Abstract:
Proximity of a wearable processing device to a data processing apparatus is detected based on wireless signals received by the data processing apparatus from the wearable processing device. A user input operation is detected which comprises a physical interaction with the data processing apparatus. In response to detecting the user input operation, at least one detection parameter is calibrated for the proximity detection. This provides a convenient technique for calibrating the proximity detection which does not require complicated operations from the user.
Abstract:
A personal computing device receives a request for data from a requester. The personal computing device determines whether or not that request is to be permitted or not permitted. The personal computing device indicates to the user both a data indication of what data has been requested by the requester and a policy indication of what policy (e.g. retention policy) is associated with that data. The personal computing device may take the form of a smart watch. The data indication may take the form of an icon and the policy indication may take the form of an icon overlaid upon the data icon.
Abstract:
Proximity of a wearable processing device to a data processing apparatus is detected based on wireless signals received by the data processing apparatus from the wearable processing device. A user input operation is detected which comprises a physical interaction with the data processing apparatus. In response to detecting the user input operation, at least one detection parameter is calibrated for the proximity detection. This provides a convenient technique for calibrating the proximity detection which does not require complicated operations from the user.
Abstract:
Techniques for controlling the provision of data to a requester use a local device communicating with a personal computing device. The personal computing device has an authorized state and an unauthorized state. If the personal computing device is proximal to the local device when the local device receives the request for data from the requester, then the personal computing device uses permission data it stores to determine whether the request is or is not a permitted request. If the request is a permitted request, then the personal computing device sends a message to a token issuing device to issue a token request to the requester. The requester then uses this token to access a third party device holding the data to which it seeks access.
Abstract:
Techniques for controlling the provision of data to a requester use a local device communicating with a personal computing device. The personal computing device has an authorized state and an unauthorized state. If the personal computing device is proximal to the local device when the local device receives the request for data from the requester, then the personal computing device uses permission data it stores to determine whether the request is or is not a permitted request. If the request is a permitted request, then the personal computing device sends a message to a token issuing device to issue a token request to the requester. The requester then uses this token to access a third party device holding the data to which it seeks access.