System for Accessing Data from Multiple Devices
First Claim
Patent Images
1. A method of accessing data at a device, wherein the data is stored remotely from the device or in removable storage, the method comprising the following steps:
- (i) sending a request from the device to access the data, the request including an identification code of a secure element or memory card associated with the device;
(ii) verifying, based at least partly on the identification code, whether access to the data is to be allowed or denied; and
(iii) allowing or denying the device access to the data accordingly.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of accessing data at a device, wherein the data is stored remotely from the device or in removable storage, comprises the following steps: (i) sending a request from the device to access the data, the request including an identification code of a secure element or memory card associated with the device; (ii) verifying, based at least partly on the identification code, whether access to the data is to be allowed or denied; and (iii) allowing or denying the device access to the data accordingly.
91 Citations
100 Claims
-
1. A method of accessing data at a device, wherein the data is stored remotely from the device or in removable storage, the method comprising the following steps:
-
(i) sending a request from the device to access the data, the request including an identification code of a secure element or memory card associated with the device; (ii) verifying, based at least partly on the identification code, whether access to the data is to be allowed or denied; and (iii) allowing or denying the device access to the data accordingly. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 47, 93, 94, 95)
-
-
13. A method of controlling access to data from a device, wherein the data is stored remotely from the device or in removable storage, the method comprising the following steps:
-
(i) receiving a request from the device to access the data, the request including an identification code of a secure element or memory card associated with the device; (ii) verifying, based at least partly on the identification code, whether access to the data is to be allowed or denied; and (iii) allowing or denying the device access to the data accordingly. - View Dependent Claims (15, 16)
-
-
17. A data access controller for controlling access to data stored remotely from a device or in removable storage, the data access controller being arranged to perform the following steps:
-
(i) receive a request from the device to access the data, the request including an identification code of a secure element or memory card associated with the device; (ii) verify, based at least partly on the identification code, whether access to the data is to be allowed or denied; and (iii) allow or deny the device access to the data accordingly. - View Dependent Claims (18)
-
-
19. A system comprising a device and a data access controller for controlling access from the device to data stored remotely from the device or in removable storage, wherein the device is arranged to send a request to access the data to the data access controller, the request including an identification code of a secure element or memory card associated with the device;
- and the data access controller is arranged to verify, based at least partly on the identification code, whether access to the data is to be allowed or denied, and to allow or deny the device access to the data accordingly.
-
20. A computer program for controlling access to data stored remotely from a device or in removable storage, the program being configured to perform the following steps when executed by a processor:
- (i) receive a request from the device to access the data, the request including an identification code of a secure element or memory card associated with the device;
(ii) verify, based at least partly on the identification code, whether access to the data is to be allowed or denied; and
(iii) allow or deny the device access to the data accordingly.
- (i) receive a request from the device to access the data, the request including an identification code of a secure element or memory card associated with the device;
-
21. A method of registering a device with an access controller such that the device may access data via the access controller, the data being stored remotely from a device or in removable storage, wherein the method comprises:
-
sending a request to register a device for access to data, the request including an identification code of a secure element or memory card associated with the device; checking whether access to the data is to be allowed; and if access is to be allowed, registering the identification code against the data to be accessed. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A method of registering a device with an access controller such that the device may access data via the access controller, the data being stored remotely from a device or in removable storage, wherein the method comprises:
-
receiving a request to register a device for access to data, the request including an identification code of a secure element or memory card associated with the device; checking whether access to the data is to be allowed; and if access is to be allowed, registering the identification code against the data to be accessed.
-
-
27. A data access controller for controlling registration of devices with access to data, the controller being arranged to perform the following steps:
-
receive a request to register a device for access to data, the request including an identification code of a secure element or memory card associated with the device; check whether access to the data is to be allowed; and if access is to be allowed, register the identification code against the data to be accessed.
-
-
28. A system comprising a device and a data access controller for controlling registration of devices with access to data, the controller being arranged to perform the following steps:
-
receive from the device a request to register the device for access to data, the request including an identification code of a secure element or memory card associated with the device; check whether access to the data is to be allowed; and if access is to be allowed, register the identification code against the data to be accessed.
-
-
29. A computer program for controlling registration of devices with access to data, the program being configured to perform the following steps when executed by a processor:
-
receive from the device a request to register the device for access to data, the request including an identification code of a secure element or memory card associated with the device; check whether access to the data is to be allowed; and if access is to be allowed, register the identification code against the data to be accessed.
-
-
30. A method of accessing data at a device, wherein the data is stored remotely from the device or in removable storage, the method comprising:
-
receiving at the device an invitation to access the data, the invitation comprising a password, code or PIN; sending a request from the device to access the data, the request including the password, code or PIN; verifying, based at least partly on the password, code or PIN, whether access to the data is to be allowed or denied; and allowing or denying the device access to the data accordingly. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A method of allowing access to data at a device, wherein the data is stored remotely from the device or in removable storage, the method comprising:
-
sending to the device an invitation to access the data, the invitation comprising a password, code or PIN; sending a request from the device to access the data, the request including the password, code or PIN; verifying, based at least partly on the password, code or PIN, whether access to the data is to be allowed or denied; and allowing or denying the device access to the data accordingly.
-
-
45. A system comprising a first device, a second device and a data access controller, the first device being arranged to invite the second device to access data, wherein the data is stored remotely from the second device or in removable storage,
wherein the first device is arranged to send to the second device an invitation to access the data, the invitation comprising a password, code or PIN; -
the second device is arranged to send a request to access the data, the request including the password, code or PIN; and the data access controller is arranged to verify, based at least partly on the password, code or PIN, whether access to the data is to be allowed or denied, and to allow or deny the second device access to the data accordingly.
-
-
46. A method of accessing data at a device, wherein the data is stored remotely from the device or in removable storage, the method comprising the following steps:
-
(i) sending a request from the device to access the data, the request including data related to the request; (ii) verifying, based at least partly on the data, whether access to the data is to be allowed or denied; and (iii) allowing the device access to the data accordingly and only if there is at least one further device accessing the data. - View Dependent Claims (48, 49)
-
-
50. A method of controlling access to data at a device, wherein the data is stored remotely from the device or in removable storage, the method comprising the following steps:
-
(i) receiving a request from the device to access the data, the request including data related to the request; (ii) verifying, based at least partly on the data, whether access to the data is to be allowed or denied; and (iii) allowing the device access to the data accordingly and only if there is at least one further device accessing the data.
-
-
51. A data access controller for controlling access to data at a device, wherein the data is stored remotely from the device or in removable storage, the data access controller being arranged to perform the following steps:
-
(i) receive a request from the device to access the data, the request including data related to the request; (ii) verify, based at least partly on the data, whether access to the data is to be allowed or denied; and (iii) allow the device access to the data accordingly and only if there is at least one further device accessing the data. - View Dependent Claims (52)
-
-
53. A system comprising a device and a data access for controlling access to data at a device, wherein the data is stored remotely from the device or in removable storage, the data access controller being arranged to perform the following steps:
-
(i) receive a request from the device to access the data, the request including data related to the request; (ii) verify, based at least partly on the data, whether access to the data is to be allowed or denied; and (iii) allow the device access to the data accordingly and only if there is at least one further device accessing the data. - View Dependent Claims (54, 55)
-
-
56. A computer program for controlling access to data stored remotely from a device or in removable storage, the program being configured to perform the following steps when executed by a processor:
-
(i) receive a request from the device to access the data, the request including data related to the request; (ii) verify, based at least partly on the data, whether access to the data is to be allowed or denied; and (iii) allow the device access to the data accordingly and only if there is at least one further device accessing the data. - View Dependent Claims (57)
-
-
58. A method of accessing data at a device, wherein the data is stored remotely from the device, in removable storage or in the device itself, the method comprising the following steps:
-
(i) sending a request to access the data, the request including an identification code associated with the device and one or more of; a PIN or passcode; and data representing something inherent to the user of the device such as genetic and/or biometric information; (ii) verifying, based on the identification code, and the PIN or passcode and/or data representing something inherent to the user, whether access to the data is to be allowed or denied; and (iii) allowing or denying the device access to the data accordingly. - View Dependent Claims (59, 60)
-
-
61. A method of controlling access to data at a device, wherein the data is stored remotely from the device, in removable storage or in the device itself, the method comprising the following steps:
-
(i) receiving a request to access the data, the request including an identification code associated with the device and one or more of;
a PIN or passcode; and
data representing something inherent to the user of the device such as genetic and/or biometric information;(ii) verifying, based on the identification code, and the PIN or passcode and/or data representing something inherent to the user, whether access to the data is to be allowed or denied; and (iii) allowing or denying the device access to the data accordingly.
-
-
62. A data access controller for controlling access to data at a device, wherein the data is stored remotely from the device, in removable storage or in the device itself, the data access controller being arranged to perform the following steps:
-
(i) receive a request to access the data, the request including an identification code associated with the device and one or more of;
a PIN or passcode; and
data representing something inherent to the user of the device such as genetic and/or biometric information;(ii) verify, based on the identification code, and the PIN or passcode and/or data representing something inherent to the user, whether access to the data is to be allowed or denied; and (iii) allow or deny the device access to the data accordingly.
-
-
63. A computer program for controlling access to data at a device, wherein the data is stored remotely from the device, in removable storage or in the device itself, the program being configured to perform the following steps when executed by a processor:
-
(i) receive a request to access the data, the request including an identification code associated with the device and one or more of;
a PIN or passcode; and
data representing something inherent to the user of the device such as genetic and/or biometric information;(ii) verify, based on the identification code, and the PIN or passcode and/or data representing something inherent to the user, whether access to the data is to be allowed or denied; and (iii) allow or deny the device access to the data accordingly.
-
-
64. A method of accessing a cloud-based or web-based third party service from a device, the method comprising the following steps:
-
(i) sending a request from the device to a cloud-based partition associated with the device, the partition including data for facilitating connection to the third party service, the request including an identification code of a secure element or memory card associated with the device; (ii) verifying, based at least partly on the identification code, whether access to the partition is to be allowed or denied; (iii) allowing or denying the device access to the partition accordingly; and, after access to the partition is allowed; (iv) transmitting credentials to the third party service. - View Dependent Claims (65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 97)
-
-
96. A method of controlling access to a cloud-based or web-based third party service by a device, the method comprising the following steps:
-
(i) receiving a request from the device to a cloud-based partition associated with the device, the partition including data for facilitating connection to the third party service, the request including an identification code of a secure element or memory card associated with the device; (ii) verifying, based at least partly on the identification code, whether access to the partition is to be allowed or denied; (iii) allowing or denying the device access to the partition accordingly; and
, when access to the partition is allowed;(iv) transmitting credentials to the third party service. - View Dependent Claims (98)
-
-
99. A method of accessing a partition from a device, comprising the steps of:
-
a. performing a mutual authentication between the partition and the device; and b. creating a secure channel between the partition and the device, wherein the authentication comprises two or more factors, the factors being chosen from the following list; an identification code of a smart object (a memory card or secure element) associated with the device; a passcode or PIN; genetic or biometric identification data; a location; a time;
orwhether another member (e.g. an administrator) or a group which the user belongs to is accessing the data. - View Dependent Claims (100)
-
Specification