Controlling access to content
First Claim
Patent Images
1. A method for controlling access to content, the method comprising:
- selecting a location for distributing content, wherein the content is relevant to an activity at the location;
attaching a beacon device at the location, wherein the beacon device has a signal range within the location, wherein the beacon device signal comprises a unique beacon ID which is detectable at the client electronic device and usable to determine whether the content is accessible from the client electronic device;
detecting, at a client electronic device, the presence of a beacon device signal emitted from the beacon device, wherein the client device is a mobile device;
determining, based on the beacon device signal, whether the content is accessible from the client electronic device,wherein determining whether the content is accessible from the client electronic device is further based on a content access policy set at a policy server and wherein a level of access to the content is based upon the content access policy and whether the content is accessible by the client electronic device based on whether the unique beacon ID detected by content access module running on client electronic device matches that of the beacon device, validating timestamp beacon device using a public key, and confirming the timestamp is in an acceptable range before allowing access to content on mobile device;
transmitting private key and unique identifier, using policy server, to beacon device;
transmitting, from the policy server, the public key to the client electronic device; and
in response to determining that the content is accessible from the client electronic device, providing access to the content at the client electronic device.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for controlling access to content are described. The method may include detecting, at a client electronic device, the presence of a beacon device signal emitted from a beacon device. The method may further include determining, based on the beacon device signal, whether the content is accessible from the client electronic device. The method may also include, in response to determining that the content is accessible from the client electronic device, providing access to the content at the client electronic device.
64 Citations
25 Claims
-
1. A method for controlling access to content, the method comprising:
-
selecting a location for distributing content, wherein the content is relevant to an activity at the location; attaching a beacon device at the location, wherein the beacon device has a signal range within the location, wherein the beacon device signal comprises a unique beacon ID which is detectable at the client electronic device and usable to determine whether the content is accessible from the client electronic device; detecting, at a client electronic device, the presence of a beacon device signal emitted from the beacon device, wherein the client device is a mobile device; determining, based on the beacon device signal, whether the content is accessible from the client electronic device, wherein determining whether the content is accessible from the client electronic device is further based on a content access policy set at a policy server and wherein a level of access to the content is based upon the content access policy and whether the content is accessible by the client electronic device based on whether the unique beacon ID detected by content access module running on client electronic device matches that of the beacon device, validating timestamp beacon device using a public key, and confirming the timestamp is in an acceptable range before allowing access to content on mobile device; transmitting private key and unique identifier, using policy server, to beacon device; transmitting, from the policy server, the public key to the client electronic device; and in response to determining that the content is accessible from the client electronic device, providing access to the content at the client electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for controlling access to content, the method comprising:
-
attaching a beacon device at a location wherein secure content is selectively distributed, wherein the beacon device has a signal range within the location; receiving, from a policy server, a content access policy at the beacon device; emitting, from the beacon device, a beacon device signal representative of at least a portion of the content access policy and a unique beacon ID; storing a private key at the beacon device and a corresponding public key at the policy server; and transmitting, from the policy server, the public key to the client electronic device, wherein the private key is used to encrypt information from the beacon device which is used by the client electronic device to confirm the identity of the beacon device to prevent spoofing; transmitting the encrypted information, wherein the encrypted information comprises a time stamp; and wherein the beacon device signal is receivable by a client electronic device and usable by the client electronic device to provide access to the content based on a presence of the beacon device signal, wherein the client device is a mobile device, wherein the mobile device is running a content access module that determines whether the content is accessible by the mobile device based on whether the unique beacon ID detected by content access module matches that of the beacon device, validating timestamp from beacon device using the public key, and confirming the timestamp is in an acceptable range before allowing access to content on mobile device, wherein the content is relevant to an activity at the location. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A system for controlling access to content, the system comprising:
-
at least one beacon device that emits a beacon device signal comprising a unique ID, wherein the beacon device signal has a ranged sized for a room, the at least one beacon device configured to attach to a position in the room; at least one client electronic device configured to receive the beacon device signal, a content access policy, and the content, wherein the content is selected for an activity specific to the room; a content access module running at the at least one client electronic device that determines whether the content is accessible by the at least one client electronic device based on whether the unique ID detected by content access module matches that of the at least one beacon device, validating a timestamp from beacon device using the beacon public key, and confirming the timestamp is in an acceptable range before allowing access to content; a policy server that provides the content access policy to the at least one client electronic device, wherein the policy server pushes a private key and the unique ID to the beacon device; and a content repository that provides the content to the client electronic device, wherein the content is not accessible until the client electronic device is in the room, wherein the content access module receives the beacon public key and the unique ID.
-
Specification