Systems and methods for enforcing geolocation-based policies
First Claim
1. A computer-implemented method for enforcing geolocation-based policies, the method comprising:
- identifying a request from a computing system to access a computing resource;
identifying a public key certificate, comprising a certificate of a public key, that is associated with the computing resource, the public key certificate including location data that indicates permissible locations from which the computing resource may be accessed;
determining a current location of the computing system;
determining that the location data within the public key certificate indicates that the computing resource may be accessed from the current location of the computing system;
allowing access to the computing resource based on the determination that the computing resource may be accessed from the current location of the computing system;
wherein at least a portion of the method is performed by a computing device comprising at least one processor.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for enforcing geolocation-based policies may include (1) identifying a request from a computing system to access a computing resource, (2) identifying a public key certificate associated with the computing resource, the public key certificate including location data that indicates where the computing resource may be accessed from, (3) determining a current location of the computing system, (4) determining that the location data within the public key certificate indicates that the computing resource may be accessed from the current location of the computing system, and (5) allowing access to the computing resource based on the determination that the computing resource may be accessed from the current location of the computing system. Various other methods, systems, and computer-readable media are also disclosed.
38 Citations
20 Claims
-
1. A computer-implemented method for enforcing geolocation-based policies, the method comprising:
-
identifying a request from a computing system to access a computing resource; identifying a public key certificate, comprising a certificate of a public key, that is associated with the computing resource, the public key certificate including location data that indicates permissible locations from which the computing resource may be accessed; determining a current location of the computing system; determining that the location data within the public key certificate indicates that the computing resource may be accessed from the current location of the computing system; allowing access to the computing resource based on the determination that the computing resource may be accessed from the current location of the computing system; wherein at least a portion of the method is performed by a computing device comprising at least one processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for enforcing geolocation-based policies, the system comprising:
-
an identification module programmed to; identify a request from a computing system to access a computing resource; identify a public key certificate, comprising a certificate of a public key, that is associated with the computing resource, the public key certificate including location data that indicates permissible locations from which the computing resource may be accessed; a location module programmed to determine a current location of the computing system; a determination module programmed to determine that the location data within the public key certificate indicates that the computing resource may be accessed from the current location of the computing system; an allowance module programmed to allow access to the computing resource based on the determination that the computing resource may be accessed from the current location of the computing system; at least one hardware processor configured to execute the identification module, the location module, the determination module, and the allowance module. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify a request from a computing system to access a computing resource; identify a public key certificate, comprising a certificate of a public key, that is associated with the computing resource, the public key certificate including location data that indicates permissible locations from which the computing resources may be accessed; determine a current location of the computing system; determine that the location data within the public key certificate indicates that the computing resource may be accessed from the current location of the computing system; allow access to the computing resource based on the determination that the computing resource may be accessed from the current location of the computing system.
-
Specification