Social and proximity based access control for mobile applications
First Claim
1. A non-transitory computer readable storage medium comprising a computer readable program for proximity-based access control, wherein the computer readable program when executed on a computer causes the computer to perform the steps of:
- determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance, wherein safe mobile devices include devices sharing a threshold secret key with the first mobile device;
determining, with a processor, whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold and whether enough threshold secret keys are available to meet a decryption threshold;
activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device, wherein the safe gathering policy includes setting a security level for all nearby users based on a security level of a lowest clearance level user or a sensitivity of data on the first mobile device;
continuously verifying that the number of safe mobile devices exceeds the safe gathering threshold; and
deactivating the safe gathering policy if the number of safe mobile devices does not exceed the safe gathering threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems for proximity-based access control include a proximity module configured to determine whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; a policy engine comprising a processor configured to determine whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold; and a security module configured to activate a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.
-
Citations
13 Claims
-
1. A non-transitory computer readable storage medium comprising a computer readable program for proximity-based access control, wherein the computer readable program when executed on a computer causes the computer to perform the steps of:
-
determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance, wherein safe mobile devices include devices sharing a threshold secret key with the first mobile device; determining, with a processor, whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold and whether enough threshold secret keys are available to meet a decryption threshold; activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device, wherein the safe gathering policy includes setting a security level for all nearby users based on a security level of a lowest clearance level user or a sensitivity of data on the first mobile device; continuously verifying that the number of safe mobile devices exceeds the safe gathering threshold; and deactivating the safe gathering policy if the number of safe mobile devices does not exceed the safe gathering threshold. - View Dependent Claims (11)
-
-
2. A system for proximity-based access control, comprising:
-
a proximity module comprising a processor and a memory, configured to determine whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; a policy engine comprising a processor configured to determine whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold, wherein safe mobile devices include devices sharing a threshold secret key with the first mobile device and the policy engine is further configured to; determine whether enough threshold secret keys are available to meet a decryption threshold, and continuously verify that the number of safe mobile devices exceeds the safe gathering threshold and, if not, deactivating the safe gathering policy; and a security module configured to activate a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device, wherein the safe gathering policy includes setting a security level for all nearby users based on a security level of a lowest clearance level user or a sensitivity of data on the first mobile device. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10)
-
-
12. A non-transitory computer readable storage medium comprising a computer readable program for proximity-based access control, wherein the computer readable program when executed on a computer causes the computer to perform the steps of:
-
determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance, wherein safe mobile devices include devices sharing a threshold secret key with the first mobile device; determining, with a processor, whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold and whether enough threshold secret keys are available to meet a decryption threshold; activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device, wherein the safe gathering policy includes setting a security level for all nearby users to a security level of a lowest clearance level user; continuously verifying that the number of safe mobile devices exceeds the safe gathering threshold; and deactivating the safe gathering policy if the number of safe mobile devices does not exceed the safe gathering threshold. - View Dependent Claims (13)
-
Specification