Restricting access to information
First Claim
1. A method for determining whether a proximately located person is authorized to receive information, the method comprising:
- detecting, at a first authorization device, a second authorization device, wherein the first authorization device is operative to maintain first authorization data and wherein the second authorization device is associated with the proximately located person and is operative to maintain second authorization data indicating whether the proximately located person is authorized to receive the information;
receiving, at the first authorization device, the second authorization data from the second authorization device, wherein the second authorization data indicates first topics of data the proximately located person is authorized to receive, wherein the first topics comprise a list of confidentiality agreements signed by the proximately located person indicating the data the proximately located person is authorized to receive;
comparing, at the first authorization device, the first authorization data to the second authorization data to determine any matches between the first authorization data and second authorization data;
in response to determining a match between the first authorization data and the second authorization data, displaying at the first authorization device, a first indication for each of the first topics of the second authorization data that matches the first authorization data, wherein the first indication displayed at the first authorization device identifies each of the first topics of the second authorization data that matches the first authorization data; and
in response to determining no matches between the first authorization data and the second authorization data, displaying, at the first authorization data, a second indication that none of the second authorization data matches the first authorization data.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies are presented herein for restricting access to information. According to various embodiments described herein, an authorization device is provided that includes functionality for detecting other proximately located authorization devices. When an authorization device detects another proximately located authorization device, authorization data stored in the detected device is retrieved. The retrieved authorization data is compared to stored authorization data and a determination is made as to whether a person associated with the detected device is authorized to receive information. The authorization device provides an indication as to whether the person is authorized to receive information. The authorization device may also provide an indication of the particular information that the person is authorized to receive. The authorization device may also be utilized to ensure that only authorized individuals participate in a meeting and that each participant is authorized to receive the information that is the subject of the meeting.
163 Citations
16 Claims
-
1. A method for determining whether a proximately located person is authorized to receive information, the method comprising:
-
detecting, at a first authorization device, a second authorization device, wherein the first authorization device is operative to maintain first authorization data and wherein the second authorization device is associated with the proximately located person and is operative to maintain second authorization data indicating whether the proximately located person is authorized to receive the information; receiving, at the first authorization device, the second authorization data from the second authorization device, wherein the second authorization data indicates first topics of data the proximately located person is authorized to receive, wherein the first topics comprise a list of confidentiality agreements signed by the proximately located person indicating the data the proximately located person is authorized to receive; comparing, at the first authorization device, the first authorization data to the second authorization data to determine any matches between the first authorization data and second authorization data; in response to determining a match between the first authorization data and the second authorization data, displaying at the first authorization device, a first indication for each of the first topics of the second authorization data that matches the first authorization data, wherein the first indication displayed at the first authorization device identifies each of the first topics of the second authorization data that matches the first authorization data; and in response to determining no matches between the first authorization data and the second authorization data, displaying, at the first authorization data, a second indication that none of the second authorization data matches the first authorization data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A first authorization device for determining whether a proximately located person is authorized to receive information, the first authorization device comprising:
-
memory for storing a program containing code for determining whether the proximately located person is authorized to receive the information; and a processor functionally coupled to the memory, the processor being responsive to computer executable instruction contained in the program enabling the processor to perform a method comprising; detecting a second authorization device, wherein the first authorization device is operative to maintain first authorization data and wherein the second authorization device is associated with the proximately located person and is operative to maintain second authorization data indicating whether the proximately located person is authorized to receive the information, receiving the second authorization data from the second authorization device, wherein the second authorization data indicate first topics of data the proximately located person is authorized to receive, wherein the first topics comprise a list of confidentiality agreement signed by the proximately located person indicating the data the proximately located person is authorized to receive; comparing the first authorization data to the second authorization data to determine any matches between the first authorization data and second authorization data, in response to determining a match between the first authorization data and the second authorization data, displaying a first indication for each of the first topics of the second authorization data that matches the first authorization data, wherein the first indication displayed at the first authorization device identifies each of the first topics of the second authorization data that matches the first authorization data, and in response to determining no matches between the first authorization data and the second authorization data, displaying, at the first authorization device, a second indication that none of the second authorization data matches the first authorization data. - View Dependent Claims (8, 9, 10)
-
-
11. A non-transitory computer-readable medium having computer-executable instructions stored thereon which, when executed by a computer, cause the computer to perform a method comprising:
-
detecting a plurality of participants of a meeting by detecting an authorization device associated with each of the plurality of participants of the meeting, the authorization device operative to maintain authorization data indicating first topics of information each of the plurality of participants of the meeting is authorized to receive data; determining whether each of the plurality of participants of the meeting is authorized to receive a second topic of information that is a subject of the meeting; and in response to determining that a participant of the plurality of participants is not authorized to receive the second topic of information that is the subject of the meeting, displaying an indication that all of the plurality of participants are not authorized to receive the second topic of information, wherein the indication identifies the participant of the plurality of participants that is not authorized to receive the second topic of information. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification