Data management with a networked mobile device
First Claim
1. A method for managing data with a mobile device, the method comprising the steps of:
- the mobile device establishing a wireless Near-Field Communication (NFC) connection with an electronic device;
the mobile device receiving, from the electronic device, an indication of an emergency involving a user of the mobile device who will not be asked to help obtain a data file needed to handle the emergency, the indication including a secure token unique to the electronic device and a request for the electronic device to connect to the mobile device without approval from the user;
the mobile device, without involvement of the user, automatically wirelessly connecting, via a network, to a server which has access to the data file, and automatically sending, to the server, authentication information identifying the mobile device;
the mobile device receiving, from the server, approval of the authentication information, and, in response, the mobile device automatically sending the secure token to the server for validation;
the mobile device receiving, from the server, validation of the secure token, and in response, the mobile device connecting to the electronic device;
the mobile device receiving a request, via the wireless NFC connection, from the electronic device for the data file;
the mobile device sending the request for the data file to the server;
the mobile device receiving the data file from the server; and
the mobile device sending the data file to the electronic device.
2 Assignments
0 Petitions
Accused Products
Abstract
A tool for establishing a wireless connection from a mobile device to another device in proximity to the mobile device. The mobile device receives requests for data, such as a user profile, medical records, etc. from the device. The mobile device has the ability to register/preapprove the requesting device allowing the device to access the requested data. The mobile device also has the ability to give varying devices different authorization levels. The mobile device has the ability to store the data on another system, and in response to the request, validate the requesting device and the device'"'"'s authorization level, request the data from the other system through a network, and return the data to the requesting device.
38 Citations
24 Claims
-
1. A method for managing data with a mobile device, the method comprising the steps of:
-
the mobile device establishing a wireless Near-Field Communication (NFC) connection with an electronic device; the mobile device receiving, from the electronic device, an indication of an emergency involving a user of the mobile device who will not be asked to help obtain a data file needed to handle the emergency, the indication including a secure token unique to the electronic device and a request for the electronic device to connect to the mobile device without approval from the user; the mobile device, without involvement of the user, automatically wirelessly connecting, via a network, to a server which has access to the data file, and automatically sending, to the server, authentication information identifying the mobile device; the mobile device receiving, from the server, approval of the authentication information, and, in response, the mobile device automatically sending the secure token to the server for validation; the mobile device receiving, from the server, validation of the secure token, and in response, the mobile device connecting to the electronic device; the mobile device receiving a request, via the wireless NFC connection, from the electronic device for the data file; the mobile device sending the request for the data file to the server; the mobile device receiving the data file from the server; and the mobile device sending the data file to the electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product for managing data with a mobile device, the computer program product comprising:
-
one or more computer-readable storage devices and program instructions stored on the one or more storage devices, the program instructions comprising; program instructions to establish a wireless Near-Field Communication (NFC) connection with an electronic device; program instructions to receive, from the electronic device, an indication of an emergency involving a user of the mobile device who will not be asked to help obtain a data file needed to handle the emergency, the indication including a secure token unique to the electronic device and a request for the electronic device to connect to the mobile device without approval from the user; program instructions to, without involvement of the user, automatically wirelessly connect, via a network, to a server which has access to the data file, and automatically send, to the server authentication information identifying the mobile device; program instructions to receive, from the server, approval of the authentication information, and, in response, the mobile device automatically sending the secure token to the server for validation; program instructions to receive, from the server, validation of the secure token, and in response, program instructions to connect to the electronic device; program instructions to receive a request, via the wireless NFC connection, from the electronic device for the data file; program instructions to send the request for the data file to the server; program instructions to receive the data file from the server; and program instructions to send the data file to the electronic device. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer system for managing data with a mobile device, the computer system comprising:
-
one or more processors, one or more computer-readable memories, one or more computer-readable, storage devices and program instructions which are stored on the one or more storage devices for execution by the one or more processors via the one or more memories, the program instructions comprising; program instructions to establish a wireless Near-Field Communication (NFC) connection with an electronic device; program instructions to receive, from the electronic device, an indication of an emergency involving a user of the mobile device who will not be asked to help obtain a data file needed to handle the emergency, the indication including a secure token unique to the electronic device and a request for the electronic device to connect to the mobile device without approval from the user; program instructions to, without involvement of the user, automatically wirelessly connect, via a network, to a server which has access to the data file, and automatically send, to the server, authentication information identifying the mobile device; program instructions to receive, from the server, approval of the authentication information, and, in response, the mobile device automatically sending the secure token to the server for validation; program instructions to receive, from the server, validation of the secure token, and in response, program instructions to connect to the electronic device; program instructions to receive a request, via the wireless NFC connection, from the electronic device for the data file; program instructions to send the request for the data file to the server; program instructions to receive the data file from the server; and program instructions to send the data file to the electronic device. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
Specification