主权项 |
1. A computer-implemented method comprising:
authenticating, by one or more hardware processors, a first device for network access via a first authentication process, the first device being associated with a user account, wherein the first device is connected to a first network; receiving, by the one or more hardware processors, an access request from a second device associated with the user account, wherein the second device is connected to a second network access point; determining, by the one or hardware more processors, whether the second device is within an access perimeter of the first device, wherein the determining comprises: defining one or more network access points based on the first network; determining that the second device is within the access perimeter of the first device when the second network access point is in the defined one or more network access; when the second device is within the access perimeter of the first device, permitting by the one or more hardware processors, the second device to access the network without a second authentication process; and wherein the second device is permitted to access the network when the second device is within the access perimeter of the first device and the first device is within the access perimeter. |