Secure data sharing with publicly accessible computing nodes
First Claim
1. At least one storage medium having instructions stored thereon for causing a mobile first computing node to:
- determine security states for the first computing node and first information;
in response to determining the security states, convey the first information to a local mobile second computing node via a wireless path without receiving security credentials from a user of the first computing node at any point within a first time period;
determine second information satisfies a defined setting;
in response to determining the second information satisfies the defined setting, determine a security state for the second information;
receive security credentials from the user during a second time period; and
in response to receiving the security credentials and to determining the security states for the first computing node and the second information, convey the second information to the second computing node via the wireless path;
wherein (a) the first time period extends from the determining the security state of the first computing node to the conveying the first information, and (b) the second time period extends from the determining the security state of the first computing node to the conveying the second information.
0 Assignments
0 Petitions
Accused Products
Abstract
An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the second security status being more secure than the first security status; establishing a first communication path between the system and a first local computing node via a first wireless path; conveying the first information to the first local computing node via the first wireless path based on the first security status; and withholding the second information from the first local computing node based on the second security status; wherein the first and second information are stored on at least one of the system and a remotely located computing node. Other embodiments are described herein.
-
Citations
18 Claims
-
1. At least one storage medium having instructions stored thereon for causing a mobile first computing node to:
-
determine security states for the first computing node and first information; in response to determining the security states, convey the first information to a local mobile second computing node via a wireless path without receiving security credentials from a user of the first computing node at any point within a first time period; determine second information satisfies a defined setting; in response to determining the second information satisfies the defined setting, determine a security state for the second information; receive security credentials from the user during a second time period; and in response to receiving the security credentials and to determining the security states for the first computing node and the second information, convey the second information to the second computing node via the wireless path; wherein (a) the first time period extends from the determining the security state of the first computing node to the conveying the first information, and (b) the second time period extends from the determining the security state of the first computing node to the conveying the second information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
at least one memory and at least one processor, to couple to the at least one memory, to cause a first computing node to; determine security states for the first computing node and first information; in response to determining the security states, convey the first information to a local mobile second computing node via a wireless path without receiving security credentials from a user of the first computing node at any point within a first time period; determine second information satisfies a defined setting; in response to determining the second information satisfies the defined setting, determine a security state for the second information; receive security credentials from the user during a second time period; and in response to receiving the security credentials and to determining the security states for the first computing node and the second information, convey the second information to the second computing node via the wireless path; wherein (a) the first time period extends from the determining the security state of the first computing node to the conveying the first information, and (b) the second time period extends from the determining the security state of the first computing node to the conveying the second information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification