Proximity-based authorization
First Claim
1. A method comprising:
- receiving, at a first wireless terminal, a request from a first user to access content associated with the first wireless terminal;
when a second wireless terminal associated with a second user is within a distance D of the first wireless terminal, displaying the content, via the first wireless terminal, as text; and
when the second wireless terminal is not within the distance D of the first wireless terminal, providing the content as audio via the first wireless.
29 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses are disclosed for enabling the response to a command from a wireless terminal to be based at least partially on the presence or absence of other users nearby, and possibly the identity of those users. In the illustrated embodiment, a server maintains an updated list of the locations of fixed and wireless terminals within an area (e.g., an IEEE 802.11 wireless access point'"'"'s area of coverage, a CDMA base station'"'"'s cell, etc.). When a user issues a command to his or her wireless terminal, the command is transmitted to the server. The server determines whether there are any other nearby wireless terminals (and inferentially, the users associated with these terminals), and then determines whether the command is authorized in that environment.
-
Citations
6 Claims
-
1. A method comprising:
-
receiving, at a first wireless terminal, a request from a first user to access content associated with the first wireless terminal; when a second wireless terminal associated with a second user is within a distance D of the first wireless terminal, displaying the content, via the first wireless terminal, as text; and when the second wireless terminal is not within the distance D of the first wireless terminal, providing the content as audio via the first wireless. - View Dependent Claims (2, 3)
-
-
4. A method comprising:
-
receiving, at a first wireless terminal, an input for placing a call; determining if a second wireless terminal is within a distance of the first wireless terminal to yield a first determination; when the first determination indicates that the second wireless terminal is within the distance of the first wireless terminal, determining whether the call is authorized in a presence of a user associated with the second wireless terminal to yield a second determination; and placing the call only when the second determination indicates that the call is authorized in the presence of the user.
-
-
5. A method comprising:
-
receiving a remote command that is submitted by a first user of a first wireless terminal; executing the remote command to yield a value; determining if a second wireless terminal is within a distance of the first wireless terminal to yield a first determination; when the first determination indicates that the second wireless terminal is within the distance of the first wireless terminal, determining whether transmission of the value to the first wireless terminal is authorized in a presence of a second user associated with the second wireless terminal to yield a second determination; and transmitting the value to the first wireless terminal only when the second determination indicates that transmission of the value to the first wireless terminal is authorized in the presence of the second user. - View Dependent Claims (6)
-
Specification