Method and apparatus for proximity based pairing of mobile devices

A source device and target device technology, applied in the field of authorized communication, can solve the problem that the authorization mechanism cannot provide a simple, elegant and convenient method for mobile devices to share data, troublesome, and the authorization mechanism is redundant.

Active Publication Date: 2012-05-16
APPLE INC
View PDF4 Cites 82 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in a mobile environment, such authorization mechanisms are often lengthy and cumbersome for practical use
[0004] Therefore, traditional authorization mechanisms cannot provide simple, elegant and convenient methods for mobile devices to share data securely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for proximity based pairing of mobile devices
  • Method and apparatus for proximity based pairing of mobile devices
  • Method and apparatus for proximity based pairing of mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Methods and apparatus for proximity based pairing of mobile devices are described herein. In the following description, numerous specific details are set forth in order to provide a thorough description of embodiments of the invention. However, it will be understood by those skilled in the art that embodiments of the invention may be practiced without these specific details. In other instances, well-known components, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.

[0021] In this specification, reference to "one embodiment" or "the embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present invention. The appearances of the phrase "in one embodiment" in various places in this specification are not necessarily all referring to the same embodiment.

[0022] The processes shown in the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and an apparatus that establish a first communication channel or pair with a target device in proximity to a source device are described. A pairing message is sent to the target device in proximity to the source device over the first communication channel from the source device. A secret and an identifier associated with an application are included in the pairing message. In response to receiving the secret back from the target device for a second communication channel, pairing data of the application are sent to the target device over the second communication channel.

Description

technical field [0001] The present invention generally relates to authorizing communications between network-capable devices. More specifically, the present invention relates to secure instant pairing of mobile devices based on proximity to authorize communications. Background technique [0002] With the proliferation of network-capable mobile devices such as mobile phones, smart phones, wireless headsets, etc., pairing separate mobile devices is becoming more and more common. Specifically, mobile devices are often paired to share data such as personal photos, contacts, playlists, passwords, or for social networking (e.g. Application) friendship information, etc. Typically, such data sharing requires security protections. [0003] Typical secure data sharing includes authorization systems. Traditionally, authorization systems have relied on security mechanisms such as logins, password verification, and / or confirmation emails. For example, users of a mobile phone may ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04W12/06
CPCH04L63/0492H04W4/02H04W76/023H04W8/005H04L63/18H04L63/08H04W76/025H04L29/08657H04W88/02H04L67/18H04W12/06H04W76/14H04W76/15H04W12/65H04W12/50H04L67/52
Inventor T·M·阿拉西纳G·L·特里波勒P·钱皮奥克斯
Owner APPLE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products