Citrix Systems, Inc.
LEVERAGING LOCATION INFORMATION OF A SECONDARY DEVICE

Last updated:

Abstract:

A technique for managing computerized access includes a first computing device that receives location information from a second computing device that shares its network connection with the first computing device. The first computing device applies the location information received from the second computing device when requesting access to a resource on the network. The first computing device thus effectively leverages the presence of the second computing device and its location information to increase authentication strength and/or to facilitate the administration of access rights.

Status:
Application
Type:

Utility

Filling date:

30 Dec 2019

Issue date:

2 Jul 2020