Environment-aware security tokens
First Claim
1. A computer implemented method comprising:
- receiving, at a processing device, information about multiple assets associated with a network of devices, the multiple assets including at least two electronic files;
generating, for a first electronic file of the multiple assets, a first security token that is based at least on a portion of the received information about the first electronic file, wherein the first security token is configured to identify a first home network defined for the first electronic file, the first home network being specific to the first electronic file and being defined by a first selection of other assets;
generating, for a second electronic file of the multiple assets, a second security token that is based at least on a portion of the received information about the second electronic file, wherein the second security token is configured to identify a second home network defined for the second electronic file, the second home network being specific to the second electronic file and being defined by a second selection of other assets;
storing, in a storage device, information about the first and second security tokens and information linking the first and second security tokens to the corresponding electronic files;
initiating integration of the first and second security tokens with the corresponding electronic files; and
restricting access to the first or second electronic file upon detecting an occurrence of an unauthorized activity involving the corresponding electronic file, wherein detecting the occurrence of the unauthorized activity comprises determining a dissociation of the first or second electronic file from the corresponding home network defined for the corresponding electronic file, and access to the corresponding electronic file is restricted by deletion of content of the corresponding electronic file upon determining the dissociation from the corresponding home network.
1 Assignment
0 Petitions
Accused Products
Abstract
The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
-
Citations
53 Claims
-
1. A computer implemented method comprising:
-
receiving, at a processing device, information about multiple assets associated with a network of devices, the multiple assets including at least two electronic files; generating, for a first electronic file of the multiple assets, a first security token that is based at least on a portion of the received information about the first electronic file, wherein the first security token is configured to identify a first home network defined for the first electronic file, the first home network being specific to the first electronic file and being defined by a first selection of other assets; generating, for a second electronic file of the multiple assets, a second security token that is based at least on a portion of the received information about the second electronic file, wherein the second security token is configured to identify a second home network defined for the second electronic file, the second home network being specific to the second electronic file and being defined by a second selection of other assets; storing, in a storage device, information about the first and second security tokens and information linking the first and second security tokens to the corresponding electronic files; initiating integration of the first and second security tokens with the corresponding electronic files; and restricting access to the first or second electronic file upon detecting an occurrence of an unauthorized activity involving the corresponding electronic file, wherein detecting the occurrence of the unauthorized activity comprises determining a dissociation of the first or second electronic file from the corresponding home network defined for the corresponding electronic file, and access to the corresponding electronic file is restricted by deletion of content of the corresponding electronic file upon determining the dissociation from the corresponding home network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
memory; and one or more processors configured to; receive information about multiple assets associated with a network of devices, the multiple assets including at least two electronic files, generate, for a first electronic file of the multiple assets, a first security token that is based at least on a portion of the received information about the first electronic file, wherein the first security token is configured to identify a first home network defined for the first electronic file, the first home network being specific to the first electronic file and being defined by a first selection of other assets, generate, for a second electronic file of the multiple assets, a second security token that is based at least on a portion of the received information about the second electronic file, wherein the second security token is configured to identify a second home network defined for the second electronic file, the second home network being specific to the second electronic file and being defined by a second selection of other assets, store, in a storage device, information about the first and second security tokens and information linking the first and second security tokens to the corresponding electronic files, initiate integration of the first and second security tokens with the corresponding electronic files, and restrict access to the first or second electronic file upon detecting an occurrence of an unauthorized activity involving the corresponding electronic file, wherein detecting the occurrence of the unauthorized activity comprises determining a dissociation of the first or second electronic file from the corresponding home network defined for the corresponding electronic file, and access to the corresponding electronic file is restricted by deletion of content of the corresponding electronic file upon determining the dissociation from the corresponding home network. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. One or more machine-readable storage devices storing instructions that are executable by one or more processing devices to perform operations comprising:
-
receiving information about multiple assets associated with a network of devices, the multiple assets including at least two electronic files; generating, a first electronic file of the multiple assets, a first security token that is based at least on a portion of the received information about the first electronic file, wherein the first security token is configured to identify a first home network defined for the first electronic file, the first home network being specific to the first electronic file and being defined by a first selection of other assets; generating, for a second electronic file of the multiple assets, a second security token that is based at least on a portion of the received information about the second electronic file, wherein the second security token is configured to identify a second home network defined for the second electronic file, the second home network being specific to the second electronic file and being defined by a second selection of other assets; storing, in a storage device, information about the first and second security tokens and information linking the first and second security tokens to the corresponding electronic files; initiating integration of the first and second security tokens with the corresponding electronic files; and restricting access to the first or second electronic file upon detecting an occurrence of an unauthorized activity involving the corresponding electronic file, wherein detecting the occurrence of the unauthorized activity comprises determining a dissociation of the first or second electronic file from the corresponding home network defined for the asset, and access to the corresponding electronic file is restricted by deletion of content of the corresponding electronic file upon determining the dissociation from the corresponding home network. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
Specification