Multiple near field communication tags in a pairing domain

ABSTRACT

A system and method for simply and securely pairing multiple Bluetooth or other wireless electronic devices in a network. Multiple Near Field Communication (NFC) read-only tags are places in a vehicle or other defined space, such that users of NFC-enabled electronic devices can pass their device near one of the NFC tags, which then transfers encryption key data to the user&#39;s device, allowing that device to be automatically joined to a small, secure wireless network. Various embodiments are disclosed for establishing and controlling the network, and applications are suggested for using the ad-hoc network—such as for the control of a vehicle&#39;s entertainment system.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention relates generally to wireless communication betweenconsumer electronics devices and, more particularly, to the use of NearField Communication tags for simplifying the process of pairing, orestablishing secure communications between, two or more consumerelectronics devices—including in-vehicle systems, mobile phones, MP3music players, laptop computers, gaming systems, digital cameras, andothers.

2. Discussion of the Related Art

Many modern consumer electronics devices use the Bluetooth standard forwirelessly communicating with other such devices. One simple example isa Bluetooth headset for a mobile phone. Once the headset and the mobilephone are “paired”—that is, they have established a communicationchannel between the two devices—then the user of the mobile phone canoperate the phone in a hands-free fashion via the wireless headset.Other examples of Bluetooth-compatible devices include small personalmusic players which can use Bluetooth to wirelessly play their musicover the amplifier and speakers of a larger stereo system, and personalcomputers which can use Bluetooth to wirelessly connect many types ofperipheral devices.

Bluetooth technology has also become a popular feature in vehicles. Manyvehicles now include capability for a driver or occupant to wirelesslyconnect a personal consumer electronics device with the vehicle'sembedded entertainment and communication systems via Bluetooth. Oneexample of this is using a vehicle's microphone and speaker system tooperate a driver's mobile phone in a hands-free fashion. Another exampleis playing music from a small personal music player through a vehicle'sstereo sound system. Bluetooth wireless connectivity has gained rapidacceptance for these types of applications and many others.

But until now, “pairing” two Bluetooth devices—that is, establishingsecure communications between them—has been a cumbersome process. Thisis because security measures have been designed into the process ofestablishing Bluetooth communications between devices to prevent accessby unknown or unauthorized devices. The security measures include therequired sharing of encryption keys between devices, and this leads to aprocess that is often found to be confusing or problematic to the deviceusers. The same type of problem exists in establishing wireless LocalArea Network (wireless LAN, also known as Wi-Fi) connectivity between acomputer and a wireless router. What is needed is a way to maintain thesecurity of using an encryption key to establish either Bluetooth orWi-Fi connectivity, but make the pairing process much simpler for thedevice user.

SUMMARY OF THE INVENTION

In accordance with the teachings of the present invention, systems andmethods are disclosed for quickly and easily establishing securewireless communication between two or more consumer electronic devices.The electronic devices can communicate using the Bluetooth wirelesscommunication standard, wireless Local Area Network (wireless LAN, orWi-Fi) standard, or other wireless communication protocols. Thedisclosed systems and methods use Near Field Communication (NFC)technology to automatically share encryption key data, which is requiredby both Bluetooth and Wi-Fi in order to establish secure communicationbetween devices. The resultant process for pairing devices, orestablishing secure communication between them, is greatly simplifiedfor the device users.

Additional features of the present invention will become apparent fromthe following description and appended claims, taken in conjunction withthe accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a partial interior view of a vehicle showing a driver sidedoor containing a Near Field Communication (NFC) tag;

FIG. 2 is a flow chart diagram showing a process for pairing Bluetoothdevices that uses an NFC tag and a button;

FIG. 3 is an illustration of a Bluetooth button on a vehicle used in theprocess of FIG. 2;

FIG. 4 is a flow chart diagram showing a process for pairing Bluetoothdevices that uses an NFC tag and a tuned object detection device;

FIG. 5 is a block diagram of a tuned circuit used in the process of FIG.4;

FIG. 6 is a flow chart diagram showing a process for pairing Bluetoothdevices that uses an NFC tag and a software algorithm;

FIG. 7 is a block diagram of a system including two Bluetooth deviceswhich can be securely paired by placing the devices near each other;

FIG. 8 is a flow chart diagram showing a process for pairing theBluetooth devices shown in FIG. 7;

FIG. 9 is a block diagram of a system in a vehicle which uses NFC tagsfor secure pairing of multiple Bluetooth devices; and

FIG. 10 is a flow chart diagram showing a process for quick control ofan entertainment system's playback features using NFC tags for securepairing of Bluetooth devices.

DETAILED DESCRIPTION OF THE EMBODIMENTS

The following discussion of the embodiments of the invention directed tosimplified pairing of wireless electronic devices employing Near FieldCommunication tags is merely exemplary in nature, and is in no wayintended to limit the invention or its applications or uses. Forexample, most of the embodiments are described in terms of Bluetoothdevice connectivity, but connectivity of Wi-Fi devices is an equallyappropriate example in some cases.

There are many scenarios in which it is desirable for two or moreelectronic devices to wirelessly communicate with each other. One commonscenario is where a person has a mobile phone or other electronic devicewhich she wants to use in her vehicle. In the case of the mobile phone,it is advantageous for the user to integrate the mobile phone with theembedded systems in the vehicle, such as the speakers and microphone,which are included as part of the vehicle's information andentertainment systems. This integration allows the mobile phone to beoperated in a hands-free mode while in the vehicle. Many vehiclemanufacturers now include Bluetooth capabilities in their vehicles,specifically for this purpose.

Bluetooth is an open, secure protocol for wirelessly exchanging dataover short distances from fixed and mobile devices. Bluetooth uses radiofrequency (RF) technology at 2.4 gigahertz or GHz (2.4×10⁹ cycle/sec),to wirelessly communicate between two or more devices, at a gross datarate of up to 1 mega-bit per second (Mb/s). Bluetooth provides a way toconnect and exchange information between devices, such as mobile phones,computers, vehicle communication and entertainment systems, printers,Global Positioning System (GPS) receivers, digital cameras, and videogame consoles. When a device is said to be Bluetooth enabled, it meansthat device includes a small computer chip that contains the Bluetoothradio and software that enables that device to connect to other deviceswirelessly using Bluetooth technology.

While the Bluetooth standard supports secure and reliable wirelesscommunication between electronic devices, and while Bluetooth is widelysupported by both vehicle manufacturers and consumer electronics devicemanufacturers, many consumers feel that the process of establishingBluetooth communications between two devices, often known as pairing, iscumbersome and unintuitive. The embodiments of the present inventionsolve this problem by using Near Field Communication (NFC) technology tosimplify the multi-step data-intensive Bluetooth pairing process.

Near Field Communication (NFC) is a short-range wireless connectivitytechnology that evolved from a combination of existing contactlessidentification and interconnection technologies. Products with built-inNFC can simplify the way consumer devices interact with one another,helping speed connections, receive and share information, and make fastand secure payments. Operating at 13.56 megahertz, or MHz (13.56×10⁶cycles/sec), and transferring data at up to 424 Kilo-bits per second,NFC provides intuitive, simple, and reliable communication betweenelectronic devices. NFC is both a “read” and “write” technology.Communication between two NFC-compatible devices occurs when they arebrought within about two to four centimeters of one another. A simplewave or touch can establish an NFC connection, which is then compatiblewith other known wireless technologies, such as Bluetooth or Wi-Fi. Theunderlying layers of NFC technology follow universally implementedstandards of the International Organization for Standardization (ISO)and other standards organizations. Because the transmission range is soshort, NFC-enabled transactions are inherently secure. Also, physicalproximity of the device to the reader gives users the reassurance ofbeing in control of the process. NFC can be used with a variety ofdevices, from mobile phones that enable payment or transfer informationto digital cameras that send photos to a television with just a touch.NFC read-only tags are very inexpensive, and are small enough to beplaced almost anywhere. The NFC tag is a passive device with no power ofits own. When an NFC tag is used, a user passes an NFC enabledreader/writer device near the NFC tag. A small amount of power is takenby the NFC tag from the reader/writer device to power the tagelectronics. The tag is then enabled to transfer a small amount ofinformation to the reader/writer device. Many Bluetooth enabled devicesnow include Near Field Communication (NFC) reader/writer capabilities.

One general approach to implementing the present invention employs lowcost NFC read-only tags in a vehicle to enable simple and secure devicepairing. FIG. 1 is a partial inside view of a vehicle 16 showing adriver side door 10 with an NFC tag 12 affixed to the door 10. The tag12 can be attached by a stick-on decal, designed into a component whichsnaps into the door trim panel, or any other design technique whichresults in the tag 12 being located on the surface of the inner doortrim panel. The NFC tag 12 in this embodiment is a read-only tag whichcan be encoded with the encryption key of the host vehicle's Bluetoothsystem or other information that could include Bluetooth device address,pass code, system identity or other information. The tag 12 does notrequire any power supply or data connection to the vehicle 16. It isentirely stand-alone, and it acts as a transponder by echoing back theencoded encryption key when queried by an NFC reading device. The door10 is used here as an example, but the NFC tag 12 could be placed in anyother location which is convenient to a driver of the vehicle 16, suchas a steering wheel or a dash panel.

In order for a driver to pair an electronic device 14, such as a mobilephone, to the vehicle, the driver must pass the device 14 within abouttwo centimeters of the NFC tag 12. This allows the device 14, if it hasNFC reader/writer capability, to read the vehicle's Bluetooth encryptionkey from the tag 12. Three embodiments of this approach are proposed,where all of them require the NFC tag 12 for passing the vehicle'sencryption key to the other wireless device 14. The three embodimentsdisclose different methods of triggering the pairing process; two areimplemented in hardware, and one is implemented in an algorithm.

A common factor in all of the vehicle-device pairing systems and methodsdescribed herein is that the vehicle's Bluetooth-enabled device, bydefault, is in a silent mode. This means that the vehicle's Bluetoothdevice will not accept any pairing request, regardless of whetheranother Bluetooth device is transmitting a proper encryption key. Thesilent mode, also known as non-discovery mode, is used by design toprevent unwanted or unauthorized pairing attempts, or even malicioushacking attempts. Some trigger is needed to cause the vehicle's embeddedBluetooth system to temporarily switch to a discovery mode, whereBluetooth pairing requests may be accepted.

FIG. 2 is a flow chart diagram 20 showing a process for pairingBluetooth devices. In this embodiment, the triggering mechanism is abutton in the vehicle 16 which the driver or user would push. FIG. 3shows a cut-away view of the vehicle 16 including a button 22 fortriggering the pairing process, as discussed. The process begins withthe vehicle's Bluetooth device in a silent or non-discovery mode at box24. The process waits at decision diamond 26 for the button 22 to bepushed. Until the button 22 is pushed, the process remains in thenon-discovery mode at the box 24. If the driver pushes the button 22 toinitiate the Bluetooth pairing process, the process switches to adiscovery mode at box 28. Within a short period of time, to be definedin the specific vehicle application, the driver or user of the mobilephone or other electronic device 14 must pass the device 14 near the NFCtag 12. This allows the device 14 to read the vehicle's Bluetoothencryption data, including a passkey and a Bluetooth device address, andbegin transmitting the encryption data in an attempt to pair with thevehicle's embedded device. With the vehicle's Bluetooth system in thediscovery mode as a result of the push of the button 22, the system willreceive the transmission from the device 14. The algorithm willrecognize its own encryption data at decision diamond 30, which thedevice 14 received from the NFC tag 12. The process will then proceed tobox 32 where it will continue the information exchange andauthentication with the device 14, per the standard Bluetooth pairingprocess. The pairing process will be completed with no further actionrequired by the user of the device 14.

FIG. 4 is a flow chart diagram 40 showing a process for pairingBluetooth devices that uses the NFC tag 12 and a tuned object detectiondevice, such as tuned circuit 42 shown in FIG. 5, operating as thetriggering mechanism to put the vehicle's Bluetooth system in thediscovery mode. For the purposes of this embodiment, the tuned circuit42 is a simple electronic circuit which senses the presence of an objectnearby, without requiring a button to be pushed or any other physicalcontact. The tuned circuit 42 could be an inductive sensor, a capacitivesensor, or any other type of non-contact object detection circuit. Thetuned circuit 42 could be placed anywhere in the passenger compartmentof the vehicle 16, but would most logically be placed near the NFC tag12. In that way, the user could pass the device 14 near both the tag 12and the tuned circuit 42 in one motion, thereby allowing the device 14to read the vehicle Bluetooth device's encryption data from the tag 12and also causing the tuned circuit 42 to trigger the vehicle Bluetoothdevice into discovery mode.

The process begins with the vehicle's Bluetooth device in thenon-discovery mode at box 44. The process waits at decision diamond 46for the tuned circuit 42 to detect the presence of a nearby object.Until the circuit 42 detects an object, the process remains in thenon-discovery mode at box 44. When the driver passes the electronicdevice 14 near the tuned circuit 42 the Bluetooth pairing process istriggered at decision diamond 46, and the process switches to thediscovery mode at box 48. At or near the same time, the driver or userof the device 14 passes the device 14 near the NFC tag 12. This allowsthe device 14 to read the vehicle's Bluetooth encryption data, and begintransmitting the data in an attempt to pair with the vehicle's embeddeddevice. With the vehicle's Bluetooth system in the discovery mode as aresult of the trigger from the tuned circuit 42, the vehicle's Bluetoothsystem will receive the transmission from the device 14. The vehicle'sBluetooth system will recognize its own encryption data at decisiondiamond 50, which the device 14 received from the NFC tag 12. Theprocess will then proceed to box 52 where it will continue theinformation exchange and authentication with the device 14, per thestandard Bluetooth pairing process. The pairing process will becompleted with no further action required by the user of the device 14.

FIG. 6 is a flow chart diagram 60 showing a process for pairingBluetooth devices that uses the NFC tag 12 and a software algorithm. Inthis embodiment, the triggering mechanism to put the vehicle's Bluetoothsystem in discovery mode is not a hardware device, but rather is asoftware algorithm which is running on the vehicle's Bluetooth system.The process begins with the vehicle's Bluetooth device in thenon-discovery mode at box 62. The process enters a limited discoverymode whenever the vehicle's ignition is on. If the ignition is on atdecision diamond 64, then the algorithm enters a limited discovery modeat box 66. In the limited discovery mode, the system listens for anOut-Of-Band (OOB) pairing request from another device, such as thedevice 14. An Out-Of-Band pairing request is enabled by communicationfrom a device which is outside the Bluetooth frequency bandwidth of 2.4GHz. In this case, the Out-Of-Band pairing information is obtained bytransmitting on the NFC frequency of 13.56 MHz by the device 14.

The device 14 transmits the Out-Of-Band pairing request when it sensesthat it has received information from an NFC read-only tag, whichhappens when the user passes the device 14 near the NFC tag 12. If thealgorithm detects an Out-Of-Band pairing request at decision diamond 68,then the algorithm enters the discovery mode at box 70. If the device 14has been passed near the NFC tag 12, the device 14 will have read thevehicle Bluetooth system's encryption data, and will be transmitting thedata in a pairing attempt. With the vehicle's Bluetooth system in thediscovery mode as a result of the Out-Of-Band request trigger, thevehicle's Bluetooth system will receive the transmission from the device14. The encryption data will be checked at decision diamond 72, and willbe verified as correct when the system receives the correct encryptiondata from the device 14, which the device 14 read from the NFC tag 12.The automatic pairing process will then continue at box 74, and will becompleted with no further action required by the user of the device 14.

Simplification of the Bluetooth pairing process can be carried beyondthe vehicle-to-device embodiments described above. The same need forsimplification exists in the pairing of any two Bluetooth devices, suchas one gaming system to another, or a personal music player to a stereoamplifier/speaker system. If an NFC tag is embedded in one such device,and the tag is encoded with the Bluetooth encryption data for thatdevice, then the same general approach for proximity-based pairingemploying NFC tags can be used. In this case it is most advantageous touse a software-only approach to triggering the devices into thediscovery mode, so as not to require any extra buttons or other hardwareto be added to the electronic devices.

FIG. 7 is a block diagram of a system 80 which includes two consumerelectronics devices 82 and 86, shown as devices A and B, which can bepaired using NFC technology for sharing encryption data at very closedistances. The device 82 includes an NFC reader/writer 84, and thedevice 86 includes an NFC read-only tag 88. The device 86 can be anyBluetooth-enabled electronic device which is designed to normally remainin Bluetooth silent mode for security reasons, and which includes theNFC tag 88 for initiating the pairing process when another device isbrought within very close physical proximity—that is, within the NFCrange of about two centimeters.

FIG. 8 is a flow chart diagram 90 showing a process for pairing thedevices 82 and 86. The pairing process begins at box 92 when the device82 is placed very near the device 86. At box 94, the NFC tag 88 in thedevice 86 is activated by the presence of the device 82. The NFC tag 88transfers the data that it contains, which can include a Public Key,Bluetooth address and an ID number or other information required fordevice pairing for the device 86. Subsequently, the device 86 listensfor a Bluetooth certificate at box 96. At box 98, the device 82 readsthe information from the NFC tag 88. The device 82 then computes aBluetooth certificate at box 100, based on the Public Key, the Bluetoothaddress and the ID number. The device 82 transmits the certificate overthe Bluetooth frequency. The device 86 receives the certificate from thedevice 82 at box 102. The device 86 compares the certificate it receivedfrom the device 82 to a known self-calculated certificate. If the twocertificates match at decision diamond 104, then the device 86 switchesto the discovery mode at box 106, and the pairing process continues perthe Bluetooth standard. If the two certificates do not match, then thedevice 86 will remain in the silent mode, and no pairing will beestablished at box 108.

In the manner described above, the pairing of two Bluetooth-enabledelectronic devices is as simple as bringing the two devices very closeto each other—often described as bumping, tapping, or waving thedevices. The NFC read-only tag 88 and the software added to the device86 makes this possible, even when the device 86 is designed to normallyremain silent for security reasons.

Simplification of the pairing process between electronic devices canalso be extended to include more than two devices. NFC tags can be usedto facilitate connecting multiple electronic devices together in what isknown as a piconet, or very small network. A piconet can be establishedin any geographic space, such as a vehicle, an office or conferenceroom, or a coffee shop. In order to use NFC pairing to establish apiconet, multiple NFC tags are needed, one for each device which mayjoin the piconet.

FIG. 9 is a block diagram of a system 110 showing one embodiment formultiple device connectivity in a vehicle environment. In thisembodiment, NFC tags can be placed at various locations around thevehicle interior. For example, NFC tag 112 can be placed at a locationconvenient to the driver, such as on the door as described previously.NFC tag 114 could be located on the front passenger door, and other NFCtags 116 and 118 could be located on the back seats at passengerlocations. Each person wishing to include an electronic device in thepiconet could simply wave his or her device past the NFC tag at his orher seat location, and the device would be paired automatically, asdescribed previously.

The system 110 includes an embedded Bluetooth master device 120 thatmaintains control over the piconet, including profiles for each device.Profiles could be used to designate which features or capabilities eachdevice is allowed to use. For example, a device 122 which is known tobelong to the vehicle driver could have access to hands-free calling,navigation system control, audio playback capability, and otherfeatures. In contrast, a device 124 belonging to a rear seat passengermay only be given audio playback capability or additional capabilitiessuch as video playback that the driver would not have when the vehicleis in motion. Other capabilities of a piconet, such as multi-participantgaming systems, may specifically exclude the driver's device 122 if thevehicle is running. And still other capabilities, such as sharing musicfiles between devices, may be offered to all devices on the piconet. Themaster device 120 would control which other devices on the piconet haveaccess to shared infrastructure 126, such as vehicle speakers,microphones, and video displays. Many scenarios are possible once thenetwork of devices is established. And the NFC tag technology enablesthe network setup to be fast, flexible, simple, and secure. The onlyrequirement of each participating device is that it has NFCreader/writer capability, as many Bluetooth devices now do or will soonhave.

FIG. 10 is a flow chart diagram 130 showing a process for the quickcontrol of a vehicle entertainment system's playback features using NFCtags for secure pairing of Bluetooth devices that could be implementedin a multi-device network. The process begins at decision diamond 132that determines if an Out-Of-Band pairing request has been made. When anOut-Of-Band pairing request is detected, the process checks to determinewhether there is an existing Bluetooth network established at decisiondiamond 134. If there is no ongoing session, then the process proceedswith the pairing process and grants access to the entertainment systemplayback device at box 136. If an ongoing session is detected atdecision diamond 134, then the process determines which profile, or typeof session, is selected at box 138. If the existing session is definedas open or unrestricted control, then the existing session is ended atbox 140, the pairing process is completed, and access is granted to theplayback device at box 142. If it is determined that the existingsession is restricted, then permission is required from the devicecurrently in control of the session. At decision diamond 144, the devicein control of the existing session is asked whether it will releasecontrol. If so, then access is granted to the playback device at box146. If the device in control of the existing session does not releasecontrol, then the Out-Of-Band pairing request is ignored at box 148. Theprocess as described would allow convenient access to the entertainmentsystem controls in a vehicle for any Bluetooth device which has NFCreader/writer capability, even when the vehicle Bluetooth system isdesigned to normally remain in silent mode.

Another embodiment of a multi-device piconet could be in an officeenvironment, or even in a semi-public place like a coffee shop. In thistype of implementation, the NFC tags could be placed in furniture itemslike tables and chairs, or in something like the coffee cups at a coffeeshop. Again the NFC tags can be used to trigger Bluetooth devices whichare normally in silent mode for security reasons to begin a simple andsecure pairing process. An embodiment in a conference room of an officebuilding could be implemented as follows. Each chair, or each place at atable, could have an NFC read-only tag affixed to it. Each personwishing to join an electronic device to the conference room piconetwould just have to pass his or her device near the NFC tag. Theconference room could be equipped with a dedicated device to serve asthe master of the pairing domain, as described previously.

In an even more flexible embodiment, in a business establishmentenvironment such as a coffee shop, NFC tags could be provided, forexample, in coffee cups which have been paid for. This would allow theestablishment to control which people take advantage of the networkservices in their facility, limiting those services to paying customers.The establishment would maintain a secure wireless network, but make itvery easy for their customers to join their electronic devices to thenetwork. It would also be possible for groups of acquainted people toset up their own private piconet in an establishment like a coffee shop,by passing each person's device near the same NFC tag. This privatepiconet embodiment would not require a separate master device, that is,any one of the participating users' electronic devices could serve asthe domain master, and such an embodiment would not have access to anyshared infrastructure. It would simply be a peer-to-peer network forgaming, data sharing, or other such applications.

In all of the embodiments and environments described above, the NFC tagis used to facilitate the pairing of electronic devices, even deviceswhich normally remain silent for security reasons, without requiring auser to key in security codes or follow any other procedures.

The concept of piconets, or small networks of electronic devices,applies to communication protocols other than Bluetooth as well. Forexample, piconets are commonly established between ad hoc groups ofpersonal computers (PC's) using wireless Local Area Networks, or Wi-Fi.

Wi-Fi is a name commonly used to represent wireless Local Area Network(LAN) communication based on the Institute of Electrical and ElectronicsEngineers' (IEEE) 802.11 standards. Originally an acronym for “wirelessfidelity”, the term Wi-Fi is now commonly used by the public as asynonym for IEEE 802.11 wireless LAN communication. Like Bluetooth,Wi-Fi is a Radio Frequency (RF) communication technology. In a typicalWi-Fi environment, one or more electronic devices communicate with awireless router or access point, where the router or access point isphysically connected by wire to a Wide Area Network (WAN) and/or theInternet. Computers or other electronic devices wishing to wirelesslycommunicate with the access point must be within range of the RF signal,and if security has been implemented on the router or access point,connecting devices must also know and share an encryption key in orderto be admitted. Wi-Fi is supported by many applications and devicesincluding video game consoles, home networks, personal digitalassistants, mobile phones, computer operating systems, and other typesof consumer electronics.

NFC technology is equally applicable to the establishment of Wi-Finetworks as it is to Bluetooth networks. Using NFC tags forestablishment of secure Wi-Fi networks is particularly applicable in theoffice environment or the business establishment environment describedpreviously, for fast and secure networking of laptop computers. A secureWi-Fi network requires each participating wireless device such as alaptop computer to know and transmit an encryption key in order to beallowed to join the network. This is very similar to the encryption keyinformation described previously for Bluetooth pairing. NFC read-onlytags can be used to communicate the network encryption key to anycomputer with NFC reader/writer capability which is brought within closeproximity, and that computer can then use the encryption key to gainaccess to the wireless network.

The foregoing discussion discloses and describes merely exemplaryembodiments of the present invention. One skilled in the art willreadily recognize from such discussion and from the accompanyingdrawings and claims that various changes, modifications and variationscan be made therein without departing from the spirit and scope of theinvention as defined in the following claims.

1. A method for establishing a secure wireless communications networkbetween electronic devices, said method comprising: providing aplurality of electronic devices which use a common protocol for wirelesscommunications with other devices, each device containing a Near FieldCommunication reader/writer; providing a master electronic device whichis capable of controlling other devices in the network; providing aplurality of Near Field Communication read-only tags within a definedgeographic space, where each tag contains secret information about themaster electronic device; passing each electronic device which isintended to be added to the network near one of the Near FieldCommunication read-only tags; computing and wirelessly transmitting anauthentication certificate from each device which is calculated from thesecret information which was read from a Near Field Communication tag;using the transmitted authentication certificate, if valid, to triggerthe master electronic device to temporarily switch from anon-discoverable mode to a discoverable mode; and completing theestablishment of communications by exchanging additional data asrequired by the wireless communications protocol being used.
 2. Themethod of claim 1 wherein the defined geographic space is a vehiclewhich includes an entertainment system, and each tag of the plurality ofNear Field Communication read-only tags is placed at a seating locationwithin the vehicle.
 3. The method of claim 2 further comprising defininga profile of attributes for each device, said profile being definedbased on which Near Field Communication tag was used by the device tojoin the network.
 4. The method of claim 3 further comprising using themaster device to control privileges for each device in the network basedon each device's profile.
 5. The method of claim 4 wherein theprivileges for each device include playback of audio and video on thevehicle's entertainment system.
 6. The method of claim 5 furthercomprising; allowing a user of each device to request access to thevehicle's entertainment system; and allowing a user of the master deviceto grant or deny each request for access to the vehicle's entertainmentsystem.
 7. The method of claim 1 wherein the protocol for wirelesscommunications is Bluetooth.
 8. The method of claim 1 wherein theprotocol for wireless communications is Wi-Fi wireless local areanetwork.
 9. The method of claim 1 wherein the defined geographic spaceis a room within a building.
 10. The method of claim 9 wherein each tagin the plurality of Near Field Communication read-only tags is placed ata seating location within the room.
 11. The method of claim 9 whereineach tag in the plurality of Near Field Communication read-only tags isplaced on a portable object which may be moved anywhere within the room.12. The method of claim 11 wherein each tag in the plurality of NearField Communication read-only tags also contains other informationbesides the secret information about the master electronic device.
 13. Asystem for establishing a secure wireless communications network betweenelectronic devices, said system comprising: a plurality of electronicdevices which use a common protocol for wireless communications withother devices, each device containing a Near Field Communicationreader/writer; a master electronic device which is capable ofcontrolling other devices in a network; a plurality of Near FieldCommunication read-only tags within a defined geographic space, whereeach tag contains secret information about the master electronic device;and a triggering mechanism that causes the master electronic device totemporarily switch from a non-discoverable mode to a discoverable mode.14. The system of claim 13 further comprising: a software algorithm oneach device in the plurality of electronic devices for computing andwirelessly transmitting an authentication certificate which iscalculated from the secret information which was read from a Near FieldCommunication tag; and a software algorithm on the master electronicdevice for detecting a transmitted authentication certificate and, upondetection of a valid certificate, cause the master electronic device totemporarily switch from the non-discoverable mode to the discoverablemode.
 15. The system of claim 14 wherein the triggering mechanism forcausing the master electronic device to temporarily switch from thenon-discoverable mode to the discoverable mode is the software algorithmon the master electronic device.
 16. The system of claim 15 wherein thedefined geographic space is a vehicle, and the wireless communicationsprotocol is Bluetooth.
 17. The system of claim 16 further comprising acontroller for managing privileges of each device in the network andallowing selective access to systems within the vehicle.
 18. The systemof claim 17 wherein the systems within the vehicle include audio andvideo systems, and the privileges of each device include playbackfunctions on the audio and video systems.
 19. The system of claim 15wherein the defined geographic space is a room within a building, andthe wireless communications protocol is Wi-Fi wireless local areanetwork.
 20. The system of claim 19 wherein each tag in the plurality ofNear Field Communication read-only tags is placed on a portable objectwhich may be moved anywhere within the room, and may also contain otherinformation besides the secret information about the master electronicdevice.