Proximity-based authorization
First Claim
1. A method comprising:
- receiving a request from a first communications terminal to execute a command;
based on a distance between the first communications terminal and a second communications terminal, authorizing, via a processor, execution of the command to yield a product;
based on the distance, encrypting the product to yield an encrypted product; and
transmitting the encrypted product to the first communications terminal.
19 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses are disclosed for enabling the response to a command from a wireless terminal to be based at least partially on the presence or absence of other users nearby, and possibly the identity of those users. In the illustrated embodiment, a server maintains an updated list of the locations of fixed and wireless terminals within an area (e.g., an IEEE 802.11 wireless access point'"'"'s area of coverage, a CDMA base station'"'"'s cell, etc.). When a user issues a command to his or her wireless terminal, the command is transmitted to the server. The server determines whether there are any other nearby wireless terminals (and inferentially, the users associated with these terminals), and then determines whether the command is authorized in that environment.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a request from a first communications terminal to execute a command; based on a distance between the first communications terminal and a second communications terminal, authorizing, via a processor, execution of the command to yield a product; based on the distance, encrypting the product to yield an encrypted product; and transmitting the encrypted product to the first communications terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a processor; and a computer-readable storage device storing instructions which, when executed by the processor, cause the processor to perform operations comprising; receiving a request from a first communications terminal to execute a command; based on a distance between the first communications terminal and a second communications terminal, authorizing execution of the command to yield a product; based on the distance, encrypting the product to yield an encrypted product; and transmitting the encrypted product to the first communications terminal. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer-readable storage device storing instructions which, when executed by the processor, cause the processor to perform operations comprising:
-
receiving a request from a first communications terminal to execute a command; based on a distance between the first communications terminal and a second communications terminal, authorizing, execution of the command to yield a product; based on the distance, encrypting the product to yield an encrypted product; and transmitting the encrypted product to the first communications terminal. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification