | 2013-07-31 |
| 16 | 3458-CHE-2013-US(14)-HearingNotice-(HearingDate-10-11-2020).pdf | 2021-10-17 |
| 16 | 3458-CHE-2013 FORM-9 31-07-2013.pdf | 2013-07-31 |
| 1 | 2019-06-2616-50-26_26-06-2019.pdf |
| 1 | 2020-03-1914-17-14AE_19-03-2020.pdf |
| 2 | 2019-06-2616-50-26_26-06-2019.pdf |
| 2 | 2020-03-1914-17-14AE_19-03-2020.pdf |