Networked device authentication, pairing and resource sharing
First Claim
Patent Images
1. A method of pairing a first computing device to a second computing device, comprising:
- a) receiving an indication to pair the first computing device with the second computing device, said indication based on a contextual circumstance defined for the first and second computing devices, said indication to pair the first computing device with the second computing device generated automatically upon an occurrence of the contextual circumstance without a user initiating the indication to pair, the contextual circumstance comprising detecting concurrent instances of the same application running on the first and second computing devices, wherein said receiving further comprises receiving an indication of parameters to be associated with the pairing of the first computing device with the second computing device, the parameters including an access control list specifying at least one of;
types of computing devices allowed to pair with one of the first computing device or the second computing device, identifications of computing devices allowed to pair with one of the first computing device or the second computing device, or user identities allowed to pair with one of the first computing device or the second computing device;
b) negotiating the pairing of the first computing device with the second computing device, the negotiating including receiving an identification of at least one of the user and the first computing device and receiving an authentication authenticating an association of the user with the first computing device;
c) granting the first computing device access to secure resources available to the second computing device if the identification and authentication of said step b) verify an association between the user and the first computing device, wherein content accessible via the secure resources is displayed via a user interface that is divided between the first computing device and the second computing device; and
d) denying the first computing device access to secure resources available to the second computing device if the identification and authentication of said step b) fail to verify an association between the user and the first computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for pairing computing devices using an authentication protocol that allows an initiating computing device to gain access to a secure, encrypted network of a target computing device.
65 Citations
18 Claims
-
1. A method of pairing a first computing device to a second computing device, comprising:
-
a) receiving an indication to pair the first computing device with the second computing device, said indication based on a contextual circumstance defined for the first and second computing devices, said indication to pair the first computing device with the second computing device generated automatically upon an occurrence of the contextual circumstance without a user initiating the indication to pair, the contextual circumstance comprising detecting concurrent instances of the same application running on the first and second computing devices, wherein said receiving further comprises receiving an indication of parameters to be associated with the pairing of the first computing device with the second computing device, the parameters including an access control list specifying at least one of;
types of computing devices allowed to pair with one of the first computing device or the second computing device, identifications of computing devices allowed to pair with one of the first computing device or the second computing device, or user identities allowed to pair with one of the first computing device or the second computing device;b) negotiating the pairing of the first computing device with the second computing device, the negotiating including receiving an identification of at least one of the user and the first computing device and receiving an authentication authenticating an association of the user with the first computing device; c) granting the first computing device access to secure resources available to the second computing device if the identification and authentication of said step b) verify an association between the user and the first computing device, wherein content accessible via the secure resources is displayed via a user interface that is divided between the first computing device and the second computing device; and d) denying the first computing device access to secure resources available to the second computing device if the identification and authentication of said step b) fail to verify an association between the user and the first computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of pairing a first computing device to a second computing device, comprising:
-
detecting different instances of the same software application running on the first and second computing devices, the software application not directed to pairing devices; receiving an indication to pair the first computing device with the second computing device based on the detection of different instances of the same software application running on the first and second computing devices; identifying parameters for pairing the first computing device with the second computing device, wherein the parameters include an access control list specifying at least one of;
types of computing devices allowed to pair with one of the first computing device or the second computing device, identifications of computing devices allowed to pair with one of the first computing device or the second computing device, or user identities allowed to pair with one of the first computing device or the second computing device;receiving a request from the first computing device to the second computing device for the first computing device to pair with the second computing device, the request from the first computing device including both identification and authentication information relating to the first computing device and a user of the first computing device; and granting the first computing device access to secure resources available to the second computing device if the identification and authentication information satisfies the parameters for pairing, wherein content accessible via the secure resources is displayed via a user interface that is divided between the first computing device and the second computing device. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method of pairing a first computing device to a second computing device, comprising:
-
receiving an indication to pair the first computing device with the second computing device, said indication generated automatically, without user action, based upon detecting concurrent instances of a same application running on the first and second computing devices; negotiating the pairing of the first computing device with the second computing device, the negotiating including receiving an identification of at least one of a user of the first computing device or the first computing device and determining that the identification is included on an access control list associated with a session of the application running on the first and second computing devices, wherein the access control list specifies at least one of;
identifications of computing devices allowed to pair with the second computing device or user identities allowed to pair with the second computing device; andgranting the first computing device access to secure resources available to the second computing device based on the determination that the identification is included on the access control list, wherein content accessible via the secure resources is displayed via a user interface that is divided between the first computing device and the second computing device.
-
-
14. A computing device comprising:
-
a processor; and memory storing instructions that, when executed by the processor, cause the computing device to perform operations comprising; receiving an indication to pair with another computing device, the indication generated based upon detecting concurrent instances of a same application running on the computing device and the other computing device; receiving an identification of at least one of the other computing device or a user of the other computing device; determining that the identification is included on an access control list associated with a session of the application running on the computing device and the other computing device, wherein the access control list specifies at least one of;
identifications of computing devices allowed to pair with the computing device or user identities allowed to pair with the computing device;granting the other computing device access to resources available to the computing device based on the determination that the identification is included on the access control list; and displaying a user interface of the application, the user interface being divided between the computing device and the other computing device. - View Dependent Claims (15, 16, 17, 18)
-
Specification