Peer-to-peer neighbor detection for proximity-based command execution
First Claim
1. A method comprising:
- (a) receiving a command at a first personal wireless terminal; and
(b) refusing to execute said command when there are k other personal wireless terminals in the same wireless network as said first personal wireless terminal;
wherein k is a positive integer.
25 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and methods are disclosed for enabling the response to a command at a personal wireless terminal to be based at least partially on the presence or absence of other users nearby, and possibly the identity of those users. In the illustrated embodiment, the personal wireless terminal determines wirelessly (e.g., via Bluetooth, etc.) whether there are any other nearby personal wireless terminals (and inferentially, the users associated with these terminals), and then determines whether the command is authorized in that particular environment of nearby users. In some embodiments, authorization is also at least partially based on one or more additional factors, such as the identity of the user of the personal wireless terminal, the identify of nearby users, the nature of the command, one or more arguments of a command, the value of a datum retrieved by a query, and the date and time (i.e., “calendrical time”).
-
Citations
30 Claims
-
1. A method comprising:
-
(a) receiving a command at a first personal wireless terminal; and
(b) refusing to execute said command when there are k other personal wireless terminals in the same wireless network as said first personal wireless terminal;
wherein k is a positive integer. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
(a) receiving a command at a first personal wireless terminal, wherein said first personal wireless terminal transmits and receives messages in accordance with a wireless peer-to-peer protocol; and
(b) refusing to execute said command when there are k other personal wireless terminals that currently are capable of communicating with said first personal wireless terminal via said wireless peer-to-peer protocol;
wherein k is a positive integer. - View Dependent Claims (8)
-
-
9. A method comprising:
-
(a) receiving a command at a first personal wireless terminal; and
(b) executing said command only when (i) there are k other personal wireless terminals in the same wireless network as said first personal wireless terminal, and (ii) said command is independent of said k other personal wireless terminals;
wherein k is a positive integer.
-
-
10. A method comprising:
-
(a) receiving a command at a first personal wireless terminal, wherein said first personal wireless terminal transmits and receives messages in accordance with a wireless peer-to-peer protocol; and
(b) executing said command only when (i) there are k other personal wireless terminals that currently are capable of communicating with said first personal wireless terminal via said wireless peer-to-peer protocol, and (ii) said command is independent of said k other personal wireless terminals;
wherein k is a positive integer.
-
-
11. A method comprising:
-
(a) receiving a command at a first personal wireless terminal; and
(b) refusing to execute said command when (i) there is a second personal wireless terminal in the same wireless network as said first personal wireless terminal, and (ii) the user of said first personal wireless terminal is unauthorized to execute said command in the presence of the user of said second personal wireless terminal. - View Dependent Claims (12, 13)
-
-
14. A method comprising:
-
(a) receiving a command at a first personal wireless terminal, wherein said first personal wireless terminal transmits and receives messages in accordance with a wireless peer-to-peer protocol; and
(b) refusing to execute said command when (i) there is a second personal wireless terminal that is capable of communicating with said first personal wireless terminal via said wireless peer-to-peer protocol, and (ii) the user of said first personal wireless terminal is unauthorized to execute said command in the presence of the user of said second personal wireless terminal. - View Dependent Claims (15, 16)
-
-
17. A method comprising:
-
(a) receiving a command at a first personal wireless terminal; and
(b) executing said command only when (i) there are k other personal wireless terminals in the same wireless network as said first personal wireless terminal, and (ii) the user of said first personal wireless terminal is authorized to execute said command in the presence of each of the users of said k other personal wireless terminals;
wherein k is a positive integer. - View Dependent Claims (18, 19)
-
-
20. A method comprising:
-
(a) receiving a command at a first personal wireless terminal, wherein said first personal wireless terminal transmits and receives messages in accordance with a wireless peer-to-peer protocol; and
(b) executing said command only when (i) there are k other personal wireless terminals that currently are capable of communicating with said first personal wireless terminal via said wireless peer-to-peer protocol, and (ii) the user of said first personal wireless terminal is authorized to execute said command in the presence of each of the users of said k other personal wireless terminals;
wherein k is a positive integer. - View Dependent Claims (21, 22)
-
-
23. A method comprising:
-
(a) receiving a command at a first personal wireless terminal; and
(b) refusing to execute said command when (i) there is a second personal wireless terminal in the same wireless network as said first personal wireless terminal, and (ii) the user of said second personal wireless terminal is unauthorized to execute said command. - View Dependent Claims (24)
-
-
25. A method comprising:
-
(a) receiving a command at a first personal wireless terminal; and
(b) executing said command only when (i) there is a second personal wireless terminal in the same wireless network as said first personal wireless terminal, and (ii) the user of said second personal wireless terminal is authorized to execute said command. - View Dependent Claims (26, 27, 28)
-
-
29. A method comprising:
-
(a) receiving at a first personal wireless terminal a request to access content; and
(b) outputting at said first personal wireless terminal a first version of said content when there are at least k other personal wireless terminals in the same wireless network as said first personal wireless terminal, and outputting at said first personal wireless terminal a second version of said content when there are fewer than k other personal wireless terminals in the same wireless network as said first personal wireless terminal;
wherein k is a positive integer. - View Dependent Claims (30)
-
Specification