Electronic devices are authenticated to each other initially over a short-range wireless link. In particular, a user first enters a given authentication information in each device. Later, when the devices are out-of-range of the wireless link, they may be authenticated to each other without subsequent user input when one of the devices invites the other to exchange authentication information over an alternative communications link. If the authentication is successful, the devices may then communicate over the alternative communications link as if they were within range of the original wireless link.

 
Web www.patentalert.com

> Key controlling system, key controlling apparatus, information encrypting apparatus, information decrypting apparatus and storage media for storing programs

~ 00302