×

Data and application access combined with communication services

  • US 8,407,773 B1
  • Filed: 01/27/2010
  • Issued: 03/26/2013
  • Est. Priority Date: 01/27/2010
  • Status: Expired due to Fees
First Claim
Patent Images

1. An apparatus comprising:

  • one or more processors;

    a presence detection component configured to detect the presence of a second device;

    an authentication component configured to authenticate a user based at least on device identifying information provided by the second device;

    a resource location component configured to (a) transmit the device identifying information provided by the second device to a third device, (b) retrieve resource access information from the third device using at least the device identifying information, and (c) locate one or more applications based at least on the resource access information;

    an application component configured to cause the one or more processors to provide the user with access to the one or more applications, while the second device remains in the presence of the apparatus, in response to the authentication component successfully authenticating the user and the resource location component successfully locating the one or more applications;

    one or more memories configured to store, in encrypted form, data related to the user'"'"'s use of the one or more applications; and

    an encryption component for encrypting the encrypted data;

    wherein the one or more memories are further configured to store a key for reading the encrypted data;

    wherein the encryption component is configured to erase the key upon the occurrence of a certain condition;

    wherein the condition is one of the failure of the presence detection component to detect the particular device after a certain period of time;

    the receipt of signal information indicating that the strength of the second device'"'"'s connection to a certain network has fallen below a certain threshold;

    the failure of the encryption component to receive, from the second device, a copy of the key after a predetermined period of time.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×