Environment-aware security tokens
First Claim
1. A computer implemented method comprising:
- storing a copy of an electronic file at a first storage location that is authenticated to be a part of a home network associated with the electronic file, wherein the electronic file includes a security token, and the security token is configured to;
authenticate an attempt to access the electronic file,restrict access to the electronic file upon determining the attempt to be originating from outside the home network, andallow access to the electronic file in accordance with a security policy upon determining the attempt to be originating from within the home network;
obtaining, at one or more computing devices communicably coupled to the home network, information about changes to the electronic file as a result of the attempt;
updating, by the one or more computing devices, another copy of the electronic file stored at a second storage location; and
storing, by the one or more computing devices on a storage device of a file system, data representing the attempt to access the electronic file.
1 Assignment
0 Petitions
Accused Products
Abstract
The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
62 Citations
30 Claims
-
1. A computer implemented method comprising:
-
storing a copy of an electronic file at a first storage location that is authenticated to be a part of a home network associated with the electronic file, wherein the electronic file includes a security token, and the security token is configured to; authenticate an attempt to access the electronic file, restrict access to the electronic file upon determining the attempt to be originating from outside the home network, and allow access to the electronic file in accordance with a security policy upon determining the attempt to be originating from within the home network; obtaining, at one or more computing devices communicably coupled to the home network, information about changes to the electronic file as a result of the attempt; updating, by the one or more computing devices, another copy of the electronic file stored at a second storage location; and storing, by the one or more computing devices on a storage device of a file system, data representing the attempt to access the electronic file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
memory; and one or more processors configured to; store a copy of an electronic file at a first storage location authenticated to be a part of a home network associated with the electronic file, wherein the electronic file includes a security token configured to; authenticate an attempt to access the electronic file, restrict access to the electronic file upon determining the attempt to be originating from outside the home network, and allow access to the electronic file in accordance with a security policy upon determining the attempt to be originating from within the home network; obtain information about changes to the electronic file as a result of the attempt; update another copy of the electronic file stored at a second storage location; and storing on a storage device of a file system, data representing the attempt to access the electronic file, wherein the one or more processors are communicably coupled to the home network. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. One or more machine-readable storage devices storing instructions that are executable by one or more processing devices to perform operations comprising:
-
storing a copy of an electronic file at a first storage location authenticated to be a part of a home network associated with the electronic file, wherein the electronic file includes a security token configured to; authenticate an attempt to access the electronic file, restrict access to the electronic file upon determining the attempt to be originating from outside the home network, and allow access to the electronic file in accordance with a security policy upon determining the attempt to be originating from within the home network; obtaining information about changes to the electronic file as a result of the attempt; updating another copy of the electronic file stored at a second storage location; and storing on a storage device of a file system, data representing the attempt to access the electronic file, wherein the one or more processing devices are communicably coupled to the home network. - View Dependent Claims (30)
-
Specification