Federating Devices to Improve User Experience with Adaptive Security
First Claim
1. A computer-implemented method for performing an adaptive security operation comprising:
- performing an authentication operation via a first device, the authentication operation analyzing an obligation performed by a first user;
establishing access to a protected resource by the first device based upon the obligation performed by the first user;
generating an attribute list comprising at least one attribute of the first device;
analyzing a second device to determine whether the second device comprises an attribute corresponding to the at least one attribute of the first device; and
,allowing access to the protected resource by the second device when the second device comprises the attribute corresponding to the at least one attribute of the first device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer-usable medium for performing an adaptive security operation comprising: performing an authentication operation via a first device, the authentication operation analyzing an obligation performed by a first user; establishing access to a protected resource by the first device based upon the obligation performed by the first user; generating an attribute list comprising at least one attribute of the first device; analyzing a second device to determine whether the second device comprises an attribute corresponding to the at least one attribute of the first device; and, allowing access to the protected resource by the second device when the second device comprises the attribute corresponding to the at least one attribute of the first device.
31 Citations
20 Claims
-
1. A computer-implemented method for performing an adaptive security operation comprising:
-
performing an authentication operation via a first device, the authentication operation analyzing an obligation performed by a first user; establishing access to a protected resource by the first device based upon the obligation performed by the first user; generating an attribute list comprising at least one attribute of the first device; analyzing a second device to determine whether the second device comprises an attribute corresponding to the at least one attribute of the first device; and
,allowing access to the protected resource by the second device when the second device comprises the attribute corresponding to the at least one attribute of the first device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor; a data bus coupled to the processor; and a computer-usable medium embodying computer program code, the computer-usable medium being coupled to the data bus, the computer program code used for performing an adaptive security operation and comprising instructions executable by the processor and configured for; performing an authentication operation via a first device, the authentication operation analyzing an obligation performed by a first user; establishing access to a protected resource by the first device based upon the obligation performed by the first user; generating an attribute list comprising at least one attribute of the first device; analyzing a second device to determine whether the second device comprises an attribute corresponding to the at least one attribute of the first device; and
,allowing access to the protected resource by the second device when the second device comprises the attribute corresponding to the at least one attribute of the first device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions configured for:
-
performing an authentication operation via a first device, the authentication operation analyzing an obligation performed by a first user; establishing access to a protected resource by the first device based upon the obligation performed by the first user; generating an attribute list comprising at least one attribute of the first device; analyzing a second device to determine whether the second device comprises an attribute corresponding to the at least one attribute of the first device; and
,allowing access to the protected resource by the second device when the second device comprises the attribute corresponding to the at least one attribute of the first device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification