Method and system for managing access to information from or about a mobile device
First Claim
1. A method for controlling access to information from or about computing devices, the method comprising:
- deriving, using a processor, a plurality of tokens;
generating an authorizing communication to enable a first one of the devices to obtain information from or about a second wireless one of the devices, the authorizing communication enabling the second device to receive a token assigned to the first device;
presenting the authorizing communication to a user of the second device in a form enabling the user of the second device to view and manually enter the token into computer-readable medium in the second device using a user interface of the second device;
enabling a user of the first device to make a request for information from or about the second device using a user interface of the first device;
transmitting the request to a server including an information management system embodied partly in computer-readable medium in the server; and
fulfilling the request and providing the information from or about the second device to the first device via the server only if the user of the second device has manually entered the token assigned to the first device.
5 Assignments
0 Petitions
Accused Products
Abstract
System and method for controlling access to information about or from computing devices in which an authorization request to enable a first one of the devices to obtain information from or about a second one of the devices is generated and directed to the second device with a token assigned to the first device. Once the token is received by the second device, the authorization request is presented to its user in a form enabling viewing and manually entry of the token into the second device. The user of the first device can, when desired, request information from or about the second device. The request is fulfilled and the information from or about the second device is provided to the first device only after the user of the second device has manually entered the token assigned to the first device.
-
Citations
17 Claims
-
1. A method for controlling access to information from or about computing devices, the method comprising:
-
deriving, using a processor, a plurality of tokens; generating an authorizing communication to enable a first one of the devices to obtain information from or about a second wireless one of the devices, the authorizing communication enabling the second device to receive a token assigned to the first device; presenting the authorizing communication to a user of the second device in a form enabling the user of the second device to view and manually enter the token into computer-readable medium in the second device using a user interface of the second device; enabling a user of the first device to make a request for information from or about the second device using a user interface of the first device; transmitting the request to a server including an information management system embodied partly in computer-readable medium in the server; and fulfilling the request and providing the information from or about the second device to the first device via the server only if the user of the second device has manually entered the token assigned to the first device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for controlling access to information from or about wireless computing devices, the system comprising:
-
a server that interacts with the wireless computing devices and a tracker device that desires to obtain information from or about the wireless computing devices, said server being arranged to; generate a plurality of tokens, direct authorizing communications from the tracker device to at least one of the wireless computing devices to obtain information from or about the wireless computing device, each authorizing communication including a token assigned to the tracker device, receive communications from each wireless computing device indicative of manual entry of the token using a user interface of the wireless computing device, receive requests from the tracker device for information from or about a specific one of the wireless computing devices; determine whether a token assigned to the tracker device has been manually entered by the specific one of the wireless computing devices, and only if so, provide the information from or about the specific one of the wireless computing devices to the tracker device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program embodied on a non-transitory computer-readable medium at a first wireless computing device, the computer program being arranged to:
-
provide information from or about a second wireless computing device by; generating an authorizing communication to enable the first device to obtain the information from or about the second device, the authorizing communication being directed to the second device with a token assigned to the first device; enabling a user of the first device to make a request for information from or about the second device using a user interface of the first device; transmitting the request to a server including an information management system embodied partly in computer-readable medium in the server; and receiving from the server, the information from or about the second device only when a user of the second device has entered the token at the second device; and enable information from or about the first device to be provided to another device by; presenting a received authorization request to a user of the first device in a form enabling the user of the first device to view and manually enter the token using the user interface of the first device, and providing an indication of the entry of the token to the server to enable a sender of the token to receive information from or about the first device. - View Dependent Claims (16, 17)
-
Specification