Data and application access combined with communication services
First Claim
1. An apparatus comprising:
- one or more processors;
a presence detection component configured to detect the presence of a second device;
an authentication component configured to authenticate a user based at least on identifying information provided by the second device;
a resource location component configured to locate one or more applications on a third device based at least on resource access information provided by the second device;
an application component configured to cause the one or more processors to provide the user with access to the one or more applications on the third device, while the second device remains in the presence of the apparatus, in response to the authentication component successfully authenticating the user and the resource location component successfully locating the one or more applications;
one or more memories configured to store, in encrypted form, data related to the user'"'"'s use of the one or more applications; and
an encryption component for encrypting the encrypted data;
wherein the one or more memories are further configured to store a key for reading the encrypted data;
wherein the encryption component is configured to erase the key upon the occurrence of a certain condition;
wherein the condition is one of the failure of the presence detection component to detect the particular device after a certain period of time;
the receipt of signal information indicating that the strength of the second device'"'"'s connection to a certain wireless network has fallen below a certain threshold;
the failure of the encryption component to receive, from the second device, a copy of the key after a predetermined period of time.
5 Assignments
0 Petitions
Accused Products
Abstract
An apparatus conveniently provides a user with access to applications and data that the user accesses on other devices in a secure and authenticated manner. The apparatus detects the presence of a second device, such as a mobile phone. The apparatus authenticates a user based at least on identifying information provided by the second device. The apparatus locates one or more applications based on resource access information provided by the second device. While the second device remains present, upon authenticating the user, and further upon successfully locating the one or more applications, the apparatus provides the user with access to the one or more applications. User data for the one or more applications is made available from the second device and/or a server. The data is synchronized across all sources. The data is encrypted at the apparatus, and rendered unreadable when the second device is no longer present.
44 Citations
21 Claims
-
1. An apparatus comprising:
-
one or more processors; a presence detection component configured to detect the presence of a second device; an authentication component configured to authenticate a user based at least on identifying information provided by the second device; a resource location component configured to locate one or more applications on a third device based at least on resource access information provided by the second device; an application component configured to cause the one or more processors to provide the user with access to the one or more applications on the third device, while the second device remains in the presence of the apparatus, in response to the authentication component successfully authenticating the user and the resource location component successfully locating the one or more applications; one or more memories configured to store, in encrypted form, data related to the user'"'"'s use of the one or more applications; and an encryption component for encrypting the encrypted data; wherein the one or more memories are further configured to store a key for reading the encrypted data; wherein the encryption component is configured to erase the key upon the occurrence of a certain condition; wherein the condition is one of the failure of the presence detection component to detect the particular device after a certain period of time;
the receipt of signal information indicating that the strength of the second device'"'"'s connection to a certain wireless network has fallen below a certain threshold;
the failure of the encryption component to receive, from the second device, a copy of the key after a predetermined period of time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method comprising:
-
detecting, at a first device, the presence of a second device; while the first device remains in the presence of the second device;
the first device authenticating a user based at least on identifying information provided by the second device;
the first device receiving resource access information from the second device;
based at least on the resource access information provided by the second device, the first device locating one or more applications on a third device;
upon successfully authenticating the user and locating the one or more applications, the first device providing the user with access to the one or more applications on the third device;wherein the method is performed by one or more computing devices; wherein the first device includes; one or more memories configured to store, in encrypted form, data related to the user'"'"'s use of the one or more applications; and an encryption component for encrypting the encrypted data; wherein the one or more memories are further configured to store a key for reading the encrypted data; wherein the encryption component is configured to erase the key upon the occurrence of a certain condition; wherein the condition is one of the failure of the presence detection component to detect the particular device after a certain period of time;
the receipt of signal information indicating that the strength of the second device'"'"'s connection to a certain wireless network has fallen below a certain threshold;
the failure of the encryption component to receive, from the second device, a copy of the key after a predetermined period of time.
-
-
21. One or more non-transitory computer-readable media storing one or more instructions that, when executed by one or more processors, cause performance of:
-
detecting, at a first device, the presence of a second device; while the first device remains in the presence of the second device;
the first device authenticating a user based at least on identifying information provided by the second device;
the first device receiving resource access information from the second device;
based at least on the resource access information provided by the second device, the first device locating one or more applications on a third device;
upon successfully authenticating the user and locating the one or more applications, the first device providing the user with access to the one or more applications on the third device;wherein the first device includes; one or more memories configured to store, in encrypted form, data related to the user'"'"'s use of the one or more applications; and an encryption component for encrypting the encrypted data; wherein the one or more memories are further configured to store a key for reading the encrypted data; wherein the encryption component is configured to erase the key upon the occurrence of a certain condition; wherein the condition is one of the failure of the presence detection component to detect the particular device after a certain period of time;
the receipt of signal information indicating that the strength of the second device'"'"'s connection to a certain wireless network has fallen below a certain threshold;
the failure of the encryption component to receive, from the second device, a copy of the key after a predetermined period of time.
-
Specification