SECONDARY DEVICE AS KEY FOR AUTHORIZING ACCESS TO RESOURCES
First Claim
Patent Images
1. A method comprising:
- receiving an authorization indication at a device;
creating a registration key based on the authorization indication, a user identifier, and a property of the device;
determining whether access to at least one resource is permitted according to the registration key; and
in response to determining that access to the at least one resource is permitted according to the registration key, permitting the device to access the at least one resource.
4 Assignments
0 Petitions
Accused Products
Abstract
A secondary device may be used to provide access to resources to a primary device. Upon receiving an authorization indication at a device, a registration key based on the authorization indication, a user identifier, and a property of the device may be created. Upon determining whether access to at least one resource is permitted according to the registration key the device may be permitted to access the at least one resource.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving an authorization indication at a device; creating a registration key based on the authorization indication, a user identifier, and a property of the device; determining whether access to at least one resource is permitted according to the registration key; and in response to determining that access to the at least one resource is permitted according to the registration key, permitting the device to access the at least one resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
a memory storage; and a processor coupled to the memory storage operative to execute instructions for; providing an authorization indication to a user device, receiving a registration key from the user device, creating a profile for the user device according to the registration key, associating a plurality of compliance rules with the profile for the user device, receiving a request to access a resource from the user device, determining whether the user device is in compliance with the plurality of compliance rules, and in response to determining that the user device is in compliance with the plurality of compliance rules, providing access to the resource to the user device. - View Dependent Claims (12, 13, 14)
-
-
15. A client device comprising:
-
a network connectivity interface for enabling communication between the client device and an authorization service via a network; a memory for storing a client side application; and a processor communicatively coupled to the memory for executing said client side application, wherein said client side application comprises executable instructions for; receiving an authorization indication associated with a geographic location from a second device located within the geographic region, creating a registration key based on the authorization indication, a user identifier, and a property of the client device, providing the registration key to the second device, determining whether the second device approved the registration key, and in response to determining that the second device approved the registration key, requesting access to at least one resource. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification