1. A computer implemented method of gaining access of devices based on a user's identity, the computer implemented method being executed on a target device and comprising:detecting, by a proximity sensor, a user worn accessory present in vicinity of the target device;
receiving, by a transceiver, a user identity (UID) from the user worn accessory;
matching, by a processor, the UID with a list of known UID's stored in a memory of the target device, to identify access rights assigned to the UID;
providing, by the processor, an access of the target device to the user, based on the access rights assigned to the UID;
identifying, by the processor, an unauthorized termination of connection between the target device and the user worn accessory; and
sending, by the transceiver, a trigger to the user worn accessory for generating an alarm based on the unauthorized termination of connection.