-
公开(公告)号:US20110289564A1
公开(公告)日:2011-11-24
申请号:US12785517
申请日:2010-05-24
申请人: Steven Thomas Archer , Lawrence J. Zaykowski , Kristopher Alan Pate , Robert Angelo Clavenna, II , Paul V. Hubner , Jack Mitchell Farris
发明人: Steven Thomas Archer , Lawrence J. Zaykowski , Kristopher Alan Pate , Robert Angelo Clavenna, II , Paul V. Hubner , Jack Mitchell Farris
CPC分类号: H04L63/083 , G06F21/40 , G06F2221/2101 , G06F2221/2105 , G06F2221/2141 , H04L63/08 , H04L63/108 , H04L63/205 , H04L2463/082
摘要: A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be determined that a second authentication is required at a second time subsequent to the time of initial user authentication. Second monitored information may be captured at the second time. The second monitored information may be compared to the first monitored information to determine whether continued authentication is maintained. Access to the particular application or resource when it is determined that continued authentication is not maintained.
摘要翻译: 计算机实现的方法可以包括在特定应用或资源的初始用户认证时接收与用户相关的第一监视信息。 可以确定在初始用户认证的时间之后的第二时间需要第二认证。 第二次监视的信息可能在第二次被捕获。 可以将第二监视信息与第一监视信息进行比较,以确定是否维持持续认证。 当确定不保持持续认证时,访问特定应用程序或资源。
-
公开(公告)号:US08464320B2
公开(公告)日:2013-06-11
申请号:US12785517
申请日:2010-05-24
申请人: Steven Thomas Archer , Lawrence J. Zaykowski , Kristopher Alan Pate , Robert Angelo Clavenna, II , Paul V. Hubner , Jack Mitchell Farris
发明人: Steven Thomas Archer , Lawrence J. Zaykowski , Kristopher Alan Pate , Robert Angelo Clavenna, II , Paul V. Hubner , Jack Mitchell Farris
CPC分类号: H04L63/083 , G06F21/40 , G06F2221/2101 , G06F2221/2105 , G06F2221/2141 , H04L63/08 , H04L63/108 , H04L63/205 , H04L2463/082
摘要: A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be determined that a second authentication is required at a second time subsequent to the time of initial user authentication. Second monitored information may be captured at the second time. The second monitored information may be compared to the first monitored information to determine whether continued authentication is maintained. Access to the particular application or resource when it is determined that continued authentication is not maintained.
摘要翻译: 计算机实现的方法可以包括在特定应用或资源的初始用户认证时接收与用户相关的第一监视信息。 可以确定在初始用户认证的时间之后的第二时间需要第二认证。 第二次监视的信息可能在第二次被捕获。 可以将第二监视信息与第一监视信息进行比较,以确定是否维持持续认证。 当确定不保持持续认证时,访问特定应用程序或资源。
-
公开(公告)号:US20120084857A1
公开(公告)日:2012-04-05
申请号:US12894918
申请日:2010-09-30
申请人: Paul V. Hubner , Robert Angelo Clavenna, II , Kristopher Alan Pate , Steven Thomas Archer , Adam E. Steczko
发明人: Paul V. Hubner , Robert Angelo Clavenna, II , Kristopher Alan Pate , Steven Thomas Archer , Adam E. Steczko
IPC分类号: G06F21/00
CPC分类号: G08B25/001 , G08B13/1418
摘要: A computer-implemented method may include identifying a security event condition associated with a device. One or more security rules may be identified for execution based on the device and the identified security event condition, wherein the one or more security rules define security related actions to be performed upon occurrence of the security event condition. The security related actions may be initiated by at least one processor on the device to secure the device from unauthorized use.
摘要翻译: 计算机实现的方法可以包括识别与设备相关联的安全事件条件。 可以基于设备和所识别的安全事件条件来识别用于执行的一个或多个安全规则,其中所述一个或多个安全规则定义在安全事件条件发生时要执行的安全相关动作。 与安全相关的动作可以由设备上的至少一个处理器启动,以保护设备免受未经授权的使用。
-
公开(公告)号:US08789175B2
公开(公告)日:2014-07-22
申请号:US12894918
申请日:2010-09-30
申请人: Paul V. Hubner , Robert Angelo Clavenna, II , Kristopher Alan Pate , Steven Thomas Archer , Adam E. Steczko
发明人: Paul V. Hubner , Robert Angelo Clavenna, II , Kristopher Alan Pate , Steven Thomas Archer , Adam E. Steczko
IPC分类号: G06F21/00
CPC分类号: G08B25/001 , G08B13/1418
摘要: A computer-implemented method may include identifying a security event condition associated with a device. One or more security rules may be identified for execution based on the device and the identified security event condition, wherein the one or more security rules define security related actions to be performed upon occurrence of the security event condition. The security related actions may be initiated by at least one processor on the device to secure the device from unauthorized use.
摘要翻译: 计算机实现的方法可以包括识别与设备相关联的安全事件条件。 可以基于设备和所识别的安全事件条件来识别用于执行的一个或多个安全规则,其中所述一个或多个安全规则定义在安全事件条件发生时要执行的安全相关动作。 与安全相关的动作可以由设备上的至少一个处理器启动,以保护设备免受未经授权的使用。
-
-
-