METHODS AND APPARATUSES FOR LOCATION-BASED ACCESS MANAGEMENT
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses for located-based content access control have been disclosed. A method may comprise: receiving, at a mobile device, from a short distance communication node, an identifier of the node; generating a device key for the mobile device based on the identifier of the node and an identifier of the mobile device; sending to the node the device key and the identifier of the mobile device, at least based on which the mobile device may be authenticated; and receiving, at the mobile device, from the node, one or more content keys, either encrypted or unencrypted, for decrypting content that has been or is to be saved in the mobile device.
55 Citations
64 Claims
-
1-33. -33. (canceled)
-
34. A method, comprising:
-
receiving, at a mobile device, from a short distance communication node, an identifier of the node; generating a device key for the mobile device based on the identifier of the node and an identifier of the mobile device; sending to the node the device key and the identifier of the mobile device, at least based on which the mobile device may be authenticated; and receiving, at the mobile device, from the node, one or more content keys, either encrypted or unencrypted, for decrypting content that has been or is to be saved in the mobile device. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
-
41. A method, comprising:
-
sending, to a mobile device, an identifier of a short distance communication node; receiving, from the mobile device, a device key for the mobile device and an identifier of the mobile device, wherein the device key is generated based on the identifier of the node and the identifier of the mobile device; authenticating the mobile device at least based on the device key and the identifier of the mobile device; and sending, to the mobile device, one or more content keys, either encrypted or unencrypted, for decrypting content that has been or is to be saved in the mobile device. - View Dependent Claims (42, 43, 44)
-
-
45. An apparatus, comprising:
-
a short distance communication module, at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code configured to, with the at least one processor and the short distance communication module, cause the apparatus at least to perform; receiving, from a short distance communication node, an identifier of the node; generating a device key for the apparatus based on the identifier of the node and an identifier of the apparatus; sending, to the node via the short distance communication module, the device key and the identifier of the apparatus, at least based on which the apparatus may be authenticated; and receiving, from the node via the short distance communication module, one or more content keys, either encrypted or unencrypted, for decrypting content that has been or is to be saved in the apparatus. - View Dependent Claims (46, 47, 48)
-
-
49. An apparatus, comprising:
-
a short distance communication module, at least one processor, and at least one memory including computer program code, wherein the at least one memory and the computer program code configured to, with the at least one processor and the short distance communication module, cause the apparatus at least to perform; sending, to a mobile device, an identifier of the short distance communication module; receiving, from the mobile device, a device key for the mobile device and an identifier of the mobile device, wherein the device key is generated based on the identifier of the short distance communication module and the identifier of the mobile device; authenticating the mobile device at least based on the device key and the identifier of the mobile device; and sending, to the mobile device, one or more content keys, either encrypted or unencrypted, for decrypting content that has been or is to be saved in the mobile device. - View Dependent Claims (50, 51, 52, 53)
-
-
54. A non-transitory computer-readable storage media having computer program code stored thereon, the computer program code configured to, when executed, cause an apparatus to perform actions comprising:
- receiving, at a mobile device, from a short distance communication node, an identifier of the node;
generating a device key for the mobile device based on the identifier of the node and an identifier of the mobile device; sending to the node the device key and the identifier of the mobile device, at least based on which the mobile device may be authenticated; and receiving, at the mobile device, from the node, one or more content keys, either encrypted or unencrypted, for decrypting content that has been or is to be saved in the mobile device. - View Dependent Claims (55, 56, 57, 58, 59, 60)
- receiving, at a mobile device, from a short distance communication node, an identifier of the node;
-
61. A non-transitory computer-readable storage media having computer program code stored thereon, the computer program code configured to, when executed, cause an apparatus to perform actions:
-
sending, to a mobile device, an identifier of a short distance communication node; receiving, from the mobile device, a device key for the mobile device and an identifier of the mobile device, wherein the device key is generated based on the identifier of the node and the identifier of the mobile device; authenticating the mobile device at least based on the device key and the identifier of the mobile device; and sending, to the mobile device, one or more content keys, either encrypted or unencrypted, for decrypting content that has been or is to be saved in the mobile device. - View Dependent Claims (62, 63, 64)
-
Specification