Personal domain controller
First Claim
1. A method of accessing a data resource comprising:
- establishing a trusted relationship between a personal domain controller and a first device;
identifying the data resource using a personal domain controller, the data resource accessible through a first device and associated with a resource locator;
receiving a second-device credential from a second device at a personal domain controller over a local link;
sending, by the personal domain controller over the local link, a personal domain controller credential to the second device to establish a second trusted relationship;
providing the second-device credential to the first device from the personal domain controller, the second device credential to be added to a whitelist by the first device;
sending a first-device credential to the second device for whitelisting subject to the second trusted relationship;
verifying that the first-device credential is whitelisted by the second device;
providing a resource locator to the second device by the personal domain controller;
connecting by the second device, to the first device to access the data resource, the first device allowing the connection based upon the whitelist; and
receiving the data resource by the second device responsive to the verifying.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of accessing a data resource identifies the data resource, the data resource accessible through a first device and associated with a resource locator, the first device configured to provide access to the data resource responsive to possession of a whitelisted credential. The method includes receiving a second-device credential from a second device by a personal domain controller, the personal domain controller and the first device within a first trusted relationship and provides, by the personal domain controller, the second-device credential to the first device for whitelisting subject to the first trusted relationship. The method uses, by the second device, the second-device credential to access the data resource responsive to the resource locator.
-
Citations
17 Claims
-
1. A method of accessing a data resource comprising:
-
establishing a trusted relationship between a personal domain controller and a first device; identifying the data resource using a personal domain controller, the data resource accessible through a first device and associated with a resource locator; receiving a second-device credential from a second device at a personal domain controller over a local link; sending, by the personal domain controller over the local link, a personal domain controller credential to the second device to establish a second trusted relationship; providing the second-device credential to the first device from the personal domain controller, the second device credential to be added to a whitelist by the first device; sending a first-device credential to the second device for whitelisting subject to the second trusted relationship; verifying that the first-device credential is whitelisted by the second device; providing a resource locator to the second device by the personal domain controller; connecting by the second device, to the first device to access the data resource, the first device allowing the connection based upon the whitelist; and receiving the data resource by the second device responsive to the verifying. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An article of computer-readable media containing instructions that when executed by a computer cause the computer to:
-
establish a trusted relationship between a personal domain controller and a first device; identify a data resource, the data resource accessible through a first device and associated with a resource locator; receive a second-device credential from a second device over a local link; send a personal domain controller credential to the second device to establish a second trusted relationship; provide the second-device credential to the first device, the first device to whitelist the second-device credential to allow the second device access through the first device; sending a first-device credential to the second device for whitelisting subject to the second trusted relationship; verifying that the first-device credential is whitelisted by the second device; providing a resource locator to the second device to allow the second device to connect to the first device. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A personal domain device, comprising:
-
a first user interface to allow a user to communicate with a first device and to select a data resource available through the first device; a first port to allow access to the data resource through the first device, the data resource associated with a resource locator, the port further to allow the first device and the personal domain device to establish a trusted relationship; a second user interface to allow a user to communicate with a second device; a second port to allow communication with the second device including reception of a second-device credential from the second device, transmission of a personal domain controller credential to allow establishing of a second trusted relationship, and transmission of a first device credential to the second device for whitelisting; and a processor to; verify that the first-device credential is whitelisted by the second device; provide the second-device credential to the first device for whitelisting subject to the trusted relationship; provide a resource locator to the second device to allow the second device to connect to the first device. - View Dependent Claims (15, 16, 17)
-
Specification