Detecting unauthorized devices
First Claim
Patent Images
1. A method comprising:
- receiving, by a first computing device and from a second computing device, a provisioning request;
receiving, by the first computing device and from a third computing device, a report comprising an indication that the third computing device detected the second computing device;
determining whether the report comprises an indication that the second computing device refused to provide a credential to the third computing device;
determining a location of the third computing device;
using the determination of the location of the third computing device to determine a location of the second computing device; and
determining whether to provision the second computing device based on the location of the second computing device and the determination of whether the report comprises the indication that the second computing device refused to provide the credential to the third computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed that, in some aspects, provide for receiving a provisioning request from a requesting device, and identifying one or more other devices proximate to or co-located with the requesting device. The methods and systems may include determining a location and other information of the one or more other devices and using the information to determine a location of and other information related to the requesting device. It may be determined whether to grant the provisioning request based on the determined location of the requesting device.
-
Citations
17 Claims
-
1. A method comprising:
-
receiving, by a first computing device and from a second computing device, a provisioning request; receiving, by the first computing device and from a third computing device, a report comprising an indication that the third computing device detected the second computing device; determining whether the report comprises an indication that the second computing device refused to provide a credential to the third computing device; determining a location of the third computing device; using the determination of the location of the third computing device to determine a location of the second computing device; and determining whether to provision the second computing device based on the location of the second computing device and the determination of whether the report comprises the indication that the second computing device refused to provide the credential to the third computing device. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
receiving, by a computing device and from a network access computing device, a provisioning request; receiving, by the computing device and from a local device, a report comprising an indication that the local device detected the network access computing device; determining whether the report comprises an indication that the network access computing device refused to provide a credential to the local device; determining whether the network access computing device and the local device are associated with a same account; determining whether to provision the network access computing device based on whether the network access computing device and the local device are associated with the same account and whether the report comprises the indication that the network access computing device refused to provide the credential to the local device; and in response to determining to provision the network access computing device, sending a response to the provisioning request to the network access computing device and providing a service to the local device using the network access computing device. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
a processor; and a memory storing computer-executable instructions that, when executed by the processor, cause the apparatus to; receive, from a first network device, a provisioning request to provide network access to a second network device; receive, from the second network device, a report comprising information indicating devices with which the second network device has exchanged credentials; determine whether the report comprises an indication that the first network device refused to provide a credential to the second network device; if the report comprises the indication that the first network device refused to provide the credential to the second network device, reject the provisioning request; if the first network device has exchanged credentials with the second network device based on the report, determine whether to grant the provisioning request; and in response to determining to grant the provisioning request, provide a service to the second network device using the first network device. - View Dependent Claims (14, 15, 16, 17)
-
Specification