摘要 |
Techniques for controlling the provision of data to a requester use a local device communicating with a personal computing device. The personal computing device has an authorized state and an unauthorized state. If the personal computing device is proximal to the local device when the local device receives the request for data from the requester, then the personal computing device uses permission data it stores to determine whether the request is or is not a permitted request. If the request is a permitted request, then the personal computing device sends a message to a token issuing device to issue a token request to the requester. The requester then uses this token to access a third party device holding the data to which it seeks access. |