SYSTEM, METHOD, AND APPARATUS FOR PROXIMITY-BASED AUTHENTICATION FOR MANAGING PERSONAL DATA
First Claim
1. A computer program product comprising a computer useable storage medium to store a computer readable program for proximity-based authentication for managing personal data wherein the computer readable program, when executed on a computer, causes the computer to perform operations comprising:
- receiving a request for personal data from a data access device;
determining a first location corresponding to a location of the data access device;
determining a second location corresponding to a location of an authentication device; and
transmitting the personal data to the data access device in response to determining that the first location is within a threshold distance of the second location.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer program product that includes a computer useable storage medium to store a computer readable program for proximity-based authentication for managing personal data that, when executed on a computer, causes the computer to perform operations. The operations include receiving a request for personal data from a data access device, determining a first location corresponding to a location of the data access device, and determining a second location corresponding to a location of an authentication device. The operations also include transmitting the personal data to the data access device if the first location is within a threshold distance of the second location.
-
Citations
20 Claims
-
1. A computer program product comprising a computer useable storage medium to store a computer readable program for proximity-based authentication for managing personal data wherein the computer readable program, when executed on a computer, causes the computer to perform operations comprising:
-
receiving a request for personal data from a data access device; determining a first location corresponding to a location of the data access device; determining a second location corresponding to a location of an authentication device; and transmitting the personal data to the data access device in response to determining that the first location is within a threshold distance of the second location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for proximity-based authentication for managing personal data, the system comprising:
-
an access controller to manage access to personal data, the access controller comprising; a request receiver to receive a request for the personal data from a data access device; a first location determiner to determine a first location corresponding to a location of the data access device; a second location determiner to determine a second location corresponding to a location of an authentication device to authenticate the request for personal data; and a personal data transmitter to transmit the personal data to the data access device in response to determining that the first location is within a threshold distance of the second location; the data access device coupled to the access controller to access the personal data, the data access device comprising; a request transmitter to transmit the request for personal data to the access controller; and a personal data receiver to receive the personal data from the access controller; and a personal data store coupled to the access controller to store the personal data. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer implemented method for proximity-based authentication for managing personal data, the method comprising:
-
receiving a request for personal data from a data access device; accessing a data access device database associating the data access device with a first location corresponding to a location of the data access device; receiving second location data indicating a second location corresponding to a location of an authentication device; and transmitting the personal data to the data access device in response to determining that the first location is within a threshold distance of the second location. - View Dependent Claims (18, 19, 20)
-
Specification