Peripheral device management
First Claim
Patent Images
1. A method comprising:
- receiving, in a compliance server, a request for a user device to access a peripheral device, the request comprising information regarding the user device, information regarding the peripheral device, and an authentication credential associated with user data, wherein the request is sent in response to a detection of the user device in proximity to the peripheral device;
determining, in the compliance server, by comparing at least one compliance rule to the information regarding the user device and the information regarding the peripheral device, whether to grant the request for the user device to access the peripheral device; and
facilitating, by the compliance server, access to the peripheral device for the user device in response to determining that the request for the user device to access the peripheral device is granted.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system, apparatus, and computer program product are provided for providing peripheral device management. For example, a method is provided that includes receiving, from a user device, a request to access at least one peripheral device, the request comprising information regarding the user device. The method may further include determining, based at least in part on at least one compliance rule and the information regarding the user device, whether to grant the request, and, in an instance in which it is determined to grant the request, causing access to the at least one peripheral device by the user device to be facilitated.
154 Citations
20 Claims
-
1. A method comprising:
-
receiving, in a compliance server, a request for a user device to access a peripheral device, the request comprising information regarding the user device, information regarding the peripheral device, and an authentication credential associated with user data, wherein the request is sent in response to a detection of the user device in proximity to the peripheral device; determining, in the compliance server, by comparing at least one compliance rule to the information regarding the user device and the information regarding the peripheral device, whether to grant the request for the user device to access the peripheral device; and facilitating, by the compliance server, access to the peripheral device for the user device in response to determining that the request for the user device to access the peripheral device is granted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computing device comprising at least one processor and at least one memory storing program code instructions, the at least one memory and program code instructions being configured to direct the computing device to at least:
-
receive a request for a user device to access a peripheral device, the request comprising information regarding the user device and the peripheral device, and an authentication credential associated with user data, wherein the request is sent in response to a detection of the user device in proximity to the peripheral device; determine, by comparing at least one compliance rule to the information regarding the user device and the peripheral device, whether to grant the request to access the peripheral device; and enable access to the peripheral device for the user device in response to determining that the request for the user device to access the peripheral device is granted. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A non-transitory computer readable storage medium having program code portions embodied therein, the program code portions being configured to, upon execution, direct at least one processor to at least:
-
receive, from a user device, a request to access a particular service, the request comprising information regarding the user device, information regarding a peripheral device, and an authentication credential associated with user data, wherein the request is automatically generated by the user device when the user device is within a proximity of the peripheral device; determine, by comparing at least one compliance rule to the information regarding the user device and the information regarding the peripheral device, whether to grant the request to access the particular service; identify, based at least in part upon a functionality required by the particular service, whether the peripheral device is associated with the particular service; and authorize the user device to access the at least one suitable peripheral device by the user device in response to the request being granted. - View Dependent Claims (18, 19, 20)
-
Specification