Accessing a cloud-based service using a communication device linked to another communication device via a peer-to-peer ad hoc communication link

ABSTRACT

Arrangements described herein relate to accessing a cloud based service. Responsive to a user of a first communication device initiating access to the cloud based service via the first communication device, a prompt for a valid password to be entered to access the cloud based service can be received by the first communication device. Responsive to the valid password required to access the cloud based service not being stored on the first communication device, the first communication device can automatically retrieve the valid password from a second communication device via a peer-to-peer ad hoc communication link between the first communication device and the second communication device. The valid password can be automatically provided, by the first communication device, to a login service for the cloud based service to obtain access by the first communication device to the cloud based service.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/835,353, filed Mar. 15, 2013, now U.S. Pat. No. 9,038,195, entitled“Accessing a Cloud-Based Service Using a Communication Device Linked toAnother Communication Device Via a Peer-to-Peer Ad Hoc CommunicationLink,” which is herein incorporated by reference.

BACKGROUND OF THE INVENTION

Cloud computing is the use of computing resources (hardware andsoftware) delivered as a service over a network, such as the Internet.In a business model using software as a service, users are providedaccess to application software and databases via cloud computing. Theservice providers manage the infrastructure and platforms on which theapplications run. In addition to software as a service, other cloudbased services commonly are available to users, for example socialnetworking services, banking services, e-mail services, instantmessaging services, data storage services, etc. Typically these servicesrequire a user name and password to be authenticated before a user canuse the services.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts a system for accessing a cloud based service, which isuseful for understanding various arrangements described herein.

FIG. 2 is a flowchart presenting a method of accessing a cloud basedservice, which is useful for understanding various arrangementsdescribed herein.

FIG. 3 depicts a block diagram of a communication device, which isuseful for understanding various arrangements described herein.

DETAILED DESCRIPTION

While the specification concludes with claims defining features of theembodiments described herein that are regarded as novel, it is believedthat these embodiments will be better understood from a consideration ofthe description in conjunction with the drawings. As required, detailedarrangements of the present embodiments are disclosed herein; however,it is to be understood that the disclosed arrangements are merelyexemplary of the embodiments, which can be embodied in various forms.Therefore, specific structural and functional details disclosed hereinare not to be interpreted as limiting, but merely as a basis for theclaims and as a representative basis for teaching one skilled in the artto variously employ the present embodiments in virtually anyappropriately detailed structure. Further, the terms and phrases usedherein are not intended to be limiting but rather to provide anunderstandable description of the present arrangements.

As will be appreciated by one skilled in the art, aspects of the presentarrangements may be embodied as a system, method or computer programproduct. Accordingly, aspects of the present arrangements may take theform of an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “module” or “system.” Furthermore,aspects of the present arrangements may take the form of a computerprogram product embodied in one or more computer-readable medium(s)having computer-readable program code stored thereon. Thecomputer-readable program code may be executable by a processor (e.g., acentral processing unit or a controller) to perform the processes andmethods described herein.

A computer-readable signal medium may include a propagated data signalwith computer-readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer-readable signal medium may be any computer- readable mediumthat is not a computer-readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device.

Program code embodied on a computer-readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber, cable, RF, etc., or any suitable combination ofthe foregoing. Computer program code for carrying out operations foraspects of the present invention may be written in any combination ofone or more programming languages, including an object orientedprogramming language such as Java™, Smalltalk, C++ or the like andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The program codemay execute entirely on the user's communication device, partly on theuser's communication device, as a stand-alone software package, partlyon the user's communication device and partly on a remote communicationdevice, or entirely on the communication device or server.

Aspects of the present arrangements are described below with referenceto a flowchart illustration and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of thepresent arrangements. It will be understood that each block of theflowchart illustration and/or block diagrams, and combinations of blocksin the flowchart illustrations and/or block diagrams, can be implementedby computer program instructions. These computer program instructionsmay be provided to a processor of a communication device, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions, which execute via the processor of the communicationdevice, other programmable data processing apparatus, or other devicescreate means for implementing the functions/acts specified in theflowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in acomputer-readable medium that can direct a computer, other programmabledata processing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer-readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

While only certain features of the invention have been illustrated anddescribed herein, many modifications and changes will occur to thoseskilled in the art. It is, therefore, to be understood that the appendedclaims are intended to cover all such modifications and changes as fallwithin the true spirit of the invention.

The computer program instructions may also be loaded onto acommunication device, other programmable data processing apparatus, orother devices to cause a series of operational steps to be performed onthe communication device, other programmable apparatus or other devicesto produce a processor implemented process such that the instructionswhich execute on the communication device or other programmableapparatus provide processes for implementing the functions/actsspecified in the flowchart and/or block diagram block or blocks.

Arrangements described herein relate to accessing a cloud based service.The cloud based service can provide software as service, a socialnetworking service, a banking service, an electronic mail service, aninstant messaging service, a data storage service, or any other softwarebased service accessible via a communication network.

The cloud based service can be accessed using a first communicationdevice linked to one or more other communication devices via apeer-to-peer ad hoc communication link. Responsive to a user of a firstcommunication device initiating access to the cloud based service viathe first communication device, a prompt for a valid user name and/orvalid password to be entered to access the cloud based service can bereceived by the first communication device. Responsive to the validpassword and/or user name required to access the cloud based service notbeing stored on the first communication device, the first communicationdevice can automatically retrieve the valid password and/or user namefrom a second communication device via the peer-to-peer ad hoccommunication link between the first communication device and the secondcommunication device. The valid password and/or user name can beautomatically provided to the cloud based service to obtain access tothe cloud based service. For example, using the automatically retrievedpassword and/or user name, the first communication device can establisha user session with the cloud based service.

In view of the foregoing, the user need not complete a series ofredundant and time consuming tasks related to entering the user nameand/or password to access the cloud based service. Instead, the username and/or password can be automatically entered on behalf of the user,even when the user name and/or password are not stored on the firstcommunication device via which the user is attempting to access thecloud based service. This provides an improved user experience for theuser.

Several definitions that apply throughout this document will now bepresented.

As used herein, the term ad hoc network means a decentralized type ofwireless network that does not rely on, but can use, a preexistinginfrastructure such as routers in wired networks or access points inmanaged (infrastructure) wireless networks, to communicate data. Insteadof relying on the preexisting infrastructure, each node of an ad hocnetwork can participate in routing of data by forwarding the data to/forother nodes, so the determination of which nodes forward data is madedynamically on the basis of network connectivity. In addition to theclassic routing, ad hoc networks can use flooding for forwarding thedata. The mode of operation of IEEE 802.11 wireless networks isconsistent with an ad hoc network, as is the operation of personal areanetworks (PANs), such as Bluetooth®, ZigBee®, near field communication(NFC), and the like.

As used herein, the term “ad hoc communication link” means a wirelesscommunication link established via an ad hoc network, for example via anIEEE 802.11 wireless communication link, via a PAN communication link orvia a NFC link.

As used herein, the term “peer-to-peer means” means that communicationdevices have equal status on a communication network and are free toassociate with any other communication devices on the communicationnetwork in a communication link range, for example using ad hoccommunication links.

As used herein, the term “communication device” means a devicecomprising a processor (e.g., a central processing unit, a controller,or the like) and memory configured to communicate with other devices viaa communication network. Examples of communication devices include, butare not limited to, computers (e.g., workstations, desktop computers,mobile computers, laptop computers, tablet computers, or the like),personal digital assistants, mobile phones, smart phones, etc.

The terms “computer program,” “software,” “application,” variants and/orcombinations thereof, in the present context, mean any expression, inany language, code or notation, of a set of instructions intended tocause a system having an information processing capability to perform aparticular function either directly or after either or both of thefollowing: a) conversion to another language, code or notation; b)reproduction in a different material form. For example, an applicationcan include, but is not limited to, a script, a subroutine, a function,a procedure, an object method, an object implementation, an executableapplication, an applet, a servlet, a MIDlet, a source code, an objectcode, a shared library/dynamic load library and/or other sequence ofinstructions designed for execution on a processing system.

FIG. 1 depicts a system 100 for accessing a cloud based service, whichis useful for understanding various arrangements described herein. Thesystem can include a cloud based service 105 accessible via one or morecommunication networks 110. The communication network(s) 110 can beimplemented as, or include, any of a variety of different public and/orprivate networks such as a wide area network (WAN), a local area network(LAN), a wireless network, a mobile network (e.g., a cellularcommunication network), a Virtual Private Network (VPN), the Internet, aPublic Switched Telephone Network (PSTN), or the like.

In operation, a user, using a communication device 115, can initiateaccess to the cloud based service 105 via the communication network(s)110. In response, the cloud based service 105, or another service taskedwith authenticating the user, can prompt the user to enter a user nameand/or password. The communication device 115 can determine whether acorresponding user name and/or password are stored on the communicationdevice. If so, the communication device 115 can communicate the username and/or password to the cloud based service 105 (or another servicetasked with authenticating the user for the cloud based service) foruser authentication. If the user authentication fails, the user nameand/or password stored on the communication device 115 can be determinedto be invalid.

If the user name and/or password stored on the communication device 115are determined to be invalid, or a corresponding user name and/orpassword are not stored on the communication device 115, thecommunication device 115 can attempt to retrieve a valid user nameand/or password from one or more other communication devices 120, 125,130 via respective peer-to-peer ad hoc communication links (hereinafter“communication links”) 135. The communication links 135 can be IEEE802.11 communication links, PAN communication links, NFC links, or anyother suitable peer-to-peer ad hoc communication links. The othercommunication devices 120, 125, 130 can be communication devices whichthe user may have previously used to access the cloud based service 105,and thus may have stored thereon a valid user name and/or passwordrequired to access the cloud based service 105.

The communication devices 120-130 can be identified by the communicationdevice 115 by virtue of the ability of the communication device 115 toestablish the communication links 135 with the communication devices120-130 and/or the communication devices 120-130 being located proximateto the communication device 115. For example, responsive to the validuser name and/or password required to access the cloud based service 105not being stored on the communication device 115, the communicationdevice 115 can automatically initiate establishment of the communicationlink(s) 135 between the communication device 115 and one or more of thecommunication devices 120-130 and/or identify existing communicationlinks 135 between the communication device 115 and one or more of thecommunication devices 120-130.

In illustration, the communication device 115 can execute username/password (U/P) software 145, for example a suitable application,plug-in or module. The U/P software 145 can scan the communicationdevice 115 to identify any presently established communication links 135with one or more of the communication devices 120-130. The U/P software145 also can scan the communication device 115 to identify any savedsettings for communication links 135 which are not presentlyestablished, and initiate the communication device 115 to attempt toestablish such communication links 135 with one or more of thecommunication devices 120-130. When the communication device 115 is ableto establish communication links 135 with the communication devices120-130, for example establishing PAN or NFC communication links 135with the communication devices 120-130, or the communication devices120-130 are on the same network or subnet as the communication device115, the communication devices 120-130 can be determined to be locatedproximate to the first communication device 115.

When one or more of the communication links 135 are identified and/orestablished, the U/P software 145 can communicate the respective queryor queries 140 via the communication link(s) 135 to the one or morecommunication devices 120-130. The queries 140 can identify the cloudbased service 105, the user who is attempting to access the cloud basedservice 105, and request a valid user name and/or password required toaccess the cloud based service 105 on behalf of the user. This processcan be responsive to identifying and/or establishing the communicationlinks 135 and/or responsive to determining that the other communicationdevices 120-130 are located proximate to the communication device 115.

Each of the communication devices 120-130 also can execute respectiveU/P software 150, 155, 160. On each communication device 120-130, therespective U/P software 150-160 can receive and process the respectivequery 140 to identify the last known valid user name and/or password 165for the cloud based service 105, which may be stored on thatcommunication device 120-130, and communicate such user name/password165 to the communication device 115. Accordingly, the communicationdevice 115 can receive one or more sets of user names/passwords 165, oneset from each communication device 120-130.

If the sets of user names/passwords 165 match (e.g., each user name andeach password are the same), the U/P software 145 can determine that theuser name/password 165 is valid, and use that user/name password as thevalid user name/password 170 to be used to login to the cloud basedservice 105. If the sets of user names/passwords 165 do not match, theU/P software 145 can identify the most recent user name/password 165,and assume that they are valid. For example, each user name/password 165provided by a respective communication device 120-130 can have anassociated time stamp from when the user name/password 165 was last usedto access the cloud based service 105 or validated by the cloud basedservice 105 (or a corresponding login service), and the U/P software 145can select the user name/password 165 with the most recent time stamp asthe valid user name/password 170 based on that time stamp.

Once the U/P software 145 has selected the valid user name/password, theU/P software 145 can provide the valid user name and/or password 170 tothe cloud based service 105 (or a corresponding login service) to logthe user/communication device 115 into the cloud based service 105, thusobtaining access by the communication device 115 to the cloud basedservice 105 on behalf of the user. For example a first user session canbe established with the cloud based service 105 via the communicationdevice 115. Accordingly, the user can access the cloud based serviceusing the communication device 115.

In one non-limiting arrangement, when the user of the communicationdevice 115 initiates access to the cloud based service 105 via thecommunication device 115, the user may have one or more other usersessions opened with the cloud based service 105 via one or more of thecommunication devices 120-130. Thus, one or more of the communicationdevices 120-130 presently may have access to the cloud based service105. For example, the user may be working on a desktop computer (e.g.,communication device 120) in the user's home office, and establish auser session (hereinafter “second user session”) with the cloud basedservice 105. The user then may move to the user's family room, pick up atablet computer (e.g., communication device 115), and initiate access tothe cloud based service 105 using the tablet computer. Hence, a firstuser session can be established with the cloud based service 105 via thetablet computer, wherein the tablet computer obtains the valid username/password from the desktop computer in accordance with the processdescribed above.

When the communication device 115 terminates the user session, forexample the user closes the first user session by logging out of thecloud based service 105 or closing an application used for the firstuser session (e.g., a web browser, an e-mail client, a messaging client,etc.), the U/P software 145 of the communication device 115 cancommunicate a message to the U/P software 150 of the communicationdevice 120 indicating to the U/P software 150 close the second usersession. In response, the U/P software 150 can close the second usersession on the communication device 120, for example by logging out ofthe cloud based service 105 or closing an application used for thesecond user session. If one or more other user sessions with the cloudbased service 105 exist via the communication devices 125-130, therespective U/P software 155-160 can receive respective messages from theU/P software 145 to close such user sessions and, in response, the U/Psoftware 155-160 can close such user sessions in a similar manner.

When the first user session is terminated, the communication device 115can delete the valid user name and/or password 170 received from atleast one of the communication devices 120-130, though this need not bethe case. For instance, the valid user name and/or password 170 can bestored only temporarily to establish the first user session. Whether todelete the valid user name and/or password 170 after the first usersession is terminated, or persist the valid user name and/or password170 to a machine-readable storage (e.g., store so that the valid username and/or password 1700 will be available at a later time), can bebased on a user setting in the U/P software 145.

The U/P software 145-160 can implement any suitable form of securitysettings so that the valid user name and/or password 170 only will beretrieved by the communication device 115 when the appropriate user islogged into the communication device 115, for example using the user'scredentials (e.g., user name, password, finger print, etc.) to log intothe communication device 115 and/or the U/P software 145.

FIG. 2 is a flowchart presenting a method 200 of accessing a cloud basedservice, which is useful for understanding various arrangementsdescribed herein. At step 205, responsive to a user of a firstcommunication device initiating access to the cloud based service viathe first communication device, a prompt for a valid user name and/orpassword to be entered to access the cloud based service is received bythe first communication device.

At step 210, responsive to the valid user name and/or password requiredto access the cloud based service not being stored on the firstcommunication device, the first communication device, via a processor,can automatically retrieve the valid user name and/or password from asecond communication device via a peer-to-peer ad hoc communication linkbetween the first communication device and the second communicationdevice. As noted, the first communication device can scan for one ormore existing peer-to-peer ad hoc communication links, for example anexisting communication link between the first and second communicationdevices, or initiate the first communication device to establish one ormore peer-to-peer ad hoc communication links, for example acommunication link between the first and second communication devices.At step 215, the valid user name and/or password can be automaticallyprovided, by the first communication device, to a login service of thecloud based service to obtain access by the first communication deviceto the cloud based service. Thus, a first user session can beestablished.

Sometime after using the cloud based service, the user may decide toterminate the first user session. Thus, at step 220, the firstcommunication device can terminate the first user session with the cloudbased service. At step 225, responsive to the first communication deviceterminating the first user session with the cloud based service, asecond user session established between the second communication deviceand the cloud based service can be automatically terminated.

FIG. 3 is a block diagram depicting an example arrangement of thecommunication device 115 of FIG. 1, which is useful for understandingvarious arrangements described herein. The communication devices 120-130of FIG. 1 can be configured in a similar manner.

The communication device 115 can include at least one processor 305(e.g., a central processing unit or controller) coupled to memoryelements 310 through a system bus 315 or other suitable circuitry. Assuch, the communication device 115 can store program code within thememory elements 310. The processor 305 can execute the program codeaccessed from the memory elements 310 via the system bus 315. It shouldbe appreciated that the communication device 115 can be implemented inthe form of any system including a processor and memory that is capableof performing the functions and/or operations described within thisspecification.

The memory elements 310 can include one or more physical memory devicessuch as, for example, local memory 320 and one or more bulk storagedevices 325. Local memory 320 refers to RAM or other non-persistentmemory device(s) generally used during actual execution of the programcode. The bulk storage device(s) 325 can be implemented ascomputer-readable storage medium(s), such as a hard disk drive (HDD),solid state drive (SSD), or other persistent data storage device. Thecommunication device 115 also can include one or more cache memories(not shown) that provide temporary storage of at least some program codein order to reduce the number of times program code must be retrievedfrom the bulk storage device 325 during execution.

Input/output (I/O) devices such as a display 330, a pointing device 335and, optionally, a keyboard 340 can be coupled to the communicationdevice 115. The I/O devices can be coupled to the communication device115 either directly or through intervening I/O controllers. For example,the display 330 can be coupled to the communication device 115 via agraphics processing unit (GPU), which may be a component of theprocessor 305 or a discrete device. One or more network adapters 345also can be coupled to communication device 115 to enable thecommunication device 115 to become coupled to other communicationdevices, systems, computer systems, remote printers, and/or remotestorage devices through intervening private or public networks ordirectly via a PAN. Modems, cable modems, transceivers, and Ethernetcards are examples of different types of network adapters 345 that canbe used with communication device 115.

As pictured in FIG. 3, the memory elements 310 can store the componentsof the communication device 115, namely the U/P software 145. Beingimplemented in the form of executable program code, the U/P software 145can be executed by the communication device 115 and, as such, can beconsidered part of the communication device 115. Moreover, the U/Psoftware 145 is functional data structure that imparts functionalitywhen employed as part of the communication device 115 of FIG. 1. Thequeries 140, user names/passwords 165 and valid user name/password 170of FIG. 1 also are functional data structures that impart functionalitywhen processed by and/or generated by the communication device 115 ofFIG. 1.

Like numbers have been used to refer to the same items throughout thisspecification. The terminology used herein is for the purpose ofdescribing particular embodiments only and is not intended to belimiting of the invention. The terms “a” and “an,” as used herein, aredefined as one or more than one. The term “plurality,” as used herein,is defined as two or more than two. The term “another,” as used herein,is defined as at least a second or more. The terms “including” and/or“having,” as used herein, are defined as comprising (i.e. openlanguage). It will be further understood that the terms “includes,”“including,” “comprises,” and/or “comprising,” when used in thisspecification, specify the presence of stated features, integers, steps,operations, elements, and/or components, but do not preclude thepresence or addition of one or more other features, integers, steps,operations, elements, components, and/or groups thereof.

Reference throughout this specification to “one arrangement,” “anarrangement,” or similar language means that a particular feature,structure, or characteristic described in connection with the embodimentis included in at least one arrangement disclosed within thisspecification. Thus, appearances of the phrases “in one arrangement,”“in an arrangement,” and similar language throughout this specificationmay, but do not necessarily, all refer to the same arrangement.

The term “plurality,” as used herein, is defined as two or more thantwo. The term “another,” as used herein, is defined as at least a secondor more. The term “and/or” as used herein refers to and encompasses anyand all possible combinations of one or more of the associated listeditems. It will also be understood that, although the terms first,second, etc. may be used herein to describe various elements, theseelements should not be limited by these terms, as these terms are onlyused to distinguish one element from another unless stated otherwise orthe context indicates otherwise.

The term “if’ may be construed to mean “when” or “upon” or “in responseto determining” or “in response to detecting,” depending on the context.Similarly, the phrase “if it is determined” or “if [a stated conditionor event] is detected” may be construed to mean “upon determining” or“in response to determining” or “upon detecting [the stated condition orevent]” or “in response to detecting [the stated condition or event],”depending on the context.

Moreover, as used herein, ordinal terms (e.g. first, second, third,fourth, and so on) distinguish one communication device, software,application, communication link, process, and the like from anothercommunication device, software, application, communication link, processand the like. Thus, an ordinal term used herein need not indicate aspecific position in an ordinal series. For example, a processidentified as a “second process” may occur before a touch sensoridentified as a “first process.” Further, one or more processes mayoccur between a first process and a second process.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the embodiments disclosed within this specification havebeen presented for purposes of illustration and description, but are notintended to be exhaustive or limited to the form disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of theembodiments of the invention. The embodiments were chosen and describedin order to best explain the principles of the invention and thepractical application, and to enable others of ordinary skill in the artto understand the inventive arrangements for various embodiments withvarious modifications as are suited to the particular use contemplated.

These embodiments can be embodied in other forms without departing fromthe spirit or essential attributes thereof Accordingly, reference shouldbe made to the following claims, rather than to the foregoingspecification, as indicating the scope of the embodiments.

1. A method, comprising: in response to a first communication device generating and transmitting a request to access a computing system, receiving a first reply at the first communication device, wherein the first reply comprises a request for authentication data to be entered on the first communication device to access the computing system; determining whether the authentication data is stored on the first communication device; querying a second communication device for the authentication data when the authentication data is determined not to be stored on the first communication device; receiving the authentication data from the second communication device when the authentication data is stored on the second communication device; and providing the authentication data from the first communication device to access the computing system.
 2. The method of claim 1, wherein generating and transmitting the request to access the computing system comprises generating and transmitting a request to access a cloud based service.
 3. The method of claim 1, further comprising determining whether the authentication data is valid or invalid when the authentication data is stored on the first communication device.
 4. The method of claim 3, further comprising querying the second communication device for the authentication data when the authentication data stored on the first communication device is determined to be invalid.
 5. The method of claim 1, further comprising establishing a peer-to-peer ad hoc communication link between the first communication device and the second communication device prior to querying the second communication device for the authentication data.
 6. The method of claim 5, wherein establishing the peer-to-peer ad hoc communication link between the first communication device and the second communication device comprises automatically establishing the peer-to-peer ad hoc communication link when the second communication device is located proximate to the first communication device.
 7. The method of claim 1, wherein querying the second communication device for the authentication data comprises querying a plurality of external communication devices for the authentication data.
 8. An electronic device, comprising; a processor configured to: receive a first request, wherein the first request comprises a request for authentication data to be entered on the electronic device to access a computing system; determine whether the authentication data is stored on the electronic device; query a second electronic device for the authentication data when the authentication data is determined not to be stored on the electronic device; receive the authentication data from the second electronic device when the authentication data is stored on the second electronic device; and provide the authentication data to access the computing system.
 9. The electronic device of claim 8, wherein the processor is configured to establish a peer-to-peer ad hoc communication link with the second electronic device upon determining that the authentication data is not stored on the electronic device.
 10. The electronic device of claim 9, wherein the processor is configured to establish the peer-to-peer ad hoc communication link with the second electronic device based at least in part on whether the second electronic device is located proximate to the electronic device.
 11. The electronic device of claim 8, wherein the second electronic device is configured to access the computing system prior to the electronic device accessing the computing system.
 12. The electronic device of claim 8, wherein the processor is configured to query a plurality of external electronic devices for the authentication data, wherein the plurality of external electronic devices includes the second electronic device.
 13. The electronic device of claim 8, wherein the processor is configured to: query a third electronic device for the authentication data; and receive a second authentication data from the third electronic device.
 14. The electronic device of claim 13, wherein the processor is configured to compare the authentication data to the second authentication data to determine a validity of the authentication data or the second authentication data.
 15. The electronic device of claim 14, wherein the processor is configured to determine the validity of the authentication data or the second authentication data based at least in part on one or more time stamps associated with the authentication data and the second authentication data.
 16. The electronic device of claim 8, wherein the processor is configured to provide a prompt for a user of the electronic device to provide authorization data on the electronic device before the electronic device receives the authentication data from the second electronic device.
 17. The electronic device of claim 8, wherein the authentication data comprises a username, a password, or a combination thereof
 18. A non-transitory computer-readable medium having computer executable code stored thereon, the code comprising instructions to: cause a processor of a communication device to receive a first request, wherein the first request comprises a request for authentication data to be entered on the communication device to access a computing system; cause the processor to determine whether the authentication data is stored on the communication device; cause the processor to query a second communication device for the authentication data when the authentication data is determined not to be stored on the communication device; cause the processor to receive the authentication data from the second communication device when the authentication data is stored on the second communication device; and cause the processor to provide the authentication data to access the computing system.
 19. The non-transitory computer-readable medium of claim 18, wherein the code further comprises instructions to cause the processor to establish a first peer-to-peer ad hoc communication link with the second communication device and a second peer-to-peer ad hoc communication link with a third communication device upon determining that the authentication data is not stored on the communication device.
 20. The non-transitory computer-readable medium of claim 18, wherein the code further comprises instructions to: cause the processor to query the second communication device and a third communication device for the authentication data; and cause the processor to receive the authentication data from the second communication device or the third communication device when the authentication data is stored on the second communication device or the third communication device. 