×

Clustered device access control based on physical and temporal proximity to the user

  • US 8,561,142 B1
  • Filed: 06/01/2012
  • Issued: 10/15/2013
  • Est. Priority Date: 06/01/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for dynamically determining which of a plurality of computing devices associated with a user are trusted and which are non-trusted, based on physical and temporal proximity between the computing devices and the user, the method comprising the steps of:

  • identifying a plurality of computing devices associated with a user, each computing device of the plurality of computing devices being used to access backend computing resources of an enterprise;

    tracking geo-locations of the computing devices of the plurality of computing devices, and times of establishment of the tracked geo-locations;

    receiving a trusted authentication from a specific one of the plurality of computing devices, wherein the trusted authentication comprises more than a conventional control for a user to access the computing device and more than a conventional authentication for a computing device to access backend computing resources;

    responsive to receiving the trusted authentication from the specific computing device, classifying the specific computing device as a primary node of a trusted cluster, and defining a current geo-location of the user as the geo-location of the specific device, as of a time of the trusted authentication; and

    determining trusted and non-trusted computing devices of the plurality of computing devices, based on physical distances between geo-locations of the computing devices and the defined current geo-location of the user, and based on differences in time between times of establishment of the geo-locations of the computing devices and a time of establishment of the geo-location of the user;

    wherein the trusted computing devices are allowed to access the backend resources subject to conventional access controls and the non-trusted devices are not allowed to access the backend resources.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×