×

System and method for controlling user's access to protected resources using multi-level authentication

  • US 8,769,657 B2
  • Filed: 09/15/2012
  • Issued: 07/01/2014
  • Est. Priority Date: 09/28/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for controlling user'"'"'s access to a protected resource, the method comprising:

  • detecting, by a hardware processor, a plug-in token connected to a device that controls user access to the protected resource, wherein the token is associated with one or more authorized users including at least one supervising user;

    identifying one or more authorized users associated with the detected token who are authorized to access the protected resource, including identifying at least one supervising user;

    authenticating whether a first user requesting access to the protected resource is associated with the detected token and authorized to access the protected resource;

    detecting, by the hardware processor, one or more wireless transponders of one or more authorized users associated with the token, including at least a transponder of the first user and a transponder of the supervising user of said first user;

    applying a plurality of rules that specify a set of conditions under which the first user is allowed to access different types of protected resources when all the conditions are satisfied, and the first user is prohibited to access of the protected resources when at least one condition is not satisfied;

    identifying rules in response to receiving a request from the first user to access to the protected resource; and

    providing the first user to access to the protected resource, or blocking the first user to access to the protected resource based on the rules;

    wherein the conditions for the rule in accessing the protected recourse are based on accessing the protected resources during a predetermined period of the day, accessing the protected resources from a certain location, successfully authenticating the first user, and successfully detecting the transponder of the first user and of the transponder of the supervising user; and

    wherein different types of protected resources include one or more of protected applications, protected data and protected devices.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×