Security operations for wireless devices
First Claim
1. A method comprisingdetermining, based on predetermined criteria, a combination of at least two user devices to be used for a security operation from a set of user devices associated with a first user and configured to wirelessly communicate security information,wherein the at least two user devices each comprise only one part of a security credential associated with the first user;
- determining that the at least two user devices are located in a predefined manner relative to each other; and
in response to the determining that the at least two user devices are located in a predefined manner relative to each other, causing communication of security information by the determined combination of the at least two user devices to another party,wherein causing communication of security information comprises causing communication of only the one part of the security credential comprised by at least one of the user devices, andwherein the security information comprises the security credential.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatuses are disclosed for determining based on predetermined criteria a combination of one or more user devices to be used for a security operation from a set of associated user devices. The user devices are configured to wirelessly communicate security information. In response to the determination security information is communicated by the determined combination of one or more user devices.
-
Citations
18 Claims
-
1. A method comprising
determining, based on predetermined criteria, a combination of at least two user devices to be used for a security operation from a set of user devices associated with a first user and configured to wirelessly communicate security information, wherein the at least two user devices each comprise only one part of a security credential associated with the first user; -
determining that the at least two user devices are located in a predefined manner relative to each other; and in response to the determining that the at least two user devices are located in a predefined manner relative to each other, causing communication of security information by the determined combination of the at least two user devices to another party, wherein causing communication of security information comprises causing communication of only the one part of the security credential comprised by at least one of the user devices, and wherein the security information comprises the security credential. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, cause the apparatus at least to:
-
determine, based on predetermined criteria, a combination of at least two user devices to be used for a security operation from a set of user devices associated with a first user and configured to wirelessly communicate security information, wherein the at least two user devices each comprise only one part of a security credential associated with the first user; and cause wireless communication of security information by the determined combination of the at least two user devices to another party, wherein the apparatus is caused to cause wireless communication of security information by causing communication of only the one part of the security credential comprised by at least one of the user devices, and wherein the security information comprises the security credential. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification