发明名称 Allowing varied device access based on different levels of unlocking mechanisms
摘要 Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
申请公布号 US9223952(B2) 申请公布日期 2015.12.29
申请号 US201213630100 申请日期 2012.09.28
申请人 Intel Corporation 发明人 Shippy Keith;Kohlenberg Tobias;Mian Mubashir;Smith Ned;Ben-Shalom Omer;Viswanathan Tarun;Morgan Dennis;Verrall Timothy;Dave Manish;Birk Eran
分类号 G06F17/00;H04L29/06;G06F21/31;H04W12/06;H04W88/02 主分类号 G06F17/00
代理机构 Trop, Pruner & Hu, P.C. 代理人 Trop, Pruner & Hu, P.C.
主权项 1. A method comprising: receiving runtime input from one or more of a plurality of unlock interfaces of a device, wherein the plurality of unlock interfaces enable the use of runtime input related to authentication of a user; identifying metadata associated with data stored on the device; comparing the runtime input to the metadata to select a level of access with regard to the device from a plurality of levels of access, wherein different levels of access have associated security policies that specify different combinations of the plurality of unlock interfaces; conducting an authentication of the runtime input based on an associated security policy of the selected level of access; using one or more cryptographic keys to place the device in an unlocked state with regard to the selected level of access if the authentication is successful; and using the unlock interfaces to re-lock one or more of the device or the data stored on the device based on one or more of subsequent monitoring of a presence of the user, gestures signaling a desire to re-lock, or a change in continuous authentication that falls below acceptable tolerance levels.
地址 Santa Clara CA US