The present disclosure relates to a mobile device and, in particular, to a mobile device for authenticating a device accessory.
With the increase in popularity of mobile devices, consumer appetite for device accessories have increased dramatically over the years. Device accessories may range from providing essential functionalities, such as charging a battery, to non-essential features, such as enabling hands-free communication. Because of this popularity, there are many third party companies developing device accessories for use with mobile devices. However, one of the shortcomings of third party device accessories is that quality of such accessories cannot be controlled by the manufacturers of the mobile devices. Thus, user experience of the device accessory and the mobile device may be diminished.
A mobile device that is able to authenticate a device accessory would thus be highly desirable.
These and other features of the disclosure will become more apparent from the following description in which reference is made to the appended drawings wherein:
While the patent disclosure is described in conjunction with the specific embodiments, it will be understood that it is not intended to limit the patent disclosure to the described embodiments. On the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the scope of the patent disclosure as defined by the appended claims. In the above description, numerous specific details are set forth in order to provide a thorough understanding of the present patent disclosure. The present patent disclosure may be practiced without some or all of these specific details.
In this specification and the appended claims, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood to one of ordinary skill in the art to which this disclosure belongs.
It will be further understood that the terms “comprises” or “comprising”, or both when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
According to an aspect of the present technology, a method entails receiving at a mobile device a unique identifier from a device accessory, sending the received unique identifier to a server via a communication network, and receiving information from the server relating to the unique identifier.
Another aspect of the present technology is a computer readable storage medium upon which are stored instructions in code that are configured to perform the steps of the foregoing method when the computer readable medium is loaded into memory and executed on a processor of a mobile device.
According to a further aspect of the present technology, a mobile device for authenticating a device accessory is disclosed. The mobile device includes a proximity detector, a communication module for communicating with a server to authenticate a unique identifier of the device accessory, and a feature module for enabling and disabling functionality of the mobile device.
Referring to
As shown in
The mobile device 100 also includes a communication module 140 for communicating with one or more base stations (e.g. for telephone communication). The communication module 140 is also used to communicate with a server (e.g. 200 in
The mobile device 100 further includes a proximity detector 150. The short-range proximity detector 150 may also include a near-field communication (NFC) chip 152 (also referred to herein as an NFC interface) or Bluetooth® transceiver 154.
Now turning to
The communication system 200 includes a number of mobile devices 100 which may be connected to the communication system 200 in any of several different ways. Accordingly, several instances of mobile device 100 are depicted in
In one embodiment, mobile device 100 may connect to the server 226 using wireless LAN (WLAN) 210. WLAN 210 may be implemented as any suitable wireless access network technology. By way of example, but not limitation, WLAN 210 may be implemented using IEEE 802.11x standards (sometimes referred to as Wi-Fi) such as, for example, the IEEE 802.11a, 802.11b, 802.11g, and/or 802.11n standard. Other communication protocols may be used for the WLAN 210 in other example embodiments such as, for example, IEEE 802.16e (also referred to as Worldwide Interoperability for Microwave Access or “WiMAX”), or IEEE 802.20 (also referred to as Mobile Wireless Broadband Access).
The WLAN 210 includes one or more wireless RF Access Points (AP) 212 (two of which are shown in
In another embodiment, mobile device 100 may connect to the server 226 using wireless WAN (WWAN) 230. By way of example, but not limitation, the WWAN 230 may be implemented as a wireless network that includes a number of transceiver base stations 232 (two of which are shown in
Using wireless or wired technologies, mobile device 100 connects to the network gateway 220. The internal network 224 is typically behind a firewall 222, which serves to safeguard the internal network 224 from unauthorized access. Only authorized mobile device 100 is granted access to the server 226.
Thus, the mobile device 100 is able to authenticate a device accessory using the communication network 200. Now referring to both
Now referring to
If the unique identifier of the device accessory is one that is recognized by the server 226, the server 226 may further verify if the recognized unique identifier is associated with another mobile device (i.e. step 404 in
The determination of the server 226 is subsequently communicated to the mobile device 100, with the communication including an indication with respect to the authenticity of the device accessory. In one implementation, if the unique identifier of the device accessory is not recognized by the server 226, the indication may be that the unique identifier of the device accessory is unauthenticated (i.e. step 410 in
Based on the communication from the server 226, the feature module 160 of the mobile device 100 may enable or disable one or more functionalities of the mobile device 100 (i.e. step 406 or 408 in
In another embodiment, the received unique identifier of the device accessory may be stored in memory 120 of the mobile device 100. In a further embodiment, the received information from the server, such as authentication information, may be stored in the memory 120 of the mobile device 100.
Turning to
Specific implementations involving a holster and charging cradle using NFC tags will now be described below. While not specifically described in this disclosure, the present technology may be implemented in other device accessories such as, but not limited to, a swivel mount for GPS, vehicle mount, a speaker stand, a headset, a docking station, a hands-free device and other device accessories.
An Authenticated Holster
In
The holster 600 implementing an embodiment of the present technology includes a wireless interface 614 including the unique identifier of the device accessory. Prior to use, the holster 600 is first authenticated by the mobile device 100 which implements an embodiment of the present technology. In this particular embodiment, the mobile device 100 first detects the proximity of the holster 600 using a proximity detector (e.g. 150 in
For unauthenticated holster 600, some or all of the functionalities of the mobile device 100 may be disabled. For example, the sleep-in-holster functionality mentioned above may be disabled. So, while the holster 600 may still be used to hold the mobile device 100, convenient features such as the sleep-in-holster functionality may be disabled. As a further example, the mobile device 100 may have a feature to automatically switch the alert profile of the mobile device 100, which may be disabled for unauthenticated holster 600.
For authenticated holster 600, the mobile device 100 may automatically switch into silent mode when the mobile device 100 detects the magnet 612. Additional functionalities of the mobile device 100 may be enabled and disabled with the present technology.
Upon authentication, the mobile device 100 may store the unique identifier of the authenticated holster 600 in a memory of the mobile device 100 (e.g. 120 in
An Authenticated Charging Cradle
In
Where the charging cradle 700 includes a wireless interface 706 including the unique identifier of the charging cradle 700, the charging cradle 700 is first authenticated by the mobile device 100 which implements an embodiment of the present technology. In this particular embodiment, to authenticate the charging cradle 700, the mobile device 100 is brought within proximity of the charging cradle 700. The proximity detector of the mobile device 100 then receives the unique identifier of the charging cradle 700 from the wireless interface 706. The unique identifier of the charging cradle 700 then sends the unique identifier to the server (e.g. 226 in
When the server receives the unique identifier of the charging cradle 700, it confirms that the unique identifier is indeed a recognized unique identifier. This may be achieved by the server maintaining a list of recognized unique identifier and checking the unique identifier of the charging cradle 700 against this list. Other implementations are possible such as verifying that the unique identifier of the charging cradle 700 conforms to a predetermined algorithm. Once the server determines that the unique identifier of the charging cradle 700 is a recognized identifier, the result is communicated to the mobile device 100. In this implementation, where the unique identifier is recognized, the server indicates that the unique identifier is authenticated. By contrast, if the unique identifier of the charging cradle 700 is not recognized, the server indicates that the unique identifier is unauthenticated.
As an added security measure, the mobile device 100 may additionally send a unique identifier of the mobile device 100 with the unique identifier of the charging cradle 700. Thus, in addition to the server determining whether the unique identifier of the charging cradle 700 is recognized, it may also verify that the unique identifier of the charging cradle 700 was not previously assigned to another mobile device. This ensures that a previously authorized unique identifier cannot be paired with another mobile device.
For authenticated charging cradle 700, various functionalities of the mobile device 100 may be enabled. For example, the charging cradle 700 may trigger the mobile device 100 to automatically enable speakerphone to permit voice communication while the mobile device 100 is still in the charging cradle 700. Other functionalities such as auto call-forwarding to a home line may be possible.
Upon authentication, the mobile device 100 may store the unique identifier of the authenticated charging cradle 700 in a memory of the mobile device 100 (e.g. 120 in
While the present technology has been described in terms of specific implementations and configurations, further modifications, variations, modifications and refinements may be made without departing from the inventive concepts presented herein. For example, while the mobile device implementing the present technology was only described with a charging cradle and a holster, other device accessories are possible such as a swivel mount for GPS, vehicle mount, a speaker stand, a headset, a docking station, a hands-free device and other device accessories without departing from the scope of the disclosure as defined in the claims. The scope of the exclusive right sought by the Applicant(s) is therefore intended to be limited solely by the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
7548746 | Kalke | Jun 2009 | B2 |
7957728 | Kalke | Jun 2011 | B2 |
8208853 | Lydon et al. | Jun 2012 | B2 |
8230045 | Kawachiya et al. | Jul 2012 | B2 |
8438288 | Garcia Jurado Suarez et al. | May 2013 | B2 |
8509691 | Lydon et al. | Aug 2013 | B2 |
20030008680 | Huh et al. | Jan 2003 | A1 |
20030162562 | Curtiss et al. | Aug 2003 | A1 |
20040034579 | Xu et al. | Feb 2004 | A1 |
20040137890 | Kalke | Jul 2004 | A1 |
20040155106 | Schmidtberg et al. | Aug 2004 | A1 |
20060071778 | Vesikivi et al. | Apr 2006 | A1 |
20060156415 | Rubinstein et al. | Jul 2006 | A1 |
20080141361 | Balfanz et al. | Jun 2008 | A1 |
20090021350 | Hatta et al. | Jan 2009 | A1 |
20090094681 | Sadler et al. | Apr 2009 | A1 |
20090187967 | Rostaing et al. | Jul 2009 | A1 |
20090193500 | Griffin et al. | Jul 2009 | A1 |
20100045441 | Hirsch et al. | Feb 2010 | A1 |
20100121736 | Kalke | May 2010 | A1 |
20100278345 | Alsina et al. | Nov 2010 | A1 |
20100306538 | Thomas et al. | Dec 2010 | A1 |
20110167262 | Ross et al. | Jul 2011 | A1 |
20120003935 | Lydon et al. | Jan 2012 | A1 |
Number | Date | Country |
---|---|---|
2010061490 | Mar 2010 | JP |
2009066212 | May 2009 | WO |
Entry |
---|
1. Bluetooth Special Interest Group—Simple Pairing Whitepaper—http://docs.google.com/viewer?a=v&q=cache:rHrh1sZyhHgJ:bluetooth.com. |
European Search Report from corresponding EP Application dated May 11, 2011. |
Canadian Intellectual Property Office, Office Action on Application No. 2,762,550 , Issued on Jun. 4, 2015. |
Number | Date | Country | |
---|---|---|---|
20120167232 A1 | Jun 2012 | US |