Systems and methods for secure location-based document viewing

作者: Lynn Donelle Wilcox , Jacob Biehl , Lucas Peter William Carrigan , William Van Melle

DOI:

关键词:

摘要: A computer-implemented method, the method being performed in a computerized system incorporating central processing unit, localization signal receiver, display and memory, involving: receiving request from user for content; at least one using receiver; determining location based on received signal; plurality of content access rules to determine whether requested is authorized be accessed determined location; providing only if location.

参考文章(29)
Patrick McDevitt, Joseph Barbara, Joseph D. Hughes, Systems and methods for geolocation-based authentication and authorization ,(2015)
Nimrod Barak, Eyal Nathan, Doron Lehmann, Location-based application security mechanism ,(2013)
Shivkumar Krishnan, Frank Anthony Nuzzi, Restrictive Access of a Digital Object Based on Location ,(2011)
Brian J. Tucker, Joakim Linde, Pejman Lotfali Kazemi, Robert Mayor, Augustin Prats, Programmable Beacon Payloads ,(2014)
James Thomas Edward Mcdonnell, John Deryk Waters, Paul Vickers, Andrew Thomas, Simon Edwin Crouch, Location-based data access control ,(2001)
Arjun Sundararajan, Jyh-Han Lin, Location determination using generalized fingerprinting ,(2013)
Kyu Han Kim, Prasant Mohapatra, Jindan Zhu, Kai Zeng, Bluetooth beacon based location determination ,(2012)
Ralph F. Eschenbach, James M. Janky, Flexible monitoring of location and motion ,(1998)