Environment-Aware Security Tokens
First Claim
1. A computer implemented method comprising:
- receiving, at a processing device, information about one or more assets associated with a network of devices;
generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset, wherein the security token is configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset;
storing, in a storage device, information about the security token and information linking the security token to the corresponding asset; and
initiating integration of the security token with the corresponding asset.
0 Assignments
0 Petitions
Accused Products
Abstract
The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
-
Citations
60 Claims
-
1. A computer implemented method comprising:
-
receiving, at a processing device, information about one or more assets associated with a network of devices; generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset, wherein the security token is configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset; storing, in a storage device, information about the security token and information linking the security token to the corresponding asset; and initiating integration of the security token with the corresponding asset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system comprising:
-
memory; and one or more processors configured to; receive information about one or more assets associated with a network of devices, generate, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset, wherein the security token is configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset, store, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiate integration of the security token with the corresponding asset. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. One or more machine-readable storage devices storing instructions that are executable by one or more processing devices to perform operations comprising:
-
receiving information about one or more assets associated with a network of devices; generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset, wherein the security token is configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset; storing, in a storage device, information about the security token and information linking the security token to the corresponding asset; and initiating integration of the security token with the corresponding asset. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
Specification