Providing device functionality utilizing authorization tokens
Abstract:
In one example of the disclosure, a request for an authorization token is received via a network from a first computing device having authorization, to utilize functionality at a second computing device. The token is to provide for a third computing device a limited authorization to utilize the functionality. The token is sent to the third device. Subject data and the token are received from the third device. Validity of the token is confirmed. The subject data is sent to the second device for the second device to utilize the functionality in association with the subject data, with security accountability traceable to the first device.
Public/Granted literature
Information query
Patent Agency Ranking
0/0