Systems and methods for providing security in smart buildings
First Claim
1. A computer-implemented method for providing security in smart buildings, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- detecting the physical presence of a user in a smart building, wherein the user is authorized to enter the smart building;
determining that the user is unauthorized to access at least one resource of an Internet of Things device in a smart building network within the smart building;
in response to determining that the user is unauthorized to access the at least one resource of the Internet of Things device in the smart building network, selecting a stricter authentication policy that provides heightened security within the smart building network compared to a previous authentication policy with lower security; and
increasing security within the smart building network to reflect the physical presence of the user by implementing the stricter authentication policy within the smart building network, wherein implementing the stricter authentication policy comprises directly pushing the stricter authentication policy to all Internet of Things devices in the entire smart building network such that each Internet of Things device selects a method to control access to the Internet of Things device based on the stricter authentication policy and a type of the Internet of Things device.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for providing security in smart buildings may include (1) detecting the presence of a user in a smart building, (2) determining that the user is unauthorized to access at least one resource in a smart building network within the smart building, (3) in response to determining that the user is unauthorized to access the resource in the smart building network, selecting an authentication policy that provides heightened security within the smart building network, and (4) increasing security within the smart building network to reflect the presence of the user by implementing the authentication policy within the smart building network. Various other methods, systems, and computer-readable media are also disclosed.
12 Citations
20 Claims
-
1. A computer-implemented method for providing security in smart buildings, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
detecting the physical presence of a user in a smart building, wherein the user is authorized to enter the smart building; determining that the user is unauthorized to access at least one resource of an Internet of Things device in a smart building network within the smart building; in response to determining that the user is unauthorized to access the at least one resource of the Internet of Things device in the smart building network, selecting a stricter authentication policy that provides heightened security within the smart building network compared to a previous authentication policy with lower security; and increasing security within the smart building network to reflect the physical presence of the user by implementing the stricter authentication policy within the smart building network, wherein implementing the stricter authentication policy comprises directly pushing the stricter authentication policy to all Internet of Things devices in the entire smart building network such that each Internet of Things device selects a method to control access to the Internet of Things device based on the stricter authentication policy and a type of the Internet of Things device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for providing security in smart buildings, the system comprising:
-
a detection module, stored in memory, that detects the physical presence of a user in a smart building, wherein the user is authorized to enter the smart building; a determination module, stored in memory, that determines that the user is unauthorized to access at least one resource of an Internet of Things device in a smart building network within the smart building; a selection module, stored in memory, that, in response to determining that the user is unauthorized to access the at least one resource of the Internet of Things device in the smart building network, selects a stricter authentication policy that provides heightened security within the smart building network compared to a previous authentication policy with lower security; a security module, stored in memory, that increases security within the smart building network to reflect the physical presence of the user by implementing the stricter authentication policy within the smart building network, wherein implementing the stricter authentication policy comprises directly pushing the stricter authentication policy to all Internet of Things devices in the entire smart building network such that each Internet of Things device selects a method to control access to the Internet of Things device based on the stricter authentication policy and a type of the Internet of Things device; and at least one processor that executes the detection module, the determination module, the selection module, and the security module. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
detect the physical presence of a user in a smart building, wherein the user is authorized to enter the smart building; determine that the user is unauthorized to access at least one resource of an Internet of Things device in a smart building network within the smart building; in response to determining that the user is unauthorized to access the at least one resource of the Internet of Things device in the smart building network, select a stricter authentication policy that provides heightened security within the smart building network compared to a previous authentication policy with lower security; and increase security within the smart building network to reflect the physical presence of the user by implementing the stricter authentication policy within the smart building network, wherein implementing the stricter authentication policy comprises directly pushing the stricter authentication policy to all Internet of Things devices in the entire smart building network such that each Internet of Things device selects a method to control access to the Internet of Things device based on the stricter authentication policy and a type of the Internet of Things device.
-
Specification