Proximity-based authorization
First Claim
1. A method comprising:
- (a) receiving from a first wireless terminal a remote command issued by a first user; and
(b) refusing to execute said remote command when there is a second wireless terminal that is associated with a second user and is inside a perimeter that also contains said first wireless terminal.
29 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses are disclosed for enabling the response to a command from a wireless terminal to be based at least partially on the presence or absence of other users nearby, and possibly the identity of those users. In the illustrated embodiment, a server maintains an updated list of the locations of fixed and wireless terminals within an area (e.g., an IEEE 802.11 wireless access point'"'"'s area of coverage, a CDMA base station'"'"'s cell, etc.). When a user issues a command to his or her wireless terminal, the command is transmitted to the server. The server determines whether there are any other nearby wireless terminals (and inferentially, the users associated with these terminals), and then determines whether the command is authorized in that environment.
142 Citations
32 Claims
-
1. A method comprising:
-
(a) receiving from a first wireless terminal a remote command issued by a first user; and
(b) refusing to execute said remote command when there is a second wireless terminal that is associated with a second user and is inside a perimeter that also contains said first wireless terminal. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
(a) receiving from a first wireless terminal a remote command issued by a first user; and
(b) refusing to execute said remote command when (i) there is a second wireless terminal that is associated with a second user and is inside a perimeter that also contains said first wireless terminal, and (ii) the user of said first wireless terminal is unauthorized to execute said remote command in the presence of the user of said second personal wireless terminal. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
(a) receiving from a first wireless terminal a remote command issued by a first user; and
(b) executing said remote command only when there is a second wireless terminal that is associated with a second user and is inside a perimeter that also contains said first wireless terminal. - View Dependent Claims (14)
-
-
15. A method comprising:
-
(a) receiving from a first terminal a local command issued by a first user; and
(b) transmitting to said first terminal a response that indicates whether said first user is authorized to execute said local command;
wherein said response is based on the presence of a second terminal that is wireless, is associated with a second user, and is inside a perimeter that also surrounds said first terminal. - View Dependent Claims (16, 17, 18)
-
-
20. A method comprising:
-
(a) receiving from a first terminal a request by a first user to access content; and
(b) transmitting to said first terminal a version of said content;
wherein said version of said content is based on the presence of a second terminal that is wireless, is associated with a second user, and is inside a perimeter that also surrounds said first terminal. - View Dependent Claims (21, 22, 23)
-
-
24. A method comprising:
-
(a) transmitting a command from a first terminal to a server, wherein said first terminal is associated with a first user; and
(b) receiving a response to said command;
wherein said response is based on the presence of a second terminal that is wireless, is associated with a second user, and is inside a perimeter that also surrounds said first terminal. - View Dependent Claims (25, 26, 27, 28, 29)
-
-
30. A method comprising:
-
(a) transmitting from a first terminal to a server (i) a location and (ii) a description of a perimeter that surrounds said first terminal, wherein said first terminal is associated with a first user;
(b) receiving from said server information about a second terminal that is wireless, is associated with a second user, and is inside said perimeter; and
(c) determining whether to execute a local command based on said information. - View Dependent Claims (31, 32)
-
Specification