Proximity-based system that secures linked IP enabled devices
First Claim
1. A method, comprising:
- identifying, by a central programming device (CPD), two or more wireless-enabled devices;
generating, by the CPD, a geo-proximity fence defining an area;
assigning, by the CPD, a relational link among at least two devices selected from the identified wireless-enabled devices;
defining, by the CPD, a rule associated with the relational link, wherein the rule is based, at least in part, on positions of the selected devices relative to the geo-proximity fence;
determining, by the CPD, whether the rule is satisfied; and
granting, by the CPD, access to secured data or to a secure location in response to determining that the rule is satisfied.
1 Assignment
0 Petitions
Accused Products
Abstract
The proliferation of networked, wireless-enabled devices is challenged by the reliance upon password management and user knowledge of privacy and security techniques to maintain control over data that is personal, proprietary or restricted. This disclosure enables a geo-proximity security and privacy system for assuring control and non-repudiation for wireless-enabled devices by relying upon location and trusted network relationships among a set of wireless-enabled devices, where one or more devices may act as a control or master key. Security in a digital society may be benefited by the establishment of digital walls that are as flexible as the world of cyberspace to be erected whenever and wherever wireless-enabled technology is in use. The security protocol may be configured to secure a protected device or the data they contain from loss, theft, abuse or misuse.
46 Citations
20 Claims
-
1. A method, comprising:
-
identifying, by a central programming device (CPD), two or more wireless-enabled devices; generating, by the CPD, a geo-proximity fence defining an area; assigning, by the CPD, a relational link among at least two devices selected from the identified wireless-enabled devices; defining, by the CPD, a rule associated with the relational link, wherein the rule is based, at least in part, on positions of the selected devices relative to the geo-proximity fence; determining, by the CPD, whether the rule is satisfied; and granting, by the CPD, access to secured data or to a secure location in response to determining that the rule is satisfied. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A proximity-based access system comprising:
-
(A) a central processing device (CPD) configured to— communicate with two or more wireless-enabled devices within a range of communication of the CPD; enroll the two or more wireless-enabled devices in the proximity-based access system during an initialization phase; assign a relational link between the two or more wireless-enabled devices enrolled in the proximity-based access system; generate a geo-proximity fence encompassing an area; define a rule associated with the relational link, the rule based on positions of the linked wireless-enabled devices relative to the geo-proximity fence; and grant access to secured data or a secured location in response to determining the rule is satisfied; and (B) one or more wireless-enabled devices configured to communicate with the CPD for determining if the rule is satisfied, including sending current locations of the linked wireless-enabled devices. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification