Browse Prior Art Database

One Time Security Code

IP.com Disclosure Number: IPCOM000245451D
Publication Date: 2016-Mar-10
Document File: 5 page(s) / 16K

Publishing Venue

The IP.com Prior Art Database

Abstract

We propose systems and methods by which an end user of a device can gain one time access to a restricted configuration mode of the device. In the proposed system, a user can obtain a "request" code from the device and can provide the obtained request code to a support system. The support system, when presented with a request code, can provide back to the user a singleuse "access" code that can be entered into the device. The access code, when entered into the device and when verified by the device as being valid, can unlock the restricted configuration mode of the device.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 29% of the total text.

Page 01 of 5

ONE TIME SECURITY CODE

Abstract

    We propose systems and methods by which an end user of a device can gain one time access to a restricted configuration mode of the device. In the proposed system, a user can obtain a "request" code from the device and can provide the obtained request code to a support system. The support system, when presented with a request code, can provide back to the user a single- use "access" code that can be entered into the device. The access code, when entered into the device and when verified by the device as being valid, can unlock the restricted configuration mode of the device.

Disclosure

    Many scenarios exist in which an end user uses a device at home or in the field, at a location physically remote from support personnel who can provide technical assistance for the device. In one example, the device can be a medical infusion pump and the end user can be a patient. In another example, the device can be a television or other home entertainment unit, and the end user can be a consumer. In still another example, the device can be a car and the end user can be a driver. These are just a few of many possible examples.

    In some of the examples, the device is set up to operate in a particular configuration, and the programming/settings/parameters that define that particular operating configuration are not normally modifiable by the end user. This does not necessarily mean that no programming or configuration of any kind is available to the end user, but the user is generally precluded from accessing the programming/settings/parameters that define the particular operating configuration of the device. Preclusion from accessing certain programming/settings/parameters may be particularly desirable when the device is a medical infusion pump, since otherwise potentially harmful or dangerous operating conditions resulting from such access could affect the end user (i.e., the patient).

    Situations may arise in which it is desirable or necessary to modify the particular operating configuration of the device. One solution is to have the particular operating configuration modified by support personnel, which can require sending support personnel to the device in the field, or bringing the device in from the field to the support personnel. This can be


Page 02 of 5

expensive and/or time consuming. Alternatively, another set of solutions can include lifting the barriers that normally prevent end users from modifying the particular operating configuration of the device. The present disclosure is directed toward systems and methods that allow lifting such modification barriers, without lifting such barriers permanently.

    In the prior art, some devices incorporate a restricted configuration mode that is not normally accessible to end users. Access to the restricted configuration mode can be gained, in some implementations, by entry of a predetermined security or "secret" code such as a password. In some implementations, it is no...