Managing security restrictions on a resource in a defined environment
    1.
    发明授权
    Managing security restrictions on a resource in a defined environment 有权
    在定义的环境中管理资源的安全限制

    公开(公告)号:US09253179B2

    公开(公告)日:2016-02-02

    申请号:US14091730

    申请日:2013-11-27

    发明人: Mark J. Hoesl

    IPC分类号: H04L9/32 H04L29/06 G06F21/62

    摘要: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system removes the security restriction from the resource to allow at least one of: access to the IT account of the user, and operation of the apparatus. The security restriction on the resource may then be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.

    摘要翻译: 在此描述的方法管理在定义的环境中的资源的安全限制,以提供授权和访问。 具体地说,安全系统在定义的环境中维护资源(例如,用户的信息技术(IT)帐户或设备)的安全限制)。 在整个定义的环境中连续地监视多个用户的存在,并且基于在定义的环境中从多个用户中预先指定的一组用户的检测,管理安全限制(例如,移除或维护) 。 在一个实施例中,系统从资源中移除安全限制,以允许访问用户的IT帐户和设备的操作中的至少一个。 在来自多个用户的预先指定的一组用户不再存在于定义的环境中的情况下,可以恢复资源上的安全限制。

    MANAGING SECURITY RESTRICTIONS ON A RESOURCE IN A DEFINED ENVIRONMENT
    2.
    发明申请
    MANAGING SECURITY RESTRICTIONS ON A RESOURCE IN A DEFINED ENVIRONMENT 有权
    管理定义环境资源的安全限制

    公开(公告)号:US20160080388A1

    公开(公告)日:2016-03-17

    申请号:US14950013

    申请日:2015-11-24

    发明人: Mark J. Hoesl

    IPC分类号: H04L29/06

    摘要: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system removes the security restriction from the resource to allow at least one of: access to the IT account of the user, and operation of the apparatus. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.

    摘要翻译: 在此描述的方法管理在定义的环境中的资源的安全限制,以提供授权和访问。 具体地说,安全系统在定义的环境中维护资源(例如,用户的信息技术(IT)帐户或设备)的安全限制)。 在整个定义的环境中连续地监视多个用户的存在,并且基于在定义的环境中从多个用户中预先指定的一组用户的检测,管理安全限制(例如,移除或维护) 。 在一个实施例中,系统从资源中移除安全限制,以允许访问用户的IT帐户和设备的操作中的至少一个。 在来自多个用户的预定用户组不再存在于定义的环境中的情况下,资源的安全限制可以被恢复。

    MANAGING SECURITY RESTRICTIONS ON A RESOURCE IN A DEFINED ENVIRONMENT

    公开(公告)号:US20170302674A1

    公开(公告)日:2017-10-19

    申请号:US15641420

    申请日:2017-07-05

    发明人: Mark J. Hoesl

    IPC分类号: H04L29/06 G06F21/62

    摘要: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system allows access to the resource by removing the security restriction on the resource. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.

    Managing security restrictions on a resource in a defined environment

    公开(公告)号:US10348733B2

    公开(公告)日:2019-07-09

    申请号:US15641420

    申请日:2017-07-05

    发明人: Mark J. Hoesl

    IPC分类号: H04L29/06 G06F21/62

    摘要: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system allows access to the resource by removing the security restriction on the resource. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.

    Managing security restrictions on a resource in a defined environment

    公开(公告)号:US09781121B2

    公开(公告)日:2017-10-03

    申请号:US14950013

    申请日:2015-11-24

    发明人: Mark J. Hoesl

    IPC分类号: H04L9/32 H04L29/06 G06F21/62

    摘要: Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system removes the security restriction from the resource to allow at least one of: access to the IT account of the user, and operation of the apparatus. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.