首页> 外国专利> Facilitating Remote Access (Cross Reference to Related Applications) This application is incorporated herein by reference in its entirety and is incorporated herein by reference to US Provisional Application No. 62 / 786,813, filed December 31, 2018. Claim the interests of the issue.

Facilitating Remote Access (Cross Reference to Related Applications) This application is incorporated herein by reference in its entirety and is incorporated herein by reference to US Provisional Application No. 62 / 786,813, filed December 31, 2018. Claim the interests of the issue.

机译:促进远程访问(交叉引用相关应用)本申请通过引用全部内容并入本文,并通过引用2018年12月31日提交的美国临时申请第62/786813号并入本文。主张该问题的利益。

摘要

In one aspect, the technique for performing authentication involves the first device receiving security data from a second device that shares a network connection with the first device. The first device applies the security data received from the second device when requesting authentication to a secure resource on the network. In another aspect, techniques for managing computerized access include a first computing device that receives location information from a second computing device that shares a network connection with the first computing device. The first computing device applies the location information received from the second computing device when requesting access to resources on the network. Therefore, the first computing device has the presence of the second computing device and / or the location of the second computing device in order to increase the authentication strength and / or facilitate the supervision of access rights. Utilize information. In yet another aspect, the technique uses a managed computing device to extend management control by an organization to an IoT (Internet of Things) device in the local environment of the computing device. The computing device discovers local IoT devices and participates in communication with the server to bring one or more of these IoT devices under control. In some examples, extending management control enrolls selected IoT devices into the organization's management framework and directs communication between the server and each IoT device through the managed device. Accompanied by this, it provides a point of presence for overseeing the management of selected IoT devices in the local environment. [Selection diagram] FIG. 11
机译:在一个方面,用于执行认证的技术涉及第一设备从与第一设备共享网络连接的第二设备接收安全数据。当请求认证时,第一设备将从第二设备接收的安全数据应用于网络上的安全资源。在另一方面,用于管理计算机化访问的技术包括第一计算设备,其从与第一计算设备共享网络连接的第二计算设备接收位置信息。当请求访问网络上的资源时,第一计算设备应用从第二计算设备接收的位置信息。因此,第一计算设备具有第二计算设备的存在和/或第二计算设备的位置,以便增加认证强度和/或促进对访问权的监督。利用信息。在又一方面,该技术使用托管计算设备将组织的管理控制扩展到计算设备的本地环境中的物联网设备。计算设备发现本地物联网设备,并参与与服务器的通信,以控制一个或多个这些物联网设备。在一些示例中,扩展管理控制将选定的物联网设备注册到组织的管理框架中,并通过受管设备指导服务器和每个物联网设备之间的通信。同时,它还提供了一个存在点,用于监督本地环境中选定物联网设备的管理。[选择图]图11

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号