Secure operation of a versatile device based on whether an authenticated user continues to wear the versatile device after initiating its use
    2.
    发明授权
    Secure operation of a versatile device based on whether an authenticated user continues to wear the versatile device after initiating its use 有权
    基于认证用户在开始使用后是否继续佩戴通用设备,可以确保多功能设备的操作

    公开(公告)号:US07474592B2

    公开(公告)日:2009-01-06

    申请号:US10011925

    申请日:2001-12-05

    IPC分类号: G04B47/00

    摘要: A method and versatile device for use-based context security is described. In an embodiment, the versatile device is implemented as a wristwatch. The wristwatch is configured to facilitate a wireless transaction for an authenticated user and is configured to be worn by the authenticated user such that to encircle a part of the authenticated user. Moreover, the wristwatch includes a validation mechanism for controlling use of the wristwatch based on whether the authenticated user continues to wear the wristwatch after initiating use of the wristwatch.

    摘要翻译: 描述了一种用于基于用途的上下文安全性的方法和通用设备。 在一个实施例中,多功能设备被实现为手表。 手表被配置为便于经认证的用户的无线交易,并且被配置为被认证用户佩戴,以便环绕认证用户的一部分。 此外,手表包括用于根据在开始使用手表之后认证用户是否继续佩戴手表来控制手表的使用的确认机构。

    Method and system for providing secure communications between a first and a second peer device
    3.
    发明授权
    Method and system for providing secure communications between a first and a second peer device 有权
    用于在第一和第二对等设备之间提供安全通信的方法和系统

    公开(公告)号:US08271786B1

    公开(公告)日:2012-09-18

    申请号:US10271662

    申请日:2002-10-16

    IPC分类号: H04L9/00 H04K1/00

    摘要: A method and system for providing secure communications between a first and second peer device is disclosed. The invention includes allowing the first and second peer devices to verify the authenticity of each other only while each peer device is within an established zone of privacy wherein the established zone of privacy is an area close (for example, almost touching) to the peer device. Because the authenticity of the other device is verified only while each peer device is within the established zone of privacy, users can visually confirm that there are no potential interlopers within the zone. As a result, the two peer devices can discover each other in a more secure fashion The method and system include creating a zone of privacy with the first peer device, allowing the first and second peer devices to verify the authenticity of each other only while the second peer device is within the zone of privacy, and allowing encrypted data to transfer between the first and second peer device once the authenticity of each peer device has been verified.

    摘要翻译: 公开了一种用于在第一和第二对等设备之间提供安全通信的方法和系统。 本发明包括允许第一和第二对等设备仅在每个对等设备处于建立的隐私区域内时验证彼此的真实性,其中建立的隐私区域是与对等设备相邻(例如几乎接近)的区域 。 因为只有当每个对等设备处于建立的隐私区域内时才验证其他设备的真实性,用户可以在视觉上确认该区域内没有潜在的入侵者。 结果,两个对等设备可以以更安全的方式彼此发现。该方法和系统包括与第一对等设备建立隐私区域,允许第一和第二对等设备仅在 第二对等设备在隐私区域内,并且一旦验证了每个对等设备的真实性,允许在第一和第二对等设备之间传送加密数据。