Apparatus, system, and method for protecting electronic devices in a virtual perimeter
First Claim
1. At least one machine-readable storage medium having computer executable instructions stored thereon that, when executed, cause an electronic device to perform a method, the method comprising:
- identifying a current context;
communicating among multiple electronic devices to identify a top element of a hierarchy of the multiple electronic devices for the current context using a leadership algorithm;
receiving a role as the top element for the current context in the hierarchy;
operating in accordance with the role in the hierarchy within a secure perimeter in the current context around the multiple electronic devices;
periodically checking conformity with one or more context rules for each of electronic device among the multiple electronic devices; and
triggering an event when a context rule, from among the one or more context rules, is activated.
2 Assignments
0 Petitions
Accused Products
Abstract
Described herein are apparatus, system, and method for protecting electronic devices through the creation of a virtual perimeter among the electronic devices. The virtual perimeter may be generated by the electronic devices themselves. The method performed by an electronic device comprises: identifying a current context; receiving a role, according to the current context, in a hierarchy of multiple electronic devices, and operating in accordance with the role in the hierarchy within a secure perimeter in the current context around the multiple electronic devices, wherein the hierarchy includes a system of security checks based on context information.
7 Citations
21 Claims
-
1. At least one machine-readable storage medium having computer executable instructions stored thereon that, when executed, cause an electronic device to perform a method, the method comprising:
-
identifying a current context; communicating among multiple electronic devices to identify a top element of a hierarchy of the multiple electronic devices for the current context using a leadership algorithm; receiving a role as the top element for the current context in the hierarchy; operating in accordance with the role in the hierarchy within a secure perimeter in the current context around the multiple electronic devices; periodically checking conformity with one or more context rules for each of electronic device among the multiple electronic devices; and triggering an event when a context rule, from among the one or more context rules, is activated. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An electronic device comprising:
-
a logic unit to identify a current context; and a security agent to communicate among multiple electronic devices to identify a top element of a hierarchy of the multiple electronic devices for the current context using a leadership algorithm, to perform a role of the top element in the hierarchy in the current context identified by the logic, periodically check conformity with one or more context rules for each of electronic device among the multiple electronic devices and trigger an event when a context rule, from among the one or more context rules, is activate. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A server comprising:
-
a security manager module to; register multiple electronic devices; define one or more contexts for the registered multiple electronic devices for providing a secure perimeter in the one or more contexts around the multiple electronic devices; and define a hierarchy for the multiple electronic devices according to the one or more contexts, wherein the security manager module is communicatively coupled to a security agent of an electronic device from among the multiple electronic devices in the hierarchy; and identify a top element of a hierarchy of the multiple electronic devices for the current context using a leadership algorithm. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
Specification