Environment-aware security tokens
First Claim
1. A computer implemented method comprising:
- receiving, at a server comprising one or more processing devices, information about multiple assets associated with a network of devices;
generating, by the server, for an asset of the multiple assets, a security token that is based at least on a portion of the received information about the asset, wherein the security token is configured to identify a home network defined for the asset;
storing, in a storage device, information about the security token and information linking the security token to the asset;
initiating, by the server, integration of the security token with the asset by providing the security token to the corresponding asset; and
restricting access by the server to the asset upon detecting an occurrence of an unauthorized activity involving the corresponding asset, wherein the server is communicably coupled to the home network, and is configured to detect the occurrence of the unauthorized activity based on information from the security token,wherein the asset is an electronic file, and the security token is configured to restrict access to the electronic file by deleting content of the electronic file upon determining a dissociation from the home network.
1 Assignment
0 Petitions
Accused Products
Abstract
The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
88 Citations
19 Claims
-
1. A computer implemented method comprising:
-
receiving, at a server comprising one or more processing devices, information about multiple assets associated with a network of devices; generating, by the server, for an asset of the multiple assets, a security token that is based at least on a portion of the received information about the asset, wherein the security token is configured to identify a home network defined for the asset; storing, in a storage device, information about the security token and information linking the security token to the asset; initiating, by the server, integration of the security token with the asset by providing the security token to the corresponding asset; and restricting access by the server to the asset upon detecting an occurrence of an unauthorized activity involving the corresponding asset, wherein the server is communicably coupled to the home network, and is configured to detect the occurrence of the unauthorized activity based on information from the security token, wherein the asset is an electronic file, and the security token is configured to restrict access to the electronic file by deleting content of the electronic file upon determining a dissociation from the home network.
-
-
2. A computer implemented method comprising:
-
receiving, at a server comprising one or more processing devices, information about multiple assets associated with a network of devices; generating, by the server, for an asset of the multiple assets, a security token that is based at least on a portion of the received information about the asset, wherein the security token is configured to identify a home network defined for the asset; storing, in a storage device, information about the security token and information linking the security token to the asset; initiating, by the server, integration of the security token with the asset by providing the security token to the corresponding asset; and restricting access by the server to the asset upon detecting an occurrence of an unauthorized activity involving the corresponding asset, wherein the server is communicably coupled to the home network, and is configured to detect the occurrence of the unauthorized activity based on information from the security token, wherein restricting access to the asset comprises; receiving, from the asset, information related to an access point attempting to access the asset; determining, based on the stored information about the security token, whether the access point is outside the home network; and providing permission information indicating a level of access permitted for the access point based on the determination. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
memory; and a server comprising one or more processing devices, the server configured to; receive information about multiple assets associated with a network of devices, generate, an asset of the multiple assets, a security token that is based at least on a portion of the received information about the asset, wherein the security token is configured to identify a home network defined for the asset, store, in a storage device communicably coupled to the server, information about the security token and information linking the security token to the asset, initiate integration of the security token with the asset, and restrict access to the asset upon detecting an occurrence of an unauthorized activity involving the asset, wherein the server is communicably coupled to the home network, and is configured to detect the occurrence of the unauthorized activity based on information from the security token, wherein to restrict access to the asset, the one or more processing devices are configured to; receive, from the asset, information related to an access point attempting to access the asset; determine, based on the stored information about the security token, whether the access point is outside the home network; and provide permission information indicating a level of access permitted for the access point based on the determination. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. One or more machine-readable storage devices storing instructions that are executable by one or more processing devices to perform operations comprising:
-
receiving information about multiple assets associated with a network of devices; generating, an asset of the multiple assets, a security token that is based at least on a portion of the received information about the asset, wherein the security token is configured to identify a home network defined for the asset; storing, in a storage device communicably coupled to the one or more processing devices, information about the first and second security tokens and information linking the first and second security tokens to the corresponding assets; initiating integration of the first and second security tokens with the corresponding assets; and restricting access to the first or second asset upon detecting an occurrence of an unauthorized activity involving the corresponding asset, wherein the one or more processing devices are communicably coupled to the home network, and is configured to detect the occurrence of the unauthorized activity based on information from the security token, wherein restricting access to the asset comprises; receiving, from the asset, information related to an access point attempting to access the asset, determining, based on the stored information about the security token, whether the access point is outside the home network, and providing permission information indicating a level of access permitted for the access point based on the determination.
-
Specification