Secure data sharing with publicly accessible computing nodes
First Claim
1. At least one non-transitory storage medium having instructions stored thereon for causing a processor based computing system to:
- determine a first security status for first information and a second security status for second information, the second security status being more secure than the first security status;
establish a first communication path between the system and a first local computing node via a first wireless path;
convey the first information to the first local computing node based on the first security status;
withhold the second information from the first local computing node based on the second security status;
establish a second communication path between the system and a second local computing node via a second wireless path; and
convey the second information to the second local computing node based on the second security status;
wherein the first and second information are stored on at least one of the system and a remotely located computing node.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the second security status being more secure than the first security status; establishing a first communication path between the system and a first local computing node via a first wireless path; conveying the first information to the first local computing node via the first wireless path based on the first security status; and withholding the second information from the first local computing node based on the second security status; wherein the first and second information are stored on at least one of the system and a remotely located computing node. Other embodiments are described herein.
-
Citations
12 Claims
-
1. At least one non-transitory storage medium having instructions stored thereon for causing a processor based computing system to:
-
determine a first security status for first information and a second security status for second information, the second security status being more secure than the first security status; establish a first communication path between the system and a first local computing node via a first wireless path; convey the first information to the first local computing node based on the first security status; withhold the second information from the first local computing node based on the second security status; establish a second communication path between the system and a second local computing node via a second wireless path; and convey the second information to the second local computing node based on the second security status; wherein the first and second information are stored on at least one of the system and a remotely located computing node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method executed by at least one processor of a processor-based system comprising:
-
determining a first security status for first information and a second security status for second information, the second security status being more secure than the first security status; establishing a first communication path between the system and a first local computing node via a first wireless path; conveying the first information to the first local computing node based on the first security status; withholding the second information from the first local computing node based on the second information having the second security status; establishing a second communication path between the system and a second local computing node via a second wireless path; and conveying the second information to the second local computing node based on the second security status; wherein the first and second information are stored on at least one of the system and a remotely located computing node. - View Dependent Claims (11, 12)
-
Specification