×

SECONDARY DEVICE AS KEY FOR AUTHORIZING ACCESS TO RESOURCES

  • US 20160337347A1
  • Filed: 07/26/2016
  • Published: 11/17/2016
  • Est. Priority Date: 03/15/2013
  • Status: Abandoned Application
First Claim
Patent Images

1. A method, comprising:

  • causing a resource to be encrypted to create an encrypted version of the resource, the encrypted version of the resource being configured to be inaccessible by a primary client device, the encrypted version of the resource being configured to be decrypted using an authorization credential to create an unencrypted version of the resource, and the unencrypted version of the resource being configured to be accessible by the primary client device;

    causing the encrypted version of the resource to be provided to the primary client device;

    determining that the primary client device is authorized to access the unencrypted version of the resource based at least in part on a first distribution rule, the first distribution rule being associated with the primary client device;

    determining that a secondary client device is authorized to provide the primary client device with the unencrypted version of the resource based at least in part on a second distribution rule, the second distribution rule being associated with the secondary client device; and

    ,causing the authorization credential to be provided to the secondary client device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×