SYSTEM, METHOD, AND APPARATUS FOR PROXIMITY-BASED AUTHENTICATION FOR MANAGING PERSONAL DATA
First Claim
1. A computer implemented method for proximity-based authentication for managing personal data, the method comprising:
- receiving a request for personal data from a data access device;
accessing a data access device database associating the data access device with a first location corresponding to a location of the data access device;
receiving second location data indicating a second location corresponding to a location of an authentication device; and
transmitting the personal data to the data access device in response to determining that the first location is within a threshold distance of the second location.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer program product that includes a computer useable storage medium to store a computer readable program for proximity-based authentication for managing personal data that, when executed on a computer, causes the computer to perform operations. The operations include receiving a request for personal data from a data access device, determining a first location corresponding to a location of the data access device, and determining a second location corresponding to a location of an authentication device. The operations also include transmitting the personal data to the data access device if the first location is within a threshold distance of the second location.
22 Citations
4 Claims
-
1. A computer implemented method for proximity-based authentication for managing personal data, the method comprising:
-
receiving a request for personal data from a data access device; accessing a data access device database associating the data access device with a first location corresponding to a location of the data access device; receiving second location data indicating a second location corresponding to a location of an authentication device; and transmitting the personal data to the data access device in response to determining that the first location is within a threshold distance of the second location. - View Dependent Claims (2, 3, 4)
-
Specification