Proximity based device security

作者: Michael Horton

DOI:

关键词: Computer networkWirelessSecurity tokenToken ringToken bus networkToken passingUltra low powerEngineeringTransceiverState (computer science)

摘要: Devices, systems and methods are disclosed for additional security, functionality, convenience in the operation of a wireless communication device with use separate proximity security token device. In exemplary embodiments, is carried by user while logic installed on user's The along transceivers allows to sense through communication. Given certain range token, as determined signal strength, determines whether locked or unlocked state. If outside range, then locked. uses ultra low power communications optimal battery life.

参考文章(25)
Paul Lapstun, Kia Silverbrook, Printer with user ID sensor ,(2005)
Daniel B. Thomasson, Stephen R. Flanagan, Object-proximity monitoring and alarm system ,(2002)
Thomas J Keeling, Justin P McBride, Michael A Wiegand, Smart unlock control by vehicle location ,(2006)
Paul E. Newson, Robert D. Young, Benjamin O. Zotto, Neel R. S. Malik, Bridging a gaming console with a wireless network ,(2003)
Jamison Vawter, Secure near field transaction ,(2006)
Antonio Varriale, Maura Turolla, Elisa Alessio, Simonetta Mangiabene, Maurizio Marcelli, Use, provision, customization and billing of services for mobile users through distinct electronic apparatuses ,(2006)
Jeff D. Thomas, Paul D. Kangas, System and method for shopping cart security ,(2007)