The present invention relates generally to systems and methods for authenticating, securing and automatically configuring mobile devices and mobile device accessories using Radio Frequency Identification (hereinafter “RFID”).
Modern mobile devices are typically capable of supplementing their capabilities by interfacing with various types of accessories. Connection of an accessory to a mobile device typically requires that a user set up the device and/or the accessory to properly communicate with one another.
Manual setup of mobile devices and accessories entails significant time on the part of the user, who must typically navigate through a series of menus and settings in order to properly configure accessory software information. Further, even if properly performed, this configuration process does not ensure that an accessory is a genuine component that may function properly, as opposed to a third-party or counterfeit accessory which may fail or even damage the mobile device.
Additionally, because of their portable nature, mobile devices are vulnerable to theft. Traditional theft deterrents that are effective for desktop computers (e.g., security chains) are ineffective in preventing theft of mobile devices.
The present invention relates to a system comprising an accessory and a mobile device. The accessory comprises an RFID tag including accessory information. The mobile device comprises an RFID reader reading the RFID tag. The mobile device is configured to operate with the accessory based on the accessory information.
The exemplary embodiments of the present invention may be further understood with reference to the following description and the appended drawings, wherein like elements are referred to with the same reference numerals. The exemplary embodiments of the present invention describe a system and method for use by mobile devices. Using the exemplary embodiments, a mobile device may achieve “Plug and Play” connectivity with attached accessories by using RFID communication to identify, authenticate, and configure such accessories and the mobile device to operate with the accessories.
A “mobile device,” as used in this disclosure, may refer to any type of mobile computing device that may be capable of interfacing with accessories. For example, the mobile device may be a handheld computer, a notebook computer, a personal digital assistant (“PDA”), a scanner, a mobile telephone, a data acquisition device, a camera, a pager, etc. Similarly, an “accessory,” as used in this disclosure, may refer to any peripheral device that a user may wish to connect to a mobile device. An accessory may be, for example, a cradle, an adapter, a power supply, a cable, a data capture mechanism, a portable printer, an input device, an output device, etc.
The system 100 may also include an accessory 150. The accessory 150 may be, for example, of the types described above, and may include an RFID tag 160. The RFID tag 160 may be of any of the various types that are known in the art (e.g., passive, semi-passive, active, etc.), and may store information related to the accessory 150. The stored information may include, for example, the type of the accessory 150, authentication information regarding the manufacturer of the accessory 150, default configuration information for the accessory 150, information regarding the capabilities of the accessory 150, etc.
The system 100 may also include a cradle 180. The cradle 180 may be, for example, a charging cradle, a data interface cradle, etc. The cradle 180 may also include an RFID tag 190, which may, as for the RFID tag 160, be of any of the various types known in the art. The RFID tag 190 may also store information related to the cradle 180. The stored information may include any of the information discussed above with regards to the RFID tag 160, and additionally may include information about various mobile devices 110 that are authorized to use the cradle 180. In another exemplary embodiment of the present invention, a cradle may include an RFID reader, while a mobile device may include an RFID tag to be read for authentication purposes.
In step 220, a user powers on the mobile device. It should be noted that in other exemplary embodiments of the present invention, an accessory 150 may be connected to a mobile device 110 that is already powered on (i.e., the order of steps 210 and 220 may be transposed).
In step 230, the mobile device 110 detects the presence of the accessory 150. This detection may take place automatically when the mobile device 110 is powered on, or when (in alternate exemplary embodiments) a connection is detected at the interface 140 of a previously powered-on mobile device 110. Alternately, the detection step 230 may occur upon the selection of a command to detect plug and play devices, which may, for example, be a selectable option in the operating system software that operates the mobile device 110. In step 240, the mobile device 110 uses the RFID reader 120 to identify the accessory 150. In this step, the RFID reader 120 communicates with the RFID tag 160 and reads information from the RFID tag 160. As described above, this may include information regarding the type of the accessory 150, the settings to be used by the mobile device 110 to use the accessory 150, etc.
In step 250, the mobile device 110 authenticates the accessory 150 using information read from the RFID tag 160 using the RFID reader 120. This authentication step may ensure that the accessory 150 was manufactured by the same supplier as the mobile device 110. In other exemplary embodiments, it may ensure that the accessory 150 was manufactured by a supplier from a list of trusted suppliers, or it may verify the authenticity of the accessory in some other manner. Authentication may be accomplished by verifying a password-protected Electronic Product Code (“EPC”) identification embedded in the RFID tag 160. Alternately, authentication may be accomplished by verifying an identifier stored on the RFID tag 160 that is either a variant of an EPC or another type of identifier suitable for accomplishing the same result. In other embodiments of the present invention, authentication information may be stored remotely, such as on a database accessible by the device 110 via the Internet; such a database may also be capable of storing other information, such as the service history of the accessory 150. If it is determined that the accessory 150 is not authentic, then the method proceeds to step 260, where the user of the mobile device 110 is alerted to this fact. This alert may be accomplished by displaying an error message on the display 130, by sounding an audible alarm, by vibrating, or in any other matter that may alert the user. Following step 260, the method terminates.
If, in step 250, it is determined that the accessory 150 is authentic, then the method proceeds to step 270. In step 270, the mobile device 110 is automatically configured to interface with the accessory 150. This automatic configuration process 270 takes the place of the manual configuration discussed above with reference to prior existing methods of configuring accessories. In this exemplary embodiment, the mobile device 110 is configured to operate the accessory 150 based on a known default setting. Such default settings may be stored in a memory of the mobile device 110 for a selected set of accessories. Alternately, settings may be stored in the RFID tag 160 and obtained by the mobile device 110 using the RFID reader 120. In other exemplary embodiments, a memory of the mobile device 110 may store configuration settings for previously used accessories, including settings that a user may have modified from previously obtained defaults. In such embodiments, the mobile device 110 may first determine whether prior settings are available, and load default settings as described above if no prior settings exist. Once the mobile device 110 has been configured to interface with the accessory 150, the method terminates.
If the mobile device 110 detects a cradle 180 within communication range in step 310, then the method proceeds to step 350, wherein the mobile device 110 displays a logon screen to the user. In step 360, the mobile device 110 determines whether the user has entered valid logon information. If logon has been properly accomplished, the method terminates and normal operation of the mobile device 110 can follow. If logon information is not proper, the method returns to step 320.
In one exemplary embodiment, the software that operates the mobile device 110 may be written so that the identity of a cradle 180 corresponding to the mobile device 110 is written to a specific flash memory location. Thus, even when a battery is removed from the mobile device 110 and the device reboots itself, resulting in loss of the contents of PAM, the first application to be run will immediately begin searching for the cradle 180 once the mobile device 110 is powered back on.
In another exemplary embodiment of the present invention, the powered-on mobile device 110 and the RFID reader 120 may be configured to continuously monitor for the proximity of the cradle 180 and its corresponding RFID tag 190. In such an embodiment, the mobile device 110 may be configured to alert a user (e.g., by displaying an error message, generating an audible error tone, vibrating, etc.) if the mobile device 110 is moved beyond a predetermined distance from the cradle 180. This may be useful if the mobile device 110 functions by communication with a local wireless network; such an alert may then warn the user that the device will cease to function properly.
In this exemplary embodiment, by only allowing a mobile device to turn on when it is in close proximity to its home cradle (e.g., as part of a daily startup procedure), the mobile device can be secured. Removing the device from the immediate area surrounding the cradle without first inputting a valid logon would render the device inoperative. This would deter theft, as a device that does not power on is a less appealing candidate for theft.
In other exemplary embodiments, by authenticating an accessory or accessories that have been attached to the mobile device, proper cooperation between the two may be ensured. The use of incompatible or counterfeit accessories may lead to malfunctions in mobile devices or even permanent damage to the affected mobile devices. Such malfunctions may also result in service calls, requiring service personnel to fix failures that have been caused by the use of incompatible or counterfeit accessories, and as a result consuming still more operational resources.
In other exemplary embodiments of the present invention, the RFID tag 160 may be used to change the default parameters of the accessory 150. This may be desirable, for example, where adjustment of the parameters may be required in a large scale rollout due to a functional limitation. In such an embodiment, after the accessory 150 has been authenticated by the device 110 as described above, the mobile device 110 can send a change configuration request command to the accessory 150. If the accessory 150 responds with acceptance, the mobile device 110, using the RFID reader 120, may then reprogram the RFID tag 160 in the accessory 150 to match the newly requested configuration.
In addition, by providing automatic plug-and-play configuration for mobile device accessories, the process of attaching accessories is greatly simplified. No user intervention is required to arrive at a functional configuration for the accessory and the device, meaning that the user's time and effort can be expended elsewhere. Additionally, for exemplary embodiments of the present invention that recall previously used settings for attached accessories, customization can be achieved without manually entering settings each time the accessory is reattached to the device.
The present invention has been described with reference to the above specific exemplary embodiments. However, those of ordinary skill in the art will recognize that the same principles may be applied to other embodiments of the present invention, and that the exemplary embodiments should therefore be read in an illustrative, rather than limiting, sense.