Restricting network and device access based on presence detection
First Claim
Patent Images
1. An apparatus, comprising:
- an interface for communicating with an associated network; and
a controller coupled with the interface;
wherein the controller obtains data representative of a location of the apparatus;
wherein the controller obtains data representative of a location of a user associated device, wherein the location of the user associated device comprises one of a geographical location and a network location;
wherein the controller determines a first proximity of the apparatus with the user associated device;
wherein the controller obtains data representative of a predefined trigger event, the predefined trigger event comprising the first proximity of the apparatus with the user associated device exceeding a predetermined threshold;
wherein the controller selects a network policy in accordance with the location of the apparatus;
wherein the controller, in response to the predefined trigger event, applies the selected network policy to restrict communication with the associated network via the interface;
wherein the controller obtains data representative of a plurality of release triggers, the plurality of release triggers comprising a first release trigger responsive to the user associated device returning to within a predefined proximity of the apparatus, and a second release trigger comprising the controller receiving a predefined response to a secondary challenge issued by the controller; and
wherein the controller applies a network restoration policy responsive to obtaining the data representative of the plurality of release triggers and wherein network restoration policy restores access to the associated network via the interface.
1 Assignment
0 Petitions
Accused Products
Abstract
In an example embodiment, a technique that applies a network policy responsive to specified events, or triggers, to a networked device. If a specified event occurs, the network policy may restrict the device'"'"'s access to the network. For example, if a user walks away from their networked device, such as a laptop, the device'"'"'s network access changes. For example, depending upon the policy, network traffic may be blocked or otherwise restricted.
23 Citations
18 Claims
-
1. An apparatus, comprising:
-
an interface for communicating with an associated network; and a controller coupled with the interface; wherein the controller obtains data representative of a location of the apparatus; wherein the controller obtains data representative of a location of a user associated device, wherein the location of the user associated device comprises one of a geographical location and a network location; wherein the controller determines a first proximity of the apparatus with the user associated device; wherein the controller obtains data representative of a predefined trigger event, the predefined trigger event comprising the first proximity of the apparatus with the user associated device exceeding a predetermined threshold; wherein the controller selects a network policy in accordance with the location of the apparatus; wherein the controller, in response to the predefined trigger event, applies the selected network policy to restrict communication with the associated network via the interface; wherein the controller obtains data representative of a plurality of release triggers, the plurality of release triggers comprising a first release trigger responsive to the user associated device returning to within a predefined proximity of the apparatus, and a second release trigger comprising the controller receiving a predefined response to a secondary challenge issued by the controller; and wherein the controller applies a network restoration policy responsive to obtaining the data representative of the plurality of release triggers and wherein network restoration policy restores access to the associated network via the interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
determining a location of a networked device associated with a user; determining a location of a user associated device associated with the user, wherein the location comprises one of a geographical location or a network location; determining the proximity of the networked device with the user associated device; selecting a network policy in accordance with the location of the networked device; restricting access to an associated network in accordance with the selected network policy responsive to the proximity of the networked device with the user associated device exceeding a predetermined threshold; determining an updated location of the user associated device; determining the proximity of the networked device with the user associated device based on the updated location; and restoring access to the network responsive to;
i) determining the proximity of the networked device with a user associated device does not exceed a predetermined threshold, and ii) receiving a predefined response to a secondary challenge. - View Dependent Claims (16, 17)
-
-
18. Logic encoded in a non-transitory computer readable media for execution by a processor, and when executed by the processor, operable to perform an operation, the operation comprising:
-
determining a location of a networked device associated with a user; determining a location of a user associated device associated with the user, wherein the location comprises one of a geographical location or a network location; determining the proximity of the networked device with the user associated device; selecting a network policy in accordance with the location of the networked device; restricting access to an associated network in accordance with the selected network policy responsive to the proximity of the networked device with the user associated device exceeding a predetermined threshold; determining an updated location of the user associated device; determining the proximity of the networked device with the user associated device based on the updated location; and restoring access to the network responsive to;
i) determining the proximity of the networked device with a user associated device does not exceed a predetermined threshold, and ii) receiving a predefined response to a secondary challenge.
-
Specification