Wearable device and a method for storing credentials associated with an electronic device in said wearable device

ABSTRACT

The disclosure relates in general to a wearable device for serving as a personal id towards electronic devices. In particular the disclosure provides a wearable device for storing credential data or password from an electronic device, which device is configured for serving as personal id towards an electronic device, such as a mobile phone or other smart devices.

RELATED APPLICATION DATA

This application is a divisional application of U.S. patent applicationSer. No. 14/533,492, filed Nov. 5, 2014, which claims the benefit ofU.S. Provisional Patent Application No. 61/912,223, filed Dec. 5, 2013,the disclosures of which are incorporated herein by reference in theirentireties.

TECHNICAL FIELD

The disclosure relates in general to a wearable device for storingcredentials associated with electronic devices. In particular thedisclosure provides for a wearable device and a method for storingcredential data, such as a password associated with an electronicdevice.

BACKGROUND ART

Many portable devices, such as for example, mobile phones, hand-heldcomputers, personal digital assistants (PDAs), etc. have become the hubfor lots of private and corporate information and the loss if a portabledevice is stolen is worth more than just the hardware itself. Whenportable devices are used for transactions and payments the importanceof protecting its content increases even further. Many people protecttheir portable devices with credential data such as a 4-6 digit key orpassword, or a graphical pattern, and it is generally seen as too shortand too easy to break. Longer passwords are possible to use, however,many people consider it cumbersome to do the unlock procedure every timethe portable device is used. Yet many people have no protection at all.

Credential data is a proof of qualification, competence or clearanceissued to an individual. Examples of credentials include,certifications, security clearance, identification documents, badges,passwords, user names, keys, and so on. Credentials in informationtechnology systems, IT systems, are widely used to control access toinformation or other resources. The classic combination of a useraccount number or name and a secret password is widely used example ofIT systems credentials. An increasing number of IT systems use otherforms of documentation of credentials, such as biometric credentialtechnologies. There are several examples of biometric credentialtechnologies that could be used for this purpose such as fingerprints,face and voice recognition, iris recognition or retinal scans, and soon. It is basically up to the user to determine the level of securityneeded for that particular case.

A biometric method that is known is to use a fingerprint scanner that isarranged under the home screen displayed on an electronic device.However, such a solution can be cumbersome for the user, since the usermay have to use the same finger every time the user logs on to thedevice. Furthermore, using fingerprint is slightly slower than justpressing the button and it does not work with gloves. However, althoughthe fingerprint scanning has a given security level, it may not be highenough for certain operations and the users are reluctant to give awaytheir biometrics.

Another biometric method that is known is to use a wristband which doesheartbeat identification (ECG). The identification is done by closingthe wristlet around an arm of the user, and then a finger from the otherhand of the user is put on the wristband which closes a loop around theheart. Thereby the ECG can be detected. The user will automatically beable to logon to a mobile phone once a setup is done. However, althoughthe fingerprint scanning has a given security level, it may not be highenough for certain operations and the users are reluctant to give awaytheir biometrics.

Hence, the security level on the identification means of today does notfulfill all requirements.

SUMMARY OF THE INVENTION

With the above description in mind, then, an aspect of some embodimentsof the present invention is to provide a wearable device for serving asa personal identification device for a user towards electronic devices,such as a mobile phone or other smart devices, and a method forperforming the same, and this seeks to mitigate, alleviate or eliminateone or more of the above-identified deficiencies in the art anddisadvantages singly or in any combination.

An aspect of the present invention relates to a wearable device fortemporarily storing credential data associated with at least oneelectronic device comprising:

-   -   a detector unit configured for detecting the presence of a human        body;    -   a radio communication interface configured to communicate with        the at least one electronic device;    -   a data storage configured to store the credential data;    -   a processing circuitry configured:    -   to broadcast a signal, indicating an ability to temporarily        store credential data, when said detector unit detects the        presence of a human body;    -   to receive, using the radio communication interface, the        credential data from said electronic device;    -   to store, in the data storage, the received credential data in        the data storage as long as said detector unit detects the        presence of a human body, and    -   to transmit the credential data to the electronic device, when a        request for credentials is received.

According to one aspect the device further comprises that the processingcircuitry is configured to delete the credential data when the presenceof a human body is no longer detected.

According to one aspect the device further comprises that the processingcircuitry is configured to receive encrypted credential data.

According to one aspect the device further comprises an electronicmodule and a wearable unit. According to one aspect the device furthercomprises that the electronic module comprises the radio communicationinterface, said data storage and said processing circuitry. According toone aspect the device further comprises that the electronic modulefurther comprises said detector unit.

Another aspect of the present invention relates to a method, performedin a wearable device, of temporarily storing credentials associated withat least one electronic device within the wearable device, the methodcomprising the steps of:

-   -   broadcasting a signal, indicating an ability to temporarily        store credential data, when the presence of a human body is        detected by a detector unit;    -   receiving, using a radio communication interface, credential        data from said electronic device,    -   storing, in a data storage, the received credentials in the data        storage as long as said detector unit detects the presence of a        human body, and    -   transmitting the credential data to the electronic device, when        a request for credential data is received.

According to one aspect the method further comprises the step ofdeleting the credential data when the presence of a human body is nolonger detected.

Another aspect of the present invention relates to a method, performedin an electronic device, of temporarily storing credential dataassociated with said electronic device in a wearable device, the methodcomprising the steps of:

-   -   detecting a request for unlocking said electronic device;    -   identifying if authentication is needed;    -   receiving credential data from wearable device when opening the        electronic device.

According to one aspect the method the receiving step further comprisesthe steps of:

-   -   identifying if credential data is stored in wearable device;    -   sending request for credential data from wearable device;    -   receiving credential data from wearable device.

According to one aspect the method the receiving step further comprisesthe steps of:

-   -   identifying if credential data is stored in wearable device, and    -   receiving credential data from input device of said electronic        device.

According to one aspect the method further comprises the step ofdetecting a wearable device with ability to temporarily store credentialdata.

According to one aspect the method further comprising the steps of:

-   -   detecting a broadcast signal, indicating an ability to        temporarily store credential data,    -   sending request for permission to create a connection between        said electronic device and said wearable device (1),    -   sending credential data to said wearable device (1) for storage        in said device.

According to one aspect the method further comprises the steps ofcreating a communication channel between electronic device and wearabledevice.

The features of the above-mentioned embodiments can be combined in anycombinations.

It is an advantage with some embodiments of the invention that they mayallow for only entering credential data, i.e. a password once and thusthe user can use a password with a sever length and thus get a highersecurity level. Further, the user does not give away its biometrics,such as fingerprints, and the password is deleted from wristlet whenremoved from user. Further advantage is that the initial setup is easywith minimum interaction and the power consumption is neglect able.

Embodiments of the present disclosure will be described more fullyhereinafter with reference to the accompanying drawings, in whichembodiments of the invention are shown. This invention may, however, beembodied in many different forms and should not be construed as limitedto the embodiments set forth herein. Rather, these embodiments areprovided so that this disclosure will be thorough and complete, and willfully convey the scope of the invention to those skilled in the art.Like reference signs refer to like elements throughout. The terminologyused herein is for the purpose of describing particular embodiments onlyand is not intended to be limiting of the invention.

As used herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”“comprising,” “includes” and/or “including” when used herein, specifythe presence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

Unless otherwise defined, all terms (including technical and scientificterms) used herein have the same meaning as commonly understood by oneof ordinary skill in the art to which this invention belongs. It will befurther understood that terms used herein should be interpreted ashaving a meaning that is consistent with their meaning in the context ofthis specification and the relevant art and will not be interpreted inan idealized or overly formal sense unless expressly so defined herein.

BRIEF DESCRIPTION OF THE DRAWINGS

Further objects, features and advantages of the present invention willappear from the following detailed description of the invention, whereinembodiments of the invention will be described in more detail withreference to the accompanying drawings, in which:

FIG. 1 discloses a view of a system comprising a wearable externaldevice, e.g. a wristlet, and an electronic device, e.g. a mobile phone,according to the disclosure.

FIG. 2a discloses a block diagram of a wearable external device, e.g. awristlet, according to the disclosure.

FIG. 2b discloses a block diagram of an electronic module comprised in awearable external device, according to the disclosure.

FIG. 3 discloses a block diagram of an electronic device, e.g. a mobilephone.

FIG. 4 discloses a flow chart of the method performed in an electronicdevice according to the disclosure.

FIG. 5 discloses a flow chart of the method performed in an electronicdevice according to the disclosure.

FIG. 6 discloses a flow chart of the method performed in an electronicdevice according to the disclosure.

FIG. 7 discloses a flow chart of the method performed in a wearableexternal device according to the disclosure.

DETAILED DESCRIPTION

As used herein, the term “electronic device” includes portablecommunication device and portable radio communication equipment.Portable communication devices and mobile communication devices may beused synonymously. The term “portable radio communication equipment” maybe referred to below as a mobile phone (or as a mobile telephone,portable phone or portable telephone), a portable device, a portableradio terminal or a portable terminal, includes all electronicequipment, including, but not limited to, capable of being used forvoice and/or data communication.

As will be appreciated, the invention may be used with mobile phones,other phones, smartphones, personal digital assistants (PDAs),computers, other communication devices, etc., for brevity, the inventionwill be described by way of examples with respect to mobile phones, butit will be appreciated that the invention may be used with othercommunication devices.

Referring in detail to the drawings, and initially to FIGS. 1 and 3, anelectronic device in accordance with an embodiment of the presentinvention is illustrated generally at 2. The electronic device 2 will bereferred to below as a mobile phone. However, as was mentioned above,references to “mobile phones” include various other devices, such as,for example, those mentioned above. In outward appearance, for example,as illustrated in FIG. 3, the mobile phone is of one type of design orstyle; however, the features of the invention, as are described infurther detail below may be used in other types of mobile phones. Thedisclosure relates to the process for unlocking a mobile phone. Thisprocess could be eased up by having authorization data such ascredential data, stored on a wearable external device.

The credential data can be encrypted. The credential data can be arandom 128 bit hash code, which is set by the user. Thus the credentialdata can be very long if the user wants high security, since it onlyneeds to be entered once.

A wearable external device 1 in this application refers to a deviceconfigured to be worn by a person, such as a wristlet or a watch.

In short, the disclosure provides for a wearable external device 1, i.e.a wristlet, and a method to implement a dynamic logon/logoff process foran electronic device 2, i.e. a mobile phone, by using the wearableexternal device 1, i.e. wristlet. The dynamic logon/logoff processstarts by putting the wristlet 1 on a part of the body of the user, suchas on the arm. The user will be prompted to send a key or a password tothe wristlet 1, which is a signal that is sent to the mobile phone 2from the wristlet 1 indicating that authentication data or credentialdata can be temporarily stored, when the user unlocks the mobile phone2. The stored credential data could then be used for unlocking themobile phone 2 as soon as the mobile phone 2 is within range of thewristlet 1. Thus, the wristlet is used as a personal ID device or key tothe associated mobile phone 2, such that the mobile phone 2 isautomatically unlocked when the wristlet 1 is close, within a range of20-30 cm, to the mobile phone, without having to prompt the user toenter a password each time the user want to use the mobile phone 2.Thus, the user may continuously be able to use the mobile phone 2without having to enter the password, as long as the wristlet 1 is onthe arm of the user. The wristlet 1 is continuously detecting whetherthe wristlet 1 is on the arm and if the wristlet 1 is removed from thearm the dynamic logoff process starts by automatically clearing thestored credential data from the storage on the wristlet.

Thus, a system and method is provided where the user can choose anunlimited password, which may be cumbersome to enter, but which israrely done, gives a high security level for usage of the electronicdevice and which does not risk the user to give away its biometrics.

According to one example embodiment the user puts on a wristlet on abody part, such as on the arm. The user then locks the wristlet aroundthe arm with a lock, i.e. a snap lock. The user uses his mobile phone ashe always does and he pushes a power button or presses a screen lockbutton and enters his password to unlock the mobile phone. This passwordcan be very long if the user wants a high security level, and this isnot a problem since the user only needs to enter it once when keepingthe wristlet on the arm. The next time the user wants to unlock hismobile phone he only has to press the power button or screen lock buttonand the mobile phone opens without having to enter the password. Whenthe user takes off the wristlet the connection between the wristlet andthe mobile phone is lost and the next time the user wants to unlock oropen his phone he has to enter the password as well.

The method will now be described starting from FIG. 4 disclosing methodsteps, performed in the mobile phone 2. When the described steps are notdependent on each other, these steps may be implemented in anycombination.

In the first step the electronic device 2, e.g. mobile phone, detectsS10 a request for unlocking the mobile phone 2, thus the user unlocksthe mobile phone 2 by pressing the power on button on the mobile phone2.

In the second step the mobile phone 2 identifies S20 if authenticationis needed, when detecting power on S10.

In the third step the mobile phone 2 receives authentication data orcredential data S30 for unlocking the mobile phone 2.

In the fourth step the mobile phone 2 is unlocked or opened S40 by usingthe received authentication data or credential data.

FIGS. 5 and 6 discloses exemplary embodiments showing further variantsand how the different steps of the method may be implemented in moredetail. When the described aspects are not dependent on each other,these variants may be implemented in any combination.

According to one aspect the step of receiving S30 authentication data orcredential data comprises identifying S31 whether the authenticationdata or credential data is stored externally, thus in a location outsidethe mobile phone, e.g. in a wearable external device nearby.

According to one aspect the step of identifying S31 whether theauthentication data or credential data is stored externally or not,wherein no authentication data or credential data are externally stored.This is the case where the user unlocks his or her mobile phone thefirst time and then the method proceeds in the normal way. This istypically done by requesting and receiving S32 authentication data orcredential data from an input device 24 of the mobile phone 2. Theauthentication data or credential data may e.g. be received from a userentering an alpha numeric password of unlimited length on an inputdevice 24 of the mobile phone 2. According to one aspect of the step ofreceiving S32 authentication data or credential data from the inputdevice 24, the steps further comprises entering a fingerprint on a touchscreen comprised in the mobile phone. However, this disclosure thenproposes to store the entered credentials in the mobile phone, such thatthe user will not need to reenter them the next time he or she wishes tounlock the mobile phone.

According to one aspect of the step of receiving authentication data orcredential data S32 from an input device 24, the step further comprisingthe steps of detecting S321 an external device 1 with ability to storeauthentication data or credential data.

According to one aspect the step of detecting an external device 1comprises detecting a broadcast signal S3211, indicating an ability totemporarily store authentication data or credential data.

According to one aspect the step of receiving credentials S32 from aninput device 24 further comprises sending a request S322 for permissionto create a connection between the detected wearable external device 1and the mobile phone 2.

According to one aspect the step of sending a request S322 forpermission to create a connection further comprises creating acommunication channel S3221 between the mobile phone 2 and the wearableexternal device 1.

In one embodiment, the connection created in the step of creating acommunication channel S3221 can be done by using Bluetooth Low Energysignal, BTLE, and the authentication data or credential data aretransmitted to the wearable external device 1 when the wearable externaldevice is detected and when transfer is permitted by the wearableexternal device. BTLE can be set to a limited distance, e.g. 40 cm tokeep the battery long lasting. A small battery can last many months.

In one embodiment, the connection created in the step of creating acommunication channel S3221 can be done by using NFC, e.g. by simplytouching the wearable external device 1 with the mobile phone 2 andanswering the question “transfer you credentials to this wristlet?”presented on a screen or a display 25 of the mobile phone 2 and theauthentication data or credential data are then transmitted S323 to thewearable external device 1 when the wearable external device 1 isdetected and when transfer is permitted by the wearable external device1.

Alternatively, other radio information bearers can be used, such asWi-Fi, Bluetooth, and Wireless charging. Alternatively, other transfermethods can be used, such as transfer through conductive, capacitive orinductive coupling.

According to one aspect the step of receiving credentials S32 from aninput device 24 further comprises sending S323 authentication data orcredential data for storage in the wearable external device 1, when theconnection is created.

According to one aspect the step of identifying S31 whether theauthentication data or credential data is stored externally or not,wherein the mobile phone detects that authentication data or credentialdata are already externally stored i.e. the steps S32-S323 have beenexecuted, the mobile phone sends a request S33 for authentication dataor credential data to the wearable external device 1, e.g. the wristlet.

According to one aspect the step of receiving authentication data themobile phone 2 receives S34 authentication data or credential data fromthe wristlet 1. Once the authentication data or credential data arereceived from the wristlet 1, the authentication procedure may proceedaccording to the same procedure as when the authentication data orcredential data where manually inserted.

In one embodiment, provided that the user has accepted or permittedsending a key, e.g. credential data, to the external device, the userwill be notified once the key has been successfully transferred. Whenthe user has accept sending the key to the external device the externaldevice and the mobile will pair by using Bluetooth paring, BT pairing.This is done in the background, automatically without interference bythe user. When the pairing is done, the key is sent from the mobilephone to the external device.

The method will now be described starting from FIG. 7 disclosing methodsteps, performed in the wearable device, i.e. the wristlet. When thedescribed steps are not dependent on each other, these steps may beimplemented in any combination.

In the first step the user puts S70 the wristlet 1 on a part of the bodyof the user, i.e. around his/her arm, and closes a magnetic, electric,optical or other loop i.e. strain gauges, capacitive, optic or otherconnection such that when the user removes the wristlet the loop must bebroken. The size of the wristlet 1 should be such that it can't be takenoff without breaking the loop. In one embodiment, the user may lock theloop around the part of the body with some kind of locking mechanism,such as a snap lock.

In the second step a detector unit 10 of the wristlet starts to detectS80 if the wristlet 1 is placed on a part of a human body, by detectinga tremor signal, pulse signal, a blood flow or a temperature change.When the wristlet has detected the presence of a human body it isactivated. The wristlet is in a wristlet-on-a-human state.

In the third step S90, when the wristlet is activated, a controller 12of the wristlet starts to broadcast a signal, indicating an ability totemporarily store credential data.

In one embodiment the broadcast signal is a Bluetooth Low Energy signal,BLTE. BLTE can be set to a limited distance, i.e. 40 cm to keep thebattery long lasting.

In the fourth step S100 the wristlet receives, using a radiocommunication interface 11, authentication data or credential data fromthe mobile phone 2.

In the fifth step S110 the wristlet stores, in data storage 13, thereceived authentication data or credential data in the data storage aslong as the detector unit 10 detects the presence of a human body.

In the sixth step S120 the wristlet 1 transmits the authentication dataor credential data to the electronic device 2, when a request forcredentials is received. The wristlet is in a wristlet-of-human state.

In one embodiment, the method further comprises the steps of deletingS130 the credentials when the presence of a human body is no longerdetected.

In one embodiment, when the user wears the wristlet and pushes the powerbutton on the mobile phone, there is no password needed, since it issent from the wristlet. When it is concluded that the wristlet is on abody part of the user, such as an arm, BT low energy is turned on forbroadcast. When the user unlocks the mobile phone, the broadcasted lowenergy signal will be detected. If the wristlet is close enough, e.g.within a distance of 30 cm, the mobile phone will send a request for thekey, e.g. credential data. The key are then transferred to the mobilephone 2 and then the mobile phone 2 is unlocked. If there are no key inthe wristlet, which is the case the first time the user logon to themobile phone after putting on the wristlet, the mobile phone willrequest a key from the user, with UI on the screen of the mobile phone,asking for a key and asking if the user wants to transfer a key to thewristlet or not.

In one embodiment, as a power saving feature, the wristlet-on-a-humandetection should serve as a trigger for sampling detection data over ashort period to determine if the wristlet has been activated while on ahuman body part. This is only done once per wristlet-on-a-humandetection period.

As soon as a successful wristlet-on-a-human detection is done thedetector needs to be reconfigured to generate astationary/complete-still interrupt towards its host system. This isdone as a pre-caution in case of having the wristlet removed from thebody part without detecting wristlet-of-a-human.

The wristlet can be used with other electronic devices, such as laptop,PlayStation controller.

In one embodiment, the wristlet is used with a laptop, the laptop may beunlocked, according to the method presented above, when the user putshis arm with the wristlet on the key board.

In one embodiment, the wristlet is used with a PlayStation controller,the PlayStation controller identifies the user when the user with awristlet holds the PlayStation controller, according to the methodpresented above. Similar scenario can be when login to PlayStation orPSN.

In one embodiment, it is possible to store other information than justthe credential data on the wristlet, e.g. the mobile phone 2 can sendthe phone ID to be stored on the wristlet 1 such that when the user isabout to login to the PlayStation network, the user is suggested tologin with the same ID. Alternatively, when several users play the samegame, the ID from their wristlets is used for their identity in thegame.

In one embodiment, the wristlet 1 can also be used to unlock your homeif you have sent your unlock-home-ID to be stored on your wristlet 1.You can then open the door by just putting your hand with the wristleton the handle. This can also be used when performing payments on theinternet.

In one embodiment, the wristlet 1 can also be used for secure login toyour bank, from your PC, i.e. in Sweden the Mobile Bank ID is used to dopayments from your bank and many people chooses relatively shortspasswords since it is cumbersome to enter a long password. The wristletcan also be used for NFC payment in shops.

In one embodiment, if there are several users that knows the password tothe electronic device 2, every time the electronic device 2 is unlockedwith the password, an authorization question, i.e. “would you like yourwristlet to be used as a key to your device?”, should be asked, providedthe user is wearing a wearable device according to the disclosure, i.e.a wristlet.

In one embodiment, when using a family tablet at home, all the membersof the family can use it together with their wristlets, without havingto enter the credential data or password. The look of the display mayalso be customized, i.e. display a personalized message, such as“welcome Henrik”, or “welcome Anna”, and it can remember whatapplications that the member last used.

In one embodiment, the wristlet can be connected to several electronicdevices at the same time, with the same password or several differentpasswords, dependent on the electronic device. For example, the user mayconnect the wristlet to the phone using a first password and to connectwith the computer with a second password. All the passwords are storedin the wristlet.

When the user takes off the wristlet 1 the connection is broken, boththrough electro-mechanical disconnect and though loss of detection of ahuman body. All connecting information is lost, all data on the wristletis removed, the wristlet is inactivated and thereafter the wristletcannot be used to open the phone. The inactivated wristlet has no valueother than its hardware when it is taken off, since it has no memory.Thus, when the wristlet is not on a human body part, the user can besure that it carries no information, and all data is removed.

FIG. 1 show a wearable external device 1, which now will be described infurther detail, configured for temporarily storing credentialsassociated with at least one electronic device 2, where the method isimplemented. The wearable external device 1 is configured to bewearable, thus it can be worn on a part of the human body of the user,such as on or around a wrist, arm or neck, as long as it is in closecontact, preferable within a range of 20-30 mm, with the skin of thehuman body. The wearable external device 1 in FIG. 1 comprises awearable unit 3 and an electronic module 4 placed in said wearable unit,as shown in FIGS. 2a and 2b . The electronic module 4 is designed to beremoved from the wearable unit and put in another wearable unit. Thewearable unit 3 can be designed as a wristband, wristlet, bracelet,bangle, necklace, collar, a watch or the like. The wearable externaldevice 1 can also be attached onto the skin of the user, such as a patchor any adhesive or sticking piece of paper or plastic. The wearableexternal device 1 may also be attached to the clothes worn by the user.However, for the sake of clarity and simplicity, most embodimentsoutlined in this specification are related to a wristlet 1 comprising awrist band 3 holding the electronic module 4.

FIGS. 2a and 2b shows the electronic module 4 configured for temporarilystoring credentials associated with at least one electronic device 2,where the method is implemented. The electronic module 4 comprises adetector unit 10 configured to detect the presence of a human body. Thedetector 10 can be a sensor of any kind such as an accelerator, opticalsensor, temperature sensor, pulse sensor or the like. The detector unitcan be placed on the back of the wrist band 3.

In one embodiment the detector unit comprises a capacitive touch system.The capacitive touch system is placed on the back of the wrist band 3that is on the part of the wearable unit 3 that is closest to the bodypart of the user, which is wearing the wristlet 1. The capacitive touchsystem has low power consumption, which is less than 30 micro Amp whenthe wristlet is on a body part as well as of a body part. Thesensitivity range may be set to the range of 20-30 mm, such that thewristlet 1 may be loosely coupled around a body part, such as an arm,and still give a signal. The capacitive sensor system is always active.

As soon as the wristlet 1 is placed on a part of the human body of theuser, such as around the arm or wrist, the detector unit 10 starts tosense the presence of a human body.

In one embodiment, the detector unit 10 comprises an accelerometer,which can detect a tremor signal from the user. A tremor signal is asignal measuring the human quiver or tremble movement and it is alwayspresent in human muscles at a frequency of 8-12 Hz.

In one embodiment, the detector unit 10 comprises a pulse sensor, whichcan detect the heart rate or blood pulse of the user.

In one embodiment, the detector unit 10 comprises a temperature sensor,which can detect the temperature of the skin of the user.

In one embodiment, the detector unit 10 comprises an optical sensor,which can detect the blood flow of the user.

The electronic module 4 further comprises a controller 12. Thecontroller is configured to execute the method according to thedisclosure. The controller 12 is typically a processing circuitryconfigured for executing computer code, such as a computer programimplementing the proposed method. One example is that the computer codeis an application, which may be downloaded from an external server.However, the method may as well be hardware implemented or a combinationof hardware and software. The controller 12 is configured forbroadcasting a signal S90, as shown in FIG. 7, indicating an ability totemporarily store credential data, when the detector unit 10 detects S80the presence of a human body.

The electronic module 4 further comprises a radio communicationinterface 11 configured to communicate with at least one electronicdevice 2. The controller 12 is configured to receive S100, using theradio communication interface 11, authorization data or credential datafrom the electronic device 2.

The electronic module 4 further comprises a data storage 13 configuredto store the authorization data or credential data. The controller 12 isconfigured to store S110, in the data storage 13, the receivedcredentials as long as said detector unit 10 detects the presence of ahuman body and to transmit S120 the credentials to the electronic device2, when a request S33, as shown in FIG. 5, for credential data isreceived.

The controller 12 is further configured to remove S130 the credentialsfrom the storage 13 when the presence of a human body is no longerdetected.

In one example embodiment, a specific application, an app, is started inthe mobile phone and the app chooses which authorization data to enter,such as to use a password, a fingerprint, other biometrics, such as irisrecognition, tremble identification (tremor signal), voice recognitionor other as authorization data.

In one embodiment, the detector unit 10 comprises a capacitive touchsystem and an accelerometer. When the wristlet 1 is placed on an arm thecapacitive touch system will send an interrupt signal to the controllercomprised in the electronic module 4, informing the controller that thewristlet is placed on an arm, or something with a similar capacitance asan arm. Then the accelerator starts to detect a tremor signal. If thetremor signal is found, it is concluded that the wristlet is put on anarm. The capacitive touch system is always active, and when the systemdetects that the signal is lost it will send an interrupt signal to theelectronic module 4.

FIG. 3 shows the electronic device, e.g. the mobile phone 2, which nowwill be described in further detail. The mobile phone 2 comprises acontroller, CTL, or a processing circuitry 22 that may be constituted byany suitable Central Processing Unit, CPU, microcontroller, DigitalSignal Processor, DPS, etc. capable of executing computer program codefor executing the method disclosed. However, the method may as well behardware implemented or a combination of hardware and software. Thecomputer program may be stored in a memory 21, MEM. The memory can beany combination of a Read And write Memory, RAM, and a Read Only Memory,ROM. The memory 21 may also comprise persistent storage, which, forexample, can be any single one or combination of magnetic memory,optical memory, or solid state memory or even remotely mounted memory.

The mobile phone 2 further comprises a wireless communication interface(i/f) 23 arranged for wireless communication with cellular communicationsystem and/or other wireless communication systems. The wirelesscommunication interface 23 may be adapted to communicate over one orseveral radio access technologies. If several technologies aresupported, the access point typically comprises several communicationinterfaces, e.g. one WLAN communication interface and one cellularcommunication interface. The communication interface is e.g. adapted todownload a computer program for executing the proposed methods or accessa data base comprising device specific information.

The foregoing has described the principles, preferred embodiments andmodes of operation of the present invention. However, the inventionshould be regarded as illustrative rather than restrictive, and not asbeing limited to the particular embodiments discussed above. Thedifferent features of the various embodiments of the invention can becombined in other combinations than those explicitly described. Itshould therefore be appreciated that variations may be made in thoseembodiments by those skilled in the art without departing from the scopeof the present invention as defined by the following claims.

The invention claimed is:
 1. A method, performed in an electronicdevice, of temporarily storing credential data associated with theelectronic device in a second device, the method comprising the stepsof: detecting a request for unlocking the electronic device; identifyingif authentication of the electronic device is needed; receivingcredential data from the second device when unlocking the electronicdevice; detecting a broadcast signal, indicating an ability totemporarily store the credential data; sending request for permission tocreate a connection between the electronic device and the second device;and sending credential data to the second device for storage in thesecond device.
 2. The method according to claim 1, wherein the receivingstep further comprising the steps of: identifying if the credential datais stored in the second device; sending a request to retrieve thecredential data from the second device; and receiving the credentialdata from the second device.
 3. The method according to claim 1, whereinthe receiving step further comprising the steps of: identifying if thecredential data is stored in the second device; and receiving thecredential data via an input device of the electronic device.
 4. Themethod according to claim 3, further comprising the step of: detectingthe second device with ability to temporarily store the credential data.5. The method according to claim 1, further comprising the step of:creating a communication channel between the electronic device and thesecond device.
 6. The method according to claim 1, wherein the seconddevice is a wearable device worn by a user of the electronic device.