Automated device access

ABSTRACT

A method of unlocking a locked device includes receiving a device identifier over a wireless communication protocol, determining if the device identifier is associated with a list of trusted devices, transmitting a request to generate an acoustic signal over the wireless communication protocol based on the determination, receiving the acoustic signal as an audio sound generated external to the locked device, estimating a distance between a source of the audio sound and the locked device, and unlocking the locked device based on the estimation.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.13/603,347, filed Sep. 4, 2012, of the same title, the contents of whichare incorporated herein by reference in their entirety for all purposes.

FIELD

The described embodiments relate generally to locked devices, and moreparticularly, to automated access to locked devices.

BACKGROUND

Conventionally, a computing device may be locked using a passwordauthentication methodology by which a user may gain access to the lockeddevice upon entry of an alphanumeric password or passcode stored on thedevice. The password authentication methodology may allow a fixed numberof attempts before locking out the device or requiring administrativeaccess or a hard reset.

Generally, repetitive password entry is cumbersome to users,particularly in environments where users repeatedly lock devices tosecure information thereon, for example, to deter access by unauthorizedindividuals. However, conventional password methodologies require inputof a password at every unlock request, and offer no alternativesolutions to allow easier secure access to locked devices.

Therefore, what are needed are advancements and innovations in passwordauthentication methodologies that overcome these and other drawbacks.

SUMMARY

This paper describes various embodiments that relate to automated deviceaccess to password locked devices.

According to one embodiment of the invention, a method of unlocking alocked device includes receiving a device identifier over a wirelesscommunication protocol, determining if the device identifier isassociated with a list of trusted devices, transmitting a request togenerate an acoustic signal over the wireless communication protocolbased on the determination, receiving the acoustic signal as soundgenerated external to the locked device, estimating a distance between asource of the sound and the locked device, and unlocking the lockeddevice based on the estimation.

According to another embodiment of the invention, a method of unlockinga locked device includes detecting a presence of a trusted device over awireless communication protocol, transmitting a request to generate anacoustic signal over the wireless communication protocol based on thedetection, receiving the acoustic signal as sound generated external tothe locked device, estimating a distance between a source of the soundand the locked device, and unlocking the locked device based on theestimation.

According to another embodiment of the invention, a method of unlockinga locked device includes authenticating a trusted device over a wirelesscommunication protocol, transmitting a request to generate an acousticsignal over the wireless communication protocol based on theauthentication, receiving the acoustic signal as sound generatedexternal to the locked device, estimating a distance between a source ofthe sound and the locked device, and unlocking the locked device basedon the estimation.

According to another embodiment of the invention, a method of unlockinga locked device includes authenticating a trusted device over a wirelesscommunication protocol, transmitting an acoustic signal as soundgenerated at the locked device based on the authentication, receiving acopy of the acoustic signal over the wireless communication protocol,estimating a distance between the locked device and the trusted devicebased on the copy, and unlocking the locked device based on theestimation.

According to another embodiment of the invention, a system includes alocked device and a trusted device in communication with the lockeddevice over a wireless communication protocol. The locked device isconfigured to automatically unlock in response to authentication of thetrusted device and receipt of an acoustic signal generated or relayed bythe trusted device.

Other aspects and advantages of the invention will become apparent fromthe following detailed description taken in conjunction with theaccompanying drawings which illustrate, by way of example, theprinciples of the described embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

Various aspects of this disclosure may be better understood upon readingthe following detailed description and upon reference to the drawings inwhich:

FIG. 1 is a diagram of a system for automated access to password lockeddevices, according to an embodiment of the invention;

FIG. 2 is a diagram of a trusted device for automated access to passwordlocked devices, according to an embodiment of the invention;

FIG. 3 is a diagram of a password locked device, according to anembodiment of the invention;

FIG. 4 is a flowchart of a method for automated access to passwordlocked devices, according to an embodiment of the invention;

FIG. 5 is a flowchart of a method for automated access to passwordlocked devices, according to an embodiment of the invention;

FIG. 6 is a flowchart of a method for automated access to passwordlocked devices, according to an embodiment of the invention; and

FIG. 7 is a flowchart of a method for automated access password lockeddevices, according to an embodiment of the invention.

DETAILED DESCRIPTION

Representative applications of methods and apparatus according to thepresent application are described in this section. These examples arebeing provided solely to add context and aid in the understanding of thedescribed embodiments. It will thus be apparent to one skilled in theart that the described embodiments may be practiced without some or allof these specific details. In other instances, well known process stepshave not been described in detail in order to avoid unnecessarilyobscuring the described embodiments. Other applications are possible,such that the following examples should not be taken as limiting.

In the following detailed description, references are made to theaccompanying drawings, which form a part of the description and in whichare shown, by way of illustration, specific embodiments in accordancewith the described embodiments. Although these embodiments are describedin sufficient detail to enable one skilled in the art to practice thedescribed embodiments, it is understood that these examples are notlimiting; such that other embodiments may be used, and changes may bemade without departing from the spirit and scope of the describedembodiments.

Generally, embodiments are directed to automated access to passwordprotected computing devices or other hardware. Automated access isfacilitated through use of a wireless communication protocol and anacoustic signal. The wireless communication protocol may be anestablished protocol having a stored listing of one or more trusteddevices.

The acoustic signal may be an audio ping, sound, ultrasound, ormodulation of sound configured to be emitted from the one or moretrusted devices upon authentication via the wireless communicationprotocol. Receipt of the acoustic signal by the password protectedcomputer device may automatically unlock the password protectedcomputing device upon determining a physical distance of the one or moretrusted devices is within a predetermined range.

Alternatively, the acoustic signal may be an audio ping, sound,ultrasound, or modulation of sound configured to be emitted from thepassword protected computing device or other hardware uponauthentication of the one or more trusted devices via the wirelesscommunication protocol. The one or more trusted devices may receive theacoustic signal and transmit a copy, version, or portion thereof to thepassword protected computing devices over the wireless communicationprotocol. Receipt of the copy, version, or portion of the acousticsignal by the password protected computer device may automaticallyunlock the password protected computing device upon processing of thereceived acoustic signal to determine/estimate a distance or correlatethe received copy with an original signal or otherwise determining thetrusted device is within a predetermined range.

Turning to FIG. 1, a system for automated access to password lockeddevices is illustrated, according to an embodiment of the invention. Thesystem 100 may include a password locked or protected device 101 and atrusted device 102. According to embodiments, a predetermined automatedentry distance R₀ may be established such that if the physicalseparation D₀ is less than or equal to R₀, the password locked device101 may unlock with limited or reduced manipulation by a user. Asillustrated, an overall bubble or range 110 about the password lockeddevice 101 is based on the predetermined automated entry distance R₀.According to one embodiment of the invention, the predeterminedautomated entry distance R₀ is between about 3 to 5 feet (91.4 to 152.4centimeters). According to another embodiment of the invention, thepredetermined automated entry distance R₀ is less than about 3 feet(91.4 centimeters). According to other embodiments, the predeterminedautomated entry distance R₀ is a user-configurable distance of anydesirable range. Ranges of less than about 3 feet may be desirable inthat there may be less possibility of unauthorized access due to atrusted device being in a general vicinity of a password locked deviceand automated unlocking occurring without an authorized user being indirect contact with the device.

Generally, the trusted device 102 and password locked device 101 mayexchange information over an established wireless communicationprotocol, for example, via a radio interface. The wireless communicationprotocol may be any desirable protocol, including Bluetooth® protocols,Infrared protocols, IEEE 802.11-based protocols, or any suitableprotocol allowing for the transfer of a request to output a particularacoustic signal from the device 101 to the device 102.

The trusted device 102 may have been previously subjected to a pairingprotocol with the password protected device 101 such that wirelesscommunication may be facilitated in a fairly automated fashion or usinga master-slave structure. The pairing protocol may establish the trusteddevice 102 as a particular trusted device at the password protecteddevice 101, for example, through inclusion of an identifier of thedevice 102 at a list of trusted devices stored on the password protecteddevice 101. The list of trusted devices may be stored and accessedthrough the password protected device 101 such that a user mayconfigure, edit, or delete entries in the list. According to oneembodiment of the invention, the list of trusted devices is a list ofpaired or authenticated Bluetooth® devices such as, for example,wireless speakers, headsets, key fobs, or other devices.

The password protected device 101 may be any suitable device, includinga personal computer, tablet computer device, cellular telephone,building security door apparatus, automobile, or any other devicewhereby automated access or entry is desirable under certain conditions,for example, in response to authentication of the trusted device 102over the wireless communication protocol and receipt of an acousticsignal from the trusted device 102.

Hereinafter, a more detailed description of the trusted device 102 andthe password protected device 101 is provided with reference to FIGS.2-3.

FIG. 2 is a diagram of a trusted device 102 for automated access topassword locked devices, according to an embodiment of the invention. Asillustrated, the trusted device 102 may include a wireless transceiver201, a processor 202, and an audio device 203.

The wireless transceiver 201 may be any suitable transceiver includingradio components allowing for communication via a wireless communicationprotocol such as, for example, Bluetooth®. The wireless transceiver 201may therefore include any necessary antennas and radio components tofacilitate this communication.

The processor 202 may be any suitable processor, including a dedicatedprocessor tailored for operation of the device 102 as a slave deviceconfigured to receive packets of information relating to an acousticsignal and direct the audio device 203 to generate the acoustic signal.The processor 202 may also direct the device 102 to transmit a copy of areceived/detected acoustic signal detected at the audio device 203 overthe wireless communication protocol for receipt at a password lockeddevice. The processor 202 may also be a general purpose computerprocessor or any other suitable processing device capable of performingat least portions of the methods described herein.

The audio device 203 may be a speaker/microphone or other device capableof reproducing/receiving an acoustic signal, respectively. The acousticsignal may be in any suitable range of frequencies including ultrasonicfrequencies. According to one embodiment, at least a portion of theacoustic signal includes frequencies greater than about 20 kHz.According to one embodiment, at least a portion of the acoustic signalincludes frequencies between about 18 kHz to 22 kHz. According to oneembodiment, at least a portion of the acoustic signal includesfrequencies between about 20 Hz to 20 kHz. According to one embodiment,the acoustic signal is a sample of identifiable white noise created atthe password locked device 101. According to one embodiment, theacoustic signal is at least a portion of an audio file stored at thepassword locked device 101. According to one embodiment, the acousticsignal is a sequence of sounds identifiable at the password lockeddevice 101. According to one embodiment, the acoustic signal is adynamically generated acoustic signal formed through an algorithmprocessed by the password locked device 101.

As described above, the trusted device 102 may include a wirelesstransceiver, processor, and audio device capable of generating/receivingan acoustic signal based on commands received via a wirelesscommunication protocol transmitted by the password locked device 101.Hereinafter, a more detailed description of the password locked device101 is provided with reference to FIG. 3.

FIG. 3 is a diagram of password locked device 101, according to anembodiment of the invention. The device 101 may include memory 301 inoperative communication with a processor 302. The memory 301 may be anymemory suitable for at least temporarily storing instructions executableby processor 302. The processor 302 may be any suitable processor,including a general purpose computer processor.

The device 101 may further include input device 303 in communicationwith the processor 302. The input devices 303 may include any suitabledevices, including one or more microphones capable of receiving anacoustic signal and relaying information related to the acoustic signalto the processor 302. The acoustic signal may be in any suitable rangeof radio frequencies including ultrasonic frequencies. According to oneembodiment, at least a portion of the acoustic signal includesfrequencies greater than about 20 kHz. According to one embodiment, atleast a portion of the acoustic signal includes frequencies betweenabout 18 kHz to 22 kHz. According to one embodiment, at least a portionof the acoustic signal includes frequencies between about 20 Hz to 20kHz. According to one embodiment, the acoustic signal is a sample ofidentifiable white noise generated through the processor 302. Accordingto one embodiment, the acoustic signal is at least a portion of an audiofile stored in the memory 301 or storage device 306. According to oneembodiment, the acoustic signal is a sequence of sounds identifiablethrough the processor 302.

The device 101 further includes wireless transceiver 304 incommunication with the processor 302. The wireless transceiver 304 maybe any suitable transceiver including radio components allowing forcommunication via a wireless communication protocol such as, forexample, Bluetooth®. The wireless transceiver 304 may therefore includeany necessary antennas and radio components to facilitate thiscommunication.

The device 101 may further include output devices 305 in communicationwith the processor 302. The output devices 305 may include displays orother devices for outputting information to a user of the device 101.The output devices 305 may also include one or more speakers ortransducers capable of generating an acoustic signal as described above.

The device 101 further includes computer readable storage medium ordevice 306. The computer readable storage device 306 may storeinstructions based on at least a portion of the methods described hereinfor processing and execution at the processor 302.

As described above, the device 101 may produce audio information orretrieve portions of audio files stored at the storage device 306,direct the trusted device 102 to playback the same as an acousticsignal, and receive the acoustic signal. Hereinafter, additionaloperational details are presented with reference to FIGS. 4-7.

FIG. 4 is a flowchart of a method 400 for automated access to passwordlocked devices, according to an embodiment of the invention. The method400 includes transmitting a device ID over a wireless communicationprotocol at block 401. The device ID may be transmitted from a trusteddevice such as device 102. The device ID may be an identifier forauthentication at a password protected device.

The method 400 further includes receiving, at the password protecteddevice, the transmitted device ID at block 405. The method 400 furtherincludes determining if the device ID is from a trusted device at block406. If the device ID is not associated with a trusted device, themethod 400 may terminate. If the device ID is associated with a trusteddevice, the method 400 includes transmitting a request to playback anacoustic signal at block 407. The request may direct a slave trusteddevice such as a Bluetooth® speaker or headset to playback an acousticsignal generated at the password protected device. The request mayinclude a digital copy of an audio file or sample thereof comprising theacoustic signal.

The method 400 further includes receipt of the request at the trusteddevice at block 402, and generating the acoustic signal in response toreceipt of the request at block 403.

The method 400 further includes receiving, at an input device of thepassword protected device, the acoustic signal at block 408. The inputdevice may be a microphone or microphone array. Thereafter, the method400 includes determining if a source of the acoustic signal is within apredetermined or desired range at block 409.

For example, the determining may be facilitated through a time of flightcalculation based on the speed of sound. For example, audio informationreceived at the input device of the password protected device may beautocorrelated with a digital copy of the acoustic signal stored at thepassword protected device. A correlation spike with a shortest delaycorresponds with a propagation delay of the acoustic signal. If thispropagation delay is below a threshold value (representative of thedistance R₀), the method 400 includes unlocking the password protecteddevice at block 410. Unlocking may include automated entry of a passwordthrough a password entry algorithm at the password protected device.According to one embodiment, unlocking the password protected devicesincludes waiting for a keystroke or other simple feedback (e.g.,pressing a home button, power button, striking a return or enter key,etc) before unlocking to ensure a user desires automated deviceunlocking.

It should be understood that other forms of calculations may be made tofacilitate estimating the distance of a source of the acoustic signal.Therefore, the embodiments described herein should not be limited to anyparticular form of time of flight calculation, but should include anyequivalent or substantially similar calculations which provide adesirable estimate of distance between a source of an acoustic signaland a password protected device.

Similarly, although particularly described as requiring a determinationthat a received device ID belongs to a trusted device, any number ofauthentication protocols may be used. For example, FIG. 5 is a flowchartof a method 500 for automated access to password locked devices,according to an embodiment of the invention.

The method 500 includes a wireless authentication protocol beingperformed at a trusted device and a password locked device at blocks 501and 505. The wireless authentication may include an authenticationprotocol, for example, a Bluetooth® authentication protocol outputting avalue for determining if a trusted device is authenticated at block 506.The value may be a simple Boolean value returning a TRUE or FALSEindication of authentication.

Thereafter, the method 500 includes transmitting a request to playbackan acoustic signal at block 507. The request may direct a slave trusteddevice such as a Bluetooth® speaker or headset to playback an acousticsignal generated at the password protected device. The request mayinclude a digital copy of an audio file or sample thereof comprising theacoustic signal.

The method 500 further includes receipt of the request at the trusteddevice at block 502, and generating the acoustic signal in response toreceipt of the request at block 503.

The method 500 further includes receiving, at an input device of thepassword protected device, the acoustic signal at block 508. The inputdevice may be a microphone or microphone array. Thereafter, the method500 includes determining if a source of the acoustic signal is within apredetermined or desired range at block 509, and unlocking the passwordprotected device based on the determining at block 510.

The determining and unlocking may be altered from the particular formsillustrated, for example, as described above with reference to FIG. 4.

Additionally, although described as necessitating a wirelessauthentication protocol at blocks 501 and 505, it should be understoodthat the same may be varied to simply detect a presence of a previouslyauthenticated device. For example, FIG. 6 is a flowchart of a method 600for automated access to password locked devices, according to anembodiment of the invention.

The method 600 includes detecting a presence of a trusted device atblock 603. The detection may be facilitated through a wirelesscommunication protocol such as Bluetooth®. Upon detection of a trusteddevice, the method 600 includes transmitting a request to playback anacoustic signal at block 604. The request may direct a slave trusteddevice such as a Bluetooth® speaker or headset to playback an acousticsignal generated at the password protected device. The request mayinclude a digital copy of an audio file or sample thereof comprising theacoustic signal.

The method 600 further includes receipt of the request at the trusteddevice at block 601, and generating the acoustic signal in response toreceipt of the request at block 602.

The method 600 further includes receiving, at an input device of thepassword protected device, the acoustic signal at block 605. The inputdevice may be a microphone or microphone array. Thereafter, the method600 includes determining if a source of the acoustic signal is within apredetermined or desired range at block 606, and unlocking the passwordprotected device based on the determining at block 610.

The determining and unlocking may be altered from the particular formsillustrated, for example, as described above with reference to FIGS.4-5.

Additionally, although the acoustic signal is described as being emittedfrom a trusted device, it should be understood that the same may be inmany ways, for example, by allowing emission from the locked device orother hardware. FIG. 7 is a flowchart of a method 700 for automatedaccess to password locked devices, according to an embodiment of theinvention.

The method 700 includes detecting a presence and/or authentication of atrusted device at block 701. The detection/authentication may befacilitated through a wireless communication protocol such as Bluetooth®and may include any of the procedures described above. Upondetection/authentication of a trusted device, the method 700 includesgenerating an acoustic signal at block 702. The generating may includeplayback an acoustic signal through a speaker, transducer, or otherhardware in operative communication with the password protected device.

The method 700 further includes receipt of the acoustic signal at thetrusted device at block 703. The acoustic signal may be received by amicrophone or other input device of the trusted device.

The method 700 further includes transmitting a copy of the acousticsignal in response to receipt of the signal at block 704. The copy mayinclude a digital copy of an audio file or sample thereof comprising theacoustic signal received/detected by the trusted device. The copy may byimmediately or substantially immediately transmitted by the trusteddevice such that time of flight of the originally generated acousticsignal from block 702 may be ascertained by the locked device. In thismanner, the trusted device is relaying sound detected by an audio deviceof the trusted device (e.g., a microphone) over the wirelesscommunication protocol (e.g., via a wireless transceiver).

For example, the method 700 further includes receiving, over thewireless communication protocol, the copy of the acoustic signal atblock 705. The copy may be processed to determine coherence with theoriginally generated signal, and time of flight may be considered. Assuch, the method 700 includes determining if a source of the acousticsignal (e.g., a speaker of other hardware of the locked device) iswithin a predetermined or desired range from the trusted device (e.g.,the microphone detecting the signal) at block 706, and unlocking thepassword protected device based on the determining at block 710.

As described above, the copy of the acoustic signal may be transmittedby the trusted device immediately upon detection of the acoustic signal.Thus, time delay between generation of the acoustic signal and receiptof the copy may be used to determine a relative distance betweendevices, and therefore, determine if the trusted device is within apredetermined or desired range for automated unlocking of the lockeddevice.

Additional processing may occur at the trusted device or at the lockeddevice than the processing particularly illustrated and described, forexample, to better facilitate determination of distance, accuracy of thereceived copy, and/or other considerations. Therefore, the teachingsdescribed above should not be construed as limiting of all embodimentsand implementations of the present invention.

Additional processing variables including ambient temperature and airpressure may also be included or considered during time of flightcalculations or estimations described above.

The various aspects, embodiments, implementations or features of thedescribed embodiments can be used separately or in any combination.Various aspects of the described embodiments can be implemented bysoftware, hardware or a combination of hardware and software. Thedescribed embodiments can also be embodied as computer readable code ona computer readable medium for controlling automated access operationsor as computer readable code on a computer readable medium forcontrolling a password locked and/or trusted device. The computerreadable medium is any data storage device that can store data which canthereafter be read by a computer system. Examples of the computerreadable medium include read-only memory, random-access memory, CD-ROMs,HDDs, DVDs, magnetic tape, and optical data storage devices. Thecomputer readable medium can also be distributed over network-coupledcomputer systems so that the computer readable code is stored andexecuted in a distributed fashion.

The foregoing description, for purposes of explanation, used specificnomenclature to provide a thorough understanding of the describedembodiments. However, it will be apparent to one skilled in the art thatthe specific details are not required in order to practice the describedembodiments. Thus, the foregoing descriptions of specific embodimentsare presented for purposes of illustration and description. They are notintended to be exhaustive or to limit the described embodiments to theprecise forms disclosed. It will be apparent to one of ordinary skill inthe art that many modifications and variations are possible in view ofthe above teachings.

What is claimed is:
 1. A machine-readable non-transitory storage mediumstoring instructions that, when executed by a processor included in acomputing device, cause the computing device to carry out steps thatinclude: detecting a presence of a trusted device based on recognitionof an identifier associated with the trusted device, wherein theidentifier is included in a list of trusted devices stored by thecomputing device that are authenticated to access data from thecomputing device; receiving an indication that a first applicationexecuting on the trusted device is associated with information fortransfer to the computing device; requesting the trusted device togenerate the information for transfer to the computing device, whereinthe information is used by the computing device to determine a physicaldistance between the trusted device and the computing device; receivingthe information from the trusted device; launching, on the computingdevice, a second application that corresponds to the first application;and providing the information to the second application to unlock thecomputing device to enable the trusted device to access the data,wherein the computing device is unlocked based at least in part on thephysical distance of the trusted device being within a distancethreshold of the computing device.
 2. The machine-readablenon-transitory storage medium of claim 1, wherein the steps furtherinclude: prior to providing the information to the second application,receiving a user input to initiate an exchange of the information. 3.The machine-readable non-transitory storage medium of claim 1, whereinthe steps further include: causing the second application to display avisual representation of the information.
 4. The machine-readablenon-transitory storage medium of claim 1, wherein the steps furtherinclude: receiving a modified version of the information; andtransferring the modified version of the information to the trusteddevice.
 5. The machine-readable non-transitory storage medium of claim4, wherein the steps further include: causing the first application todisplay a visual representation of the modified version of theinformation at the trusted device.
 6. The machine-readablenon-transitory storage medium of claim 1, wherein the steps furtherinclude: prior to launching the second application, receiving a userinput to unlock the computing device.
 7. The machine-readablenon-transitory storage medium of claim 1, wherein requesting the trusteddevice to generate the information further comprises: transmitting theinformation to the trusted device, receiving a user input to initiate anexchange of the information.
 8. A method for providing securecommunications between a computing device and a trusted device, themethod comprising steps that include: detecting a presence of thetrusted device based on recognition of an identifier associated with thetrusted device, wherein the identifier is included in a list of trusteddevices stored by the computing device that are authenticated to accessdata from the computing device; receiving an indication that a firstapplication executing on the trusted device is associated withinformation for transfer to the computing device; requesting the trusteddevice to generate the information for transfer to the computing device,wherein the information is used by the computing device to determine aphysical distance between the trusted device and the computing device;receiving the information from the trusted device according to awireless communication protocol; launching, on the computing device, asecond application that corresponds to the first application; andproviding the information to the second application to unlock thecomputing device to enable the trusted device to access the data,wherein the computing device is unlocked based at least in part on thephysical distance of the trusted device being within a distancethreshold of the computing device.
 9. The method of claim 8, wherein thesteps further include: prior to providing the information to the secondapplication, receiving a user input to initiate an exchange of theinformation.
 10. The method of claim 8, wherein the steps furtherinclude: causing the second application to display a visualrepresentation of the information.
 11. The method of claim 8, whereinthe steps further include: receiving a modified version of theinformation; and transferring the modified version of the information tothe trusted device.
 12. The method of claim 11, wherein the stepsfurther include: causing the first application to display a visualrepresentation of the modified version of the information at the trusteddevice.
 13. The method of claim 8, wherein the steps further include:prior to launching the second application, receiving a user input tounlock the computing device.
 14. A computing device, comprising: aprocessor; and a memory storing instructions that when executed by theprocessor cause the computing device to perform steps that include:determining that a trusted device is proximate to the computing devicebased on recognition of an identifier associated with the trusteddevice, wherein the identifier is included in a list of trusted devicesstored in the memory that are authenticated to access data from thecomputing device; receiving an indication that a first applicationexecuting on the trusted device is associated with information fortransfer to the computing device; requesting the trusted device togenerate the information for transfer to the computing device, whereinthe information is used by the computing device to determine a physicaldistance between the trusted device and the computing device; receivingthe information from the trusted device; launching, on the computingdevice, a second application that corresponds to the first application;and providing the information to the second application to unlock thecomputing device to enable the trusted device to access the data,wherein the computing device is unlocked based at least in part on thephysical distance of the trusted device being within a distancethreshold of the computing device.
 15. The computing device of claim 14,wherein the steps further include: prior to providing the information tothe second application, receiving a user input to initiate an exchangeof the information.
 16. The computing device of claim 14, wherein thesteps further include: causing the second application to display avisual representation of the information.
 17. The computing device ofclaim 14, wherein the steps further include: receiving a modifiedversion of the information; and transferring the modified version of theinformation to the trusted device.
 18. The computing device of claim 17,wherein the steps further include: causing the first application todisplay a visual representation of the modified version of theinformation at the trusted device.
 19. The computing device of claim 14,wherein the steps further include: prior to launching the secondapplication, receiving a user input to unlock the computing device. 20.The computing device of claim 14, wherein the first application isexecuting on the trusted device when the computing device determinesthat the trusted device is proximate to the computing device.