Associating distinct security modes with distinct wireless authenticators
First Claim
1. An authentication method comprising:
- securing resources on a first device according to a first security mode, wherein the resources on the first device are grouped into a plurality of subsets of resources, each of the plurality of the subsets of resources includes a plurality of resources having a common management scheme, and the first security mode is one of a plurality of distinct security modes;
while securing resources on the first device according to the first security mode, detecting, at the first device, information encoded in a wireless authenticator device based on a wireless interaction between the first device and the wireless authenticator device, wherein the information includes one or more accessibility attributes and the one or more accessibility attributes includes a resource attribute and an authentication attribute, the resource attribute indicating whether external access to a plurality of resources having a common management scheme is granted or declined, the authentication attribute indicating an additional authentication mechanism that is required before allowing external access to the plurality of resources, and the additional authentication mechanism being independent of using the wireless authenticator device;
based on the one or more accessibility attributes, selecting a second security mode associated with the wireless authenticator device, wherein the second security mode is different than the first security mode; and
applying the selected second security mode at the first device, wherein applying the selected second security mode comprising securing the plurality of resource having the common management scheme according to the resource attribute.
7 Assignments
0 Petitions
Accused Products
Abstract
In some aspects, a first device detects information encoded in a wireless authenticator device based on a wireless interaction between the first device and the wireless authenticator device. The first device detects the information while securing resources on the first device according to a first security mode. Based on the detected information, the first device selects a second security mode associated with the wireless authenticator device. The first device then applies the selected second security mode. The selected second security mode is one of multiple distinct security modes. Each of the multiple distinct security modes is associated with a respective one of multiple wireless authenticator devices and defines accessibility attributes of the resources on the first device.
-
Citations
20 Claims
-
1. An authentication method comprising:
-
securing resources on a first device according to a first security mode, wherein the resources on the first device are grouped into a plurality of subsets of resources, each of the plurality of the subsets of resources includes a plurality of resources having a common management scheme, and the first security mode is one of a plurality of distinct security modes; while securing resources on the first device according to the first security mode, detecting, at the first device, information encoded in a wireless authenticator device based on a wireless interaction between the first device and the wireless authenticator device, wherein the information includes one or more accessibility attributes and the one or more accessibility attributes includes a resource attribute and an authentication attribute, the resource attribute indicating whether external access to a plurality of resources having a common management scheme is granted or declined, the authentication attribute indicating an additional authentication mechanism that is required before allowing external access to the plurality of resources, and the additional authentication mechanism being independent of using the wireless authenticator device; based on the one or more accessibility attributes, selecting a second security mode associated with the wireless authenticator device, wherein the second security mode is different than the first security mode; and applying the selected second security mode at the first device, wherein applying the selected second security mode comprising securing the plurality of resource having the common management scheme according to the resource attribute. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device comprising:
-
a communication interface operable to detect information encoded in a wireless authenticator device based on a wireless interaction between the communication interface and the wireless authenticator device; and one or more data processing apparatus operable to; secure resources on the device according to a first security mode, wherein the resources on the device are grouped into a plurality of subsets of resources, each of the plurality of the subsets of resources includes a plurality of resources having a common management scheme, and the first security mode is one of a plurality of distinct security modes; receive the detected information from the communication interface while securing resources of the device according to the first security mode, wherein the detected information includes one or more accessibility attributes and the one or more accessibility attributes include a resource attribute and an authentication attribute, the resource attribute indicating whether external access to a plurality of resources having a common management scheme is granted or declined, the authentication attribute indicating an additional authentication mechanism that is required before allowing external access to the plurality of resources, and the additional authentication mechanism being independent of using the wireless authenticator device; based on the one or more accessibility attributes, select a second security mode associated with the wireless authenticator device, wherein the second security mode is different than the first security mode; and apply the selected second security mode, wherein applying the selected second security mode comprising securing the plurality of resources having the common management scheme according to the resource attribute. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. One or more non-transitory computer-readable media storing instructions that are operable when executed by one or more data processing apparatus to perform operations at a first device, the operations comprising:
-
securing resources on the first device according to a first security mode, wherein the resources on the first device are grouped into a plurality of subsets of resources, each of the plurality of the subsets of resources includes a plurality of resources having a common management scheme, and the first security mode is one of a plurality of distinct security modes; while securing resources on the first device according to the first security mode, detecting information encoded in a wireless authenticator device based on a wireless interaction between the first device and the wireless authenticator device, wherein the information includes one or more accessibility attributes and the one or more accessibility attributes include a resource attribute and an authentication attribute, the resource attribute indicating whether external access to a plurality of resources having a common management scheme is granted or declined, the authentication attribute indicating an additional authentication mechanism that is required before allowing external access to the plurality of resources, and the additional authentication mechanism being independent of using the wireless authenticator device; based on the one or more accessibility attributes, selecting a second security mode associated with the wireless authenticator device, wherein the second security mode is different than the first security mode; and applying the selected second security mode, wherein applying the selected second security mode comprising securing the plurality of resources having the common management scheme according to the resource attribute. - View Dependent Claims (18, 19, 20)
-
Specification