WO2004019550A2 - System and method for authenticating wireless component - Google Patents

System and method for authenticating wireless component Download PDF

Info

Publication number
WO2004019550A2
WO2004019550A2 PCT/US2003/025723 US0325723W WO2004019550A2 WO 2004019550 A2 WO2004019550 A2 WO 2004019550A2 US 0325723 W US0325723 W US 0325723W WO 2004019550 A2 WO2004019550 A2 WO 2004019550A2
Authority
WO
WIPO (PCT)
Prior art keywords
component
server
authentication
elements
authenticating
Prior art date
Application number
PCT/US2003/025723
Other languages
French (fr)
Other versions
WO2004019550A3 (en
Inventor
Thomas Patrick Dawson
David Desch
Original Assignee
Sony Corporation
Sony Electronics, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corporation, Sony Electronics, Inc. filed Critical Sony Corporation
Priority to AU2003259875A priority Critical patent/AU2003259875A1/en
Publication of WO2004019550A2 publication Critical patent/WO2004019550A2/en
Publication of WO2004019550A3 publication Critical patent/WO2004019550A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2809Exchanging configuration information on appliance services in a home automation network indicating that an appliance service is present in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L2012/284Home automation networks characterised by the type of medium used
    • H04L2012/2841Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L2012/2847Home automation networks characterised by the type of home appliance used
    • H04L2012/2849Audio/video appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/68Gesture-dependent or behaviour-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices

Definitions

  • the present invention relates generally to in-home wireless entertainment systems.
  • In-home wireless entertainment systems can include a central server and various components that are in wireless communication with the server and that are dispersed throughout the house.
  • TVs, digital video disk (DND) recorders, NCRs, telephones, personal digital assistants (PDAs), appliances, and so on may all be linked in a wireless entertainment system.
  • DND digital video disk
  • NCRs digital video disk
  • PDAs personal digital assistants
  • the problem to which the present invention is directed is authenticating wireless components to access the system.
  • a wired system authentication is not generally a problem, since a component must be physically present in the home to communicate with the system.
  • a wireless system it is possible for an eavesdropper or otherwise unauthorized person outside the home to access the system using the wireless network, which typically extends beyond the walls of the house.
  • a wireless home entertainment system includes a server that has a manipulable authentication element and one or more components in wireless communication with the server. Each component has manipulable authentication element. A person can cause the server to regard the component as being authenticated by manipulating the authentication elements.
  • the server includes logic for authenticating the component when the elements are manipulated simultaneously with each other. In an alternate embodiment, the server includes logic for authenticating the component when the elements are manipulated within a predetermined time threshold of each other. If desired, the server may include two authentication elements establishing respective
  • the preferred component includes logic for transmitting a component identification in response to manipulating the authentication element on the component.
  • the component can include logic for transmitting an encryption result generated at least in part using a component identification.
  • the server may include means for indicating that the component is authenticated, such as by generating an audible or visual signal.
  • a method for authenticating, to a server, a component in wireless communication with the server includes depressing an authentication button on the server, and depressing an authentication button on the component to cause the component to transmit a message.
  • the message also includes returning "authenticated” at the server in response to receiving the message only if the buttons are depressed simultaneously with each other or within a predetermined time period of each other.
  • a logic component includes means, invokable by manipulating a first authentication element, for receiving an identification message transmitted in response to manipulation of a second authentication element.
  • the logic component includes means for reftirning "authentication” only if the elements have been manipulated together or within a predetermined period of each other.
  • Figure 1 is a block diagram of the system architecture of the present invention
  • Figure 2 is a flow chart showing the authentication logic
  • Figure 3 is a flow chart showing alternate authentication logic.
  • a wireless home entertainment system is shown, generally designated 10, which includes a server 12 that can be implemented by any appropriate processor 13 and one or more components 14 that are in wireless communication with the server 12.
  • a server 12 that can be implemented by any appropriate processor 13 and one or more components 14 that are in wireless communication with the server 12.
  • Figure 1 shows two components 14, although more components 14 can be used.
  • Non-limiting examples of embodiments of the components 14 are televisions, including portable flat-panel TVs, digital video disk (DND) players, VCRs, telephones, personal digital assistants (PDAs), and household appliances.
  • DND digital video disk
  • PDAs personal digital assistants
  • the server 12 can access a database 16 of, e.g., audio-video content.
  • the server 12 can also include a wireless transceiver 18, e.g., a code division multiple access (CDMA) transceiver.
  • CDMA code division multiple access
  • Other wireless communication principles can be used, including other radiofrequency, infrared, and acoustic transmission principles.
  • the server 12 includes at least one and more preferably two human-manipulable authentication elements 20, 22.
  • the elements 20, 22 may be implemented as buttons or toggles or switches or their functional equivalents.
  • authentication element is meant a manipulative device such as a button that does not function as a data entry device such as a keypad or keyboard, but instead is a single-purpose element that cannot be used for general data entry but that simply activates the server to function in accordance with the logic below.
  • a first authentication element 20, when manipulated indicates that the component 14 sought to be registered for authentication is to have unlimited system access.
  • a second authentication element 22, when manipulated indicates that the component 14 sought to be registered for authentication is to have limited system access, e.g., access to only predetermined content or channels.
  • the server 12 may include an indication 24 that can be implemented by a light emitting diode (LED), a front panel display message, a message on a display screen associated with the server 12, etc.
  • the indication 24 is used to indicate successful registration for authentication of
  • each component 14 may include a processor 26 and a wireless transceiver 28 for communicating with the server 12 and/or other components 14.
  • the component processor 26 and server processor 13 may act alone or in concert with each other to execute the logic herein.
  • each component 14 includes at least one human- manipulable authentication element 30.
  • Figure 2 shows the authentication logic of the present invention, as can be embodied in software or hardware.
  • Figure 2 is in logic flow format for convenience of disclosure, but part or all of the logic can be implemented by state machines or other logic devices.
  • a user wishing to register a component 14 for authentication (also generally referred to herein as "authenticating” the component) simultaneously manipulates the component authentication element 30 and one of the server authentication elements 20, 22 (depending on the level of system access to be granted the component 14).
  • Manipulation of the server authentication element 20 causes the server to be configured to receive a message from the component 14. This message is transmitted at block 34 by the component 14 in response to manipulation of the component authentication element 30.
  • manipulation at block 32 can include depressing and holding down the buttons until the indication 30 is activated as described below.
  • the message from the component 14 includes a unique identification associated with the component 14.
  • This ID can be programmed into the component 14 at time of manufacture of either the processor 26 chip or component 14 manufacture or assembly, and can be input to a write-once read many type of device, such as a fusible link ROM.
  • the message transmitted by the component 14 can be an encryption result of the ID.
  • the ID can be used as a seed for a key generation algorithm.
  • the key which may not be readable from any outside component, might not be transmitted, but rather only the results of an encryption algorithm that uses the key. This can be part of an overall authentication key exchange that might be implemented in accordance with public key/private key principles known in the art.
  • the indication 24 can be activated to so inform the user.
  • the component 14 has been authenticated to the server 12 to afford the component 14 the level of system 10 access indicated by the server authentication element 20, 22 that was manipulated. Subsequently, the component 14 can automatically communicate with the server 12 in accordance with session wireless authentication procedures known in the art.
  • FIG. 3 shows that in an alternate embodiment, the server authentication element and component authentication element need not be manipulated simultaneously with each other, but rather can be manipulated within a predetermined time period of each other, e.g., a second or two. Accordingly, at block 38 the server authentication element 20, 22 is manipulated and released. Then, at block 40 the component authentication element 30 is manipulated and released. At decision diamond 42 it is determined whether the manipulations occurred within the predetermined period and if not, "fail" is returned at state 44. Otherwise, "authenticate” is indicated at block 46. In this embodiment, clocks in the component 14/server 12 can be synchronized.

Abstract

A wireless component (14) is authenticated to an in-home wireless entertainment system server (12) by simultaneously or near-simultaneously holding down buttons on the component (14) and server (12) and transmitting a component ID ( or encryption results generated from the key) to the server (12). The server (12) then indicates 'authenticated', and the component (14) can subsequently access the system using its ID.

Description

SYSTEM AND METHOD FOR AUTHENTICATING WIRELESS COMPONENT
I. Field Of The Invention
The present invention relates generally to in-home wireless entertainment systems.
II. Background Of The Invention
In-home wireless entertainment systems can include a central server and various components that are in wireless communication with the server and that are dispersed throughout the house. For examples, TVs, digital video disk (DND) recorders, NCRs, telephones, personal digital assistants (PDAs), appliances, and so on may all be linked in a wireless entertainment system.
The problem to which the present invention is directed is authenticating wireless components to access the system. In a wired system authentication is not generally a problem, since a component must be physically present in the home to communicate with the system. In a wireless system, however, it is possible for an eavesdropper or otherwise unauthorized person outside the home to access the system using the wireless network, which typically extends beyond the walls of the house.
Currently, wireless components are authenticated during "set up" using procedures that, for many consumers, can be confusing and complicated, and furthermore that might be less than secure. Recognizing this, the present invention has been provided.
SUMMARY OF THE INVENTION A wireless home entertainment system includes a server that has a manipulable authentication element and one or more components in wireless communication with the server. Each component has manipulable authentication element. A person can cause the server to regard the component as being authenticated by manipulating the authentication elements. In a preferred embodiment, the server includes logic for authenticating the component when the elements are manipulated simultaneously with each other. In an alternate embodiment, the server includes logic for authenticating the component when the elements are manipulated within a predetermined time threshold of each other. If desired, the server may include two authentication elements establishing respective
levels of authentication for the component.
As set forth further below, the preferred component includes logic for transmitting a component identification in response to manipulating the authentication element on the component. Alternatively, the component can include logic for transmitting an encryption result generated at least in part using a component identification. The server may include means for indicating that the component is authenticated, such as by generating an audible or visual signal.
In another aspect, a method for authenticating, to a server, a component in wireless communication with the server includes depressing an authentication button on the server, and depressing an authentication button on the component to cause the component to transmit a message. The message also includes returning "authenticated" at the server in response to receiving the message only if the buttons are depressed simultaneously with each other or within a predetermined time period of each other. In still another aspect, a logic component includes means, invokable by manipulating a first authentication element, for receiving an identification message transmitted in response to manipulation of a second authentication element. Also, the logic component includes means for reftirning "authentication" only if the elements have been manipulated together or within a predetermined period of each other. The details of the present invention, both as to its structure and operation, can best be understood in reference to the accompanying drawings, in which like reference numerals refer to like parts, and in which:
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a block diagram of the system architecture of the present invention; Figure 2 is a flow chart showing the authentication logic; and
Figure 3 is a flow chart showing alternate authentication logic.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
Referring initially to Figure 1, a wireless home entertainment system is shown, generally designated 10, which includes a server 12 that can be implemented by any appropriate processor 13 and one or more components 14 that are in wireless communication with the server 12. For ease of illustration Figure 1 shows two components 14, although more components 14 can be used. Non-limiting examples of embodiments of the components 14 are televisions, including portable flat-panel TVs, digital video disk (DND) players, VCRs, telephones, personal digital assistants (PDAs), and household appliances.
In the particular embodiment shown in Figure 1, the server 12 can access a database 16 of, e.g., audio-video content. In addition to the processor 13, the server 12 can also include a wireless transceiver 18, e.g., a code division multiple access (CDMA) transceiver. Other wireless communication principles, however, can be used, including other radiofrequency, infrared, and acoustic transmission principles.
In accordance with the present invention, the server 12 includes at least one and more preferably two human-manipulable authentication elements 20, 22. The elements 20, 22 may be implemented as buttons or toggles or switches or their functional equivalents. In any case, by "authentication element" is meant a manipulative device such as a button that does not function as a data entry device such as a keypad or keyboard, but instead is a single-purpose element that cannot be used for general data entry but that simply activates the server to function in accordance with the logic below. In the preferred non-limiting embodiment shown in Figure 1, a first authentication element 20, when manipulated, indicates that the component 14 sought to be registered for authentication is to have unlimited system access. In contrast, a second authentication element 22, when manipulated, indicates that the component 14 sought to be registered for authentication is to have limited system access, e.g., access to only predetermined content or channels.
As also shown in Figure 1, the server 12 may include an indication 24 that can be implemented by a light emitting diode (LED), a front panel display message, a message on a display screen associated with the server 12, etc. As discussed further below, the indication 24 is used to indicate successful registration for authentication of
a component 14.
Turning to the specifics of a preferred non- limiting component 14, each component 14 may include a processor 26 and a wireless transceiver 28 for communicating with the server 12 and/or other components 14. The component processor 26 and server processor 13 may act alone or in concert with each other to execute the logic herein. Also, each component 14 includes at least one human- manipulable authentication element 30.
Figure 2 shows the authentication logic of the present invention, as can be embodied in software or hardware. Figure 2 is in logic flow format for convenience of disclosure, but part or all of the logic can be implemented by state machines or other logic devices.
Commencing at block 32, a user wishing to register a component 14 for authentication (also generally referred to herein as "authenticating" the component) simultaneously manipulates the component authentication element 30 and one of the server authentication elements 20, 22 (depending on the level of system access to be granted the component 14). Manipulation of the server authentication element 20 causes the server to be configured to receive a message from the component 14. This message is transmitted at block 34 by the component 14 in response to manipulation of the component authentication element 30. When the server authentication element 20,
22 and component authentication element 30 are buttons, manipulation at block 32 can include depressing and holding down the buttons until the indication 30 is activated as described below.
In one preferred non- limiting embodiment, the message from the component 14 includes a unique identification associated with the component 14. This ID can be programmed into the component 14 at time of manufacture of either the processor 26 chip or component 14 manufacture or assembly, and can be input to a write-once read many type of device, such as a fusible link ROM. Alternatively, for even greater security the message transmitted by the component 14 can be an encryption result of the ID. For instance, the ID can be used as a seed for a key generation algorithm. In this case, the key, which may not be readable from any outside component, might not be transmitted, but rather only the results of an encryption algorithm that uses the key. This can be part of an overall authentication key exchange that might be implemented in accordance with public key/private key principles known in the art.
Proceeding to block 36, if the message is successfully read and processed by the server 12, the indication 24 can be activated to so inform the user. At this point, the component 14 has been authenticated to the server 12 to afford the component 14 the level of system 10 access indicated by the server authentication element 20, 22 that was manipulated. Subsequently, the component 14 can automatically communicate with the server 12 in accordance with session wireless authentication procedures known in the art.
Figure 3 shows that in an alternate embodiment, the server authentication element and component authentication element need not be manipulated simultaneously with each other, but rather can be manipulated within a predetermined time period of each other, e.g., a second or two. Accordingly, at block 38 the server authentication element 20, 22 is manipulated and released. Then, at block 40 the component authentication element 30 is manipulated and released. At decision diamond 42 it is determined whether the manipulations occurred within the predetermined period and if not, "fail" is returned at state 44. Otherwise, "authenticate" is indicated at block 46. In this embodiment, clocks in the component 14/server 12 can be synchronized.
While the particular SYSTEM AND METHOD FOR AUTHENTICATING WIRELESS COMPONENT as herein shown and described in detail is fully capable of attaining the above-described objects of the invention, it is to be understood that it is the presently preferred embodiment of the present invention and is thus representative of the subject matter which is broadly contemplated by the present invention, that the scope of the present invention fully encompasses other embodiments which may become obvious to those skilled in the art, and that the scope of the present invention is accordingly to be limited by nothing other than the appended claims, in which reference to an element in the singular is not intended to mean "one and only one" unless explicitly so stated, but rather "one or more". All structural and functional equivalents to the elements of the above-described preferred embodiment that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the present claims. Moreover, it is not necessary for a device or method to address each and every problem sought to be solved by the present invention, for it to be encompassed by the present claims. Furthermore, no element, component, or method step in the present disclosure is intended to be dedicated to the public regardless of whether the element, component, or method step is explicitly recited in the claims. No claim element herein is to be construed under the provisions of 35 U.S.C. §112, sixth paragraph, unless the element is expressly recited using the phrase "means for" or, in the case of a method claim, the element is recited as a "step" instead of an "act".
WE CLAIM:

Claims

WHAT IS CLAIMED IS:
1. A wireless home entertainment system, comprising: at least one server (12) having at least one manipulable authentication element (20, 22) thereon; and
at least one component (14) in wireless communication with the server
(12) and having at least one manipulable authentication element (30) thereon, neither element being a general purpose data entry element, whereby a person can cause the server (12) to regard the component (14) as being authenticated by manipulating the authentication elements (20, 22, 30).
2. The system of Claim 1, wherein the server (12) includes logic for authenticating the component (14) when the elements (20/22, 30) are manipulated simultaneously with each other.
3. The system of Claim 1, wherein the server (12) includes logic for authenticating the component (14) when the elements (20/22, 30) are manipulated within a predetermined time threshold of each other.
4. The system of Claim 1, comprising at least two authentication elements (20, 22) on the server (12) for establishing respective levels of authentication for the component (14).
5. The system of Claim 1, wherein the elements are buttons.
6. The system of Claim 1, wherein the component (14) includes logic for transmitting at least one component identification in response to manipulating the authentication element (30) on the component (14).
7. The system of Claim 1, wherein the component (14) includes logic for transmitting at least one encryption result generated at least in part using a component identification, the encryption result being transmitted in response to manipulating the authentication element (30) on the component (14).
8. The system of Claim 1, wherein the server (12) further comprises means
(24) for indicating that the component (14) is authenticated.
9. The system of Claim 8, wherein the means for indicating generates an audible or visual signal.
10. A method for authenticating a component (14) in wireless communication with a server (12) to the server (12), comprising: depressing an authentication button on the server (12); depressing an authentication button on the component (14) to cause the component (14) to transmit a message; and returning "authenticated" at the server (12) in response to receiving the message only if the buttons are depressed simultaneously with each other or within a predetermined time period of each other.
PCT/US2003/025723 2002-08-20 2003-08-18 System and method for authenticating wireless component WO2004019550A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003259875A AU2003259875A1 (en) 2002-08-20 2003-08-18 System and method for authenticating wireless component

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/225,332 2002-08-20
US10/225,332 US7260714B2 (en) 2002-08-20 2002-08-20 System and method for authenticating wireless component

Publications (2)

Publication Number Publication Date
WO2004019550A2 true WO2004019550A2 (en) 2004-03-04
WO2004019550A3 WO2004019550A3 (en) 2004-03-25

Family

ID=31946299

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/025723 WO2004019550A2 (en) 2002-08-20 2003-08-18 System and method for authenticating wireless component

Country Status (3)

Country Link
US (2) US7260714B2 (en)
AU (1) AU2003259875A1 (en)
WO (1) WO2004019550A2 (en)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4644998B2 (en) * 2001-09-28 2011-03-09 ブラザー工業株式会社 Authentication system, authentication device, and service providing device
US7260714B2 (en) * 2002-08-20 2007-08-21 Sony Corporation System and method for authenticating wireless component
US8271786B1 (en) * 2002-10-16 2012-09-18 Hewlett-Packard Development Company, L.P. Method and system for providing secure communications between a first and a second peer device
US20050135628A1 (en) * 2003-11-17 2005-06-23 Sony Corporation System and method for authenticating components in wireless home entertainment system
US7734155B2 (en) * 2003-12-08 2010-06-08 Sony Corporation Multimedia home network computer
US20050235364A1 (en) * 2004-04-15 2005-10-20 Wilson Christopher S Authentication mechanism permitting access to data stored in a data processing device
US10972536B2 (en) 2004-06-04 2021-04-06 Apple Inc. System and method for synchronizing media presentation at multiple recipients
US8443038B2 (en) 2004-06-04 2013-05-14 Apple Inc. Network media device
US8797926B2 (en) 2004-06-04 2014-08-05 Apple Inc. Networked media station
US20080229335A1 (en) * 2004-06-04 2008-09-18 Apple Computer, Inc. Network media device
US20070110074A1 (en) * 2004-06-04 2007-05-17 Bob Bradley System and Method for Synchronizing Media Presentation at Multiple Recipients
US20050278462A1 (en) * 2004-06-14 2005-12-15 Gillespie Vandy L Wireless home entertainment interconnection and control system and method
US7428747B2 (en) * 2005-01-25 2008-09-23 Sony Corporation Secure channel reservation
US7703134B2 (en) * 2005-01-28 2010-04-20 Sony Corporation De-authentication of network component
US7739513B2 (en) 2005-02-22 2010-06-15 Sony Corporation Secure device authentication
US20060248252A1 (en) * 2005-04-27 2006-11-02 Kharwa Bhupesh D Automatic detection of data storage functionality within a docking station
KR20080077991A (en) * 2005-12-19 2008-08-26 마쯔시다덴기산교 가부시키가이샤 Content management system
US7640577B2 (en) * 2006-02-14 2009-12-29 Sony Corporation System and method for authenticating components in wireless home entertainment system
US20070219909A1 (en) * 2006-03-14 2007-09-20 Robert Hardacker System and method for automatically updating timed DRM keys
US8886125B2 (en) 2006-04-14 2014-11-11 Qualcomm Incorporated Distance-based association
US9215581B2 (en) 2006-04-14 2015-12-15 Qualcomm Incorported Distance-based presence management
US8552903B2 (en) 2006-04-18 2013-10-08 Qualcomm Incorporated Verified distance ranging
US8607281B2 (en) 2006-09-07 2013-12-10 Porto Vinci Ltd. Limited Liability Company Control of data presentation in multiple zones using a wireless home entertainment hub
US8935733B2 (en) 2006-09-07 2015-01-13 Porto Vinci Ltd. Limited Liability Company Data presentation using a wireless home entertainment hub
US9386269B2 (en) 2006-09-07 2016-07-05 Rateze Remote Mgmt Llc Presentation of data on multiple display devices using a wireless hub
US9319741B2 (en) 2006-09-07 2016-04-19 Rateze Remote Mgmt Llc Finding devices in an entertainment system
US9233301B2 (en) 2006-09-07 2016-01-12 Rateze Remote Mgmt Llc Control of data presentation from multiple sources using a wireless home entertainment hub
US9554061B1 (en) * 2006-12-15 2017-01-24 Proctor Consulting LLP Smart hub
US8837724B2 (en) * 2007-03-27 2014-09-16 Qualcomm Incorporated Synchronization test for device authentication
US9141961B2 (en) 2007-06-20 2015-09-22 Qualcomm Incorporated Management of dynamic mobile coupons
US9524502B2 (en) 2007-06-20 2016-12-20 Qualcomm Incorporated Management of dynamic electronic coupons
US9483769B2 (en) 2007-06-20 2016-11-01 Qualcomm Incorporated Dynamic electronic coupon for a mobile environment
KR20110090602A (en) * 2010-02-04 2011-08-10 삼성전자주식회사 Method and apparatus for authenticating public key without authentication server
US10542372B2 (en) 2011-03-15 2020-01-21 Qualcomm Incorporated User identification within a physical merchant location through the use of a wireless network
US9306742B1 (en) 2013-02-05 2016-04-05 Google Inc. Communicating a secret
DE102014226905A1 (en) * 2014-12-23 2016-06-23 Continental Automotive Gmbh A vehicle multimedia system and method for data link of a vehicle multimedia system with at least one mobile terminal
US10993274B2 (en) 2018-03-30 2021-04-27 Apple Inc. Pairing devices by proxy
US11297369B2 (en) 2018-03-30 2022-04-05 Apple Inc. Remotely controlling playback devices
US10783929B2 (en) 2018-03-30 2020-09-22 Apple Inc. Managing playback groups
US10614857B2 (en) 2018-07-02 2020-04-07 Apple Inc. Calibrating media playback channels for synchronized presentation
US10750433B1 (en) * 2018-09-14 2020-08-18 Amazon Technologies, Inc. Gateway selection in a mesh network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5987153A (en) * 1996-04-29 1999-11-16 Quintet, Inc. Automated verification and prevention of spoofing for biometric data
US6202158B1 (en) * 1997-04-11 2001-03-13 Hitachi, Ltd. Detection method of illegal access to computer system
US6275934B1 (en) * 1998-10-16 2001-08-14 Soft Book Press, Inc. Authentication for information exchange over a communication network
US6374079B1 (en) * 2000-01-04 2002-04-16 Pni Corporation Modular RF communication module for automated home and vehicle systems
US6608911B2 (en) * 2000-12-21 2003-08-19 Digimarc Corporation Digitally watermaking holograms for use with smart cards

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5574860A (en) 1993-03-11 1996-11-12 Digital Equipment Corporation Method of neighbor discovery over a multiaccess nonbroadcast medium
US5555376A (en) 1993-12-03 1996-09-10 Xerox Corporation Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request
US5544322A (en) * 1994-05-09 1996-08-06 International Business Machines Corporation System and method for policy-based inter-realm authentication within a distributed processing system
US5775937A (en) 1994-06-01 1998-07-07 Itt Composants Et Instrumets Card connector with switch
US6353599B1 (en) * 1995-10-16 2002-03-05 Nec Corporation Wireless enumeration
US5729734A (en) * 1995-11-03 1998-03-17 Apple Computer, Inc. File privilege administration apparatus and methods
US5892824A (en) * 1996-01-12 1999-04-06 International Verifact Inc. Signature capture/verification systems and methods
US6097292A (en) * 1997-04-01 2000-08-01 Cubic Corporation Contactless proximity automated data collection system and method
US6044062A (en) 1996-12-06 2000-03-28 Communique, Llc Wireless network system and method for providing same
US6157935A (en) * 1996-12-17 2000-12-05 Tran; Bao Q. Remote data access and management system
US6151628A (en) 1997-07-03 2000-11-21 3Com Corporation Network access methods, including direct wireless to internet access
US6405049B2 (en) * 1997-08-05 2002-06-11 Symbol Technologies, Inc. Portable data terminal and cradle
US5836776A (en) 1997-08-29 1998-11-17 Tru-Connector Corporation Connector with integral internal switch actuator and method of using the same
US6161134A (en) * 1998-10-30 2000-12-12 3Com Corporation Method, apparatus and communications system for companion information and network appliances
US6269395B1 (en) 1998-12-21 2001-07-31 Nortel Networks Limited Method and system in a computer-based system for providing access to services associated with different access points
US6272129B1 (en) 1999-01-19 2001-08-07 3Com Corporation Dynamic allocation of wireless mobile nodes over an internet protocol (IP) network
US6028950A (en) * 1999-02-10 2000-02-22 The National Registry, Inc. Fingerprint controlled set-top box
US6650901B1 (en) * 2000-02-29 2003-11-18 3Com Corporation System and method for providing user-configured telephone service in a data network telephony system
US7260638B2 (en) 2000-07-24 2007-08-21 Bluesocket, Inc. Method and system for enabling seamless roaming in a wireless network
WO2002025460A1 (en) 2000-09-19 2002-03-28 Phatnoise, Inc. Device-to-device network
FI20002466A (en) 2000-11-10 2002-05-11 Nokia Corp Authentication method
US7058978B2 (en) 2000-12-27 2006-06-06 Microsoft Corporation Security component for a computing device
US6595929B2 (en) * 2001-03-30 2003-07-22 Bodymedia, Inc. System for monitoring health, wellness and fitness having a method and apparatus for improved measurement of heat flow
US6641050B2 (en) * 2001-11-06 2003-11-04 International Business Machines Corporation Secure credit card
US6865555B2 (en) * 2001-11-21 2005-03-08 Digeo, Inc. System and method for providing conditional access to digital content
US6837724B2 (en) 2002-06-27 2005-01-04 Molex Incvorporated Electrical connector with an internal switch
US7260714B2 (en) * 2002-08-20 2007-08-21 Sony Corporation System and method for authenticating wireless component
US7030856B2 (en) * 2002-10-15 2006-04-18 Sony Corporation Method and system for controlling a display device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5987153A (en) * 1996-04-29 1999-11-16 Quintet, Inc. Automated verification and prevention of spoofing for biometric data
US6202158B1 (en) * 1997-04-11 2001-03-13 Hitachi, Ltd. Detection method of illegal access to computer system
US6275934B1 (en) * 1998-10-16 2001-08-14 Soft Book Press, Inc. Authentication for information exchange over a communication network
US6374079B1 (en) * 2000-01-04 2002-04-16 Pni Corporation Modular RF communication module for automated home and vehicle systems
US6608911B2 (en) * 2000-12-21 2003-08-19 Digimarc Corporation Digitally watermaking holograms for use with smart cards

Also Published As

Publication number Publication date
AU2003259875A1 (en) 2004-03-11
US20050132234A1 (en) 2005-06-16
US7356691B2 (en) 2008-04-08
US20040054897A1 (en) 2004-03-18
AU2003259875A8 (en) 2004-03-11
US7260714B2 (en) 2007-08-21
WO2004019550A3 (en) 2004-03-25

Similar Documents

Publication Publication Date Title
US7260714B2 (en) System and method for authenticating wireless component
US9002013B2 (en) System and apparatus for information display
US10257198B2 (en) Password input method for devices with limited user interface
KR100643325B1 (en) Network and creating method of domain thereof
CN102265681B (en) The method that the orientation of the equipment in network is found
CN102265551B (en) Secure and efficient domain key distribution for device registration
US20030061606A1 (en) Method and apparatus for inhibiting functions of an electronic device according to predefined inhibit rules
KR100937881B1 (en) System for remote control of identical devices
US20100077026A1 (en) Method of registering access permission and a server apparatus
US20070162762A1 (en) Ownership sharing method and apparatus using secret key in home network remote controller
JP4156770B2 (en) Communication device and communication method thereof
CN102387501A (en) Secure wireless link between two devices using probes
US8432490B2 (en) Display systems and information display methods thereof
JP2008199620A (en) Method, mobile terminal, processing apparatus and program for executing verification process
JP2004007567A (en) Communications system, communications method, and communications program
US20100017612A1 (en) Electronic Apparatus and Communication System
US20080133919A1 (en) Method and apparatus for performing authentication
US8527756B2 (en) Security device and building block functions
JP2006191403A (en) Method for exchanging security information, recorder apparatus and television receiver
US7703134B2 (en) De-authentication of network component
JP2001236315A (en) User authentication system, user, authentication support device, and storage medium stored with user authenticating program
KR100665329B1 (en) An automatic pairing method between av receiver/transmitter of wireless local area network
CN117880567A (en) Methods, systems, and media for presenting media content items using multiple devices
JP2003178033A (en) Authentication method, authentication system and authentication token
JP2006180379A (en) Remote controller and information terminal for domestic electrical appliance

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP