CPC H04L 63/108 (2013.01) [G06F 21/31 (2013.01); H04L 63/102 (2013.01); H04L 67/145 (2013.01)] | 20 Claims |
1. A computer-implemented method, comprising:
receiving, from a first computing device, a request to elevate a privilege associated with a first user, the request including contact information associated with a second user;
sending a request for approval to a second computing device associated with the second user;
receiving, from the second computing device, a first approval of the request;
receiving an authentication identifier associated with the second user to authenticate the second user;
based on the first approval and an authentication of the second user using the authentication identifier, provisioning the privilege to the first user;
based on an occurrence of a triggering event, determining that the privilege will expire within a period of time;
sending a notification to the second computing device indicating an impending expiration of the privilege;
receiving, from the second computing device, a second approval to continue the provision of the privilege to the first user; and
based on the second approval, continuing the provision of the privilege to the first user.
|