Citrix Systems, Inc.
LEVERAGING LOCATION INFORMATION OF A SECONDARY DEVICE
Last updated:
Abstract:
A technique for managing computerized access includes a first computing device that receives location information from a second computing device that shares its network connection with the first computing device. The first computing device applies the location information received from the second computing device when requesting access to a resource on the network. The first computing device thus effectively leverages the presence of the second computing device and its location information to increase authentication strength and/or to facilitate the administration of access rights.
Status:
Application
Type:
Utility
Filling date:
30 Dec 2019
Issue date:
2 Jul 2020