Methods and systems for user opt-in to data privacy agreements

    公开(公告)号:US11350280B2

    公开(公告)日:2022-05-31

    申请号:US16680062

    申请日:2019-11-11

    申请人: VERIPATH, INC.

    摘要: A method for controlling access to a user's personal information includes obtaining, from an application executing on a device of a user of the application, personal information about the user of an application; determining a required permission from the user for at least one proposed use of the personal information; presenting, to the user, a first offer to provide access to at least one enhanced function of the application in exchange for the required permission; and responsive to the user providing the required permission, providing the user with access to the at least one enhanced function of the application.

    Dynamic policy-based on-boarding of devices in enterprise environments

    公开(公告)号:US11350279B2

    公开(公告)日:2022-05-31

    申请号:US16866166

    申请日:2020-05-04

    摘要: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.

    Key delegation for controlling access

    公开(公告)号:US11328543B2

    公开(公告)日:2022-05-10

    申请号:US16329662

    申请日:2017-08-30

    申请人: ASSA ABLOY AB

    摘要: It is provided a method for controlling access to an access object. The method is performed in an electronic key device and comprises the steps of: communicating with an access control device to obtain an identity of the access control device; sending an access request to a server, the access request comprising an identity of the electronic key device and the identity of the access control device; receiving a response from the server, the response comprising a key delegation to the electronic key device; and sending a grant access request to the access control device, the grant access request comprising the key delegation, to allow the access control device to evaluate whether to grant access to the access object based on a plurality of delegations comprising a sequence of delegations.

    MULTIPLE PARTY WI-FI ROUTER IN A WIRELESS NETWORK

    公开(公告)号:US20220132510A1

    公开(公告)日:2022-04-28

    申请号:US17476628

    申请日:2021-09-16

    摘要: An apparatus, method, and computer-readable recording medium perform client access delegation for a network device in a wireless network. A network controller of a gateway device receives a super-user client device authorization from the network admin client device, connects the super-user client device to the gateway device, receives a second-party client device access authorization from the super-user client device, and connects the second-party client device to the gateway device. The network controller of the gateway device also allocates a portion of available network bandwidth to a second group of client devices, monitors bandwidth consumption by the second group of users, and limits the bandwidth consumption of the second group of users to the allocated portion of the available bandwidth.

    Systems and methods for controlling email access

    公开(公告)号:US11184360B2

    公开(公告)日:2021-11-23

    申请号:US16591242

    申请日:2019-10-02

    申请人: VMware, Inc.

    摘要: Examples described herein include systems and methods for controlling access to a server, such as an email server or a gateway, in situations where the identity of the requesting device is unknown or where the user device accesses the server using an unknown or unmanaged application. In one example, the system can utilize a user authentication credential included in the request to identify other devices belonging to the user that happen to be enrolled with the system. An out-of-band message can be sent to those enrolled devices, requesting confirmation from the user and, in conjunction with an authentication token, allowing the system to trust the previously unknown device. In the example of an unmanaged application attempting to access an email server, the system can confirm compliance of the requesting device and issue an authentication token that, along with an appropriate command sent to the email server, provides access.

    Method for delegating access rights

    公开(公告)号:US11122434B2

    公开(公告)日:2021-09-14

    申请号:US16626055

    申请日:2018-05-14

    摘要: A method for delegating access rights to a secured object includes generating a first-order data packet in a trusted central management device. The data packet contains a first identifier, a first data set having access rights to a secured device and a first data secret key for encryption and signature. A second-order data packet is signed via the first data secret key and is created in the first mobile communication device and contains a unique identifier, reference data, a second data set having access rights, a second data secret key for encryption and a first data container. The first data container is encrypted via the first data secret key and contains the first identifier and the second data secret key. The signed second-order data packet is transmitted to a second mobile communication device of a second user.