Method and apparatus for presence based resource management
First Claim
Patent Images
1. A method of managing a user'"'"'s access to network resources, comprising:
- receiving, from a computer over a network, first presence data of a user logged into the computer;
receiving a first network request by the logged in user from the computer for first resources external to the computer;
executing instructions on computer hardware to determine a first resource control policy to apply to the first network request based on the first presence data;
executing instructions on computer hardware to apply the first resource control policy to the first network request;
receiving, from the computer over the network, second presence data of the logged in user of the computer;
receiving a second network request by the logged in user from the computer for second resources external to the computer;
executing instructions on computer hardware to determine a second resource control policy to apply to the second network request based on the second presence data; and
executing instructions on computer hardware to apply the second resource control policy to the second network request,wherein the first and second presence data indicate at least one of;
(a) a first and second ambient light level at the computer, (b) first and second font sizes displayed on the user'"'"'s computer, (c) first and second contrast levels displayed on the user'"'"'s computer, and (d) first and second indications respectively of whether a privacy shield is installed on the user'"'"'s display and wherein the first and second resource control policies are determined based on the first and second presence data.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus provide resource authorization based on a computer'"'"'s presence information. Presence information may include information relating to a computer'"'"'s operating environment. In some implementations, a presence detector on a computer determines presence information and provides the information to a resource manager. The computer may then generate a resource access request. A resource manager may then determine whether the resource request is authorized based, at least in part, on the presence information. The resource manager then responds to the resource access request, either granting or denying the request for resources.
-
Citations
12 Claims
-
1. A method of managing a user'"'"'s access to network resources, comprising:
-
receiving, from a computer over a network, first presence data of a user logged into the computer; receiving a first network request by the logged in user from the computer for first resources external to the computer; executing instructions on computer hardware to determine a first resource control policy to apply to the first network request based on the first presence data; executing instructions on computer hardware to apply the first resource control policy to the first network request; receiving, from the computer over the network, second presence data of the logged in user of the computer; receiving a second network request by the logged in user from the computer for second resources external to the computer; executing instructions on computer hardware to determine a second resource control policy to apply to the second network request based on the second presence data; and executing instructions on computer hardware to apply the second resource control policy to the second network request, wherein the first and second presence data indicate at least one of;
(a) a first and second ambient light level at the computer, (b) first and second font sizes displayed on the user'"'"'s computer, (c) first and second contrast levels displayed on the user'"'"'s computer, and (d) first and second indications respectively of whether a privacy shield is installed on the user'"'"'s display and wherein the first and second resource control policies are determined based on the first and second presence data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus, comprising:
-
a memory; one or more electronic hardware processors, configured to fetch instructions from the memory; and a network interface, operatively coupled to the one or more electronic hardware processors, wherein the memory stores instructions that configure the one or more processors to perform a method of managing a computer'"'"'s access to network resources, the method comprising; receiving, from the computer over a network, first presence data of a logged in user of the computer; receiving a first network request by the logged in user from the computer for first resources external to the computer; determining a first resource control policy to apply to the first network request by the logged in user based on the first presence data; applying the first resource control policy to the first network request; receiving, from the computer over the network, second presence data of the logged in user of the computer; receiving a second network request by the logged in user from the computer for second resources external to the computer; determining a second resource control policy to apply to the second network request based on the second presence data; and applying the second resource control policy to the second network request, wherein the first and second presence data indicate at least one of;
(a) a first and second ambient light level at the computer, (b) first and second font sizes displayed on the user'"'"'s computer, (c) first and second contrast levels displayed on the user'"'"'s computer, and (d) first and second indications respectively of whether a privacy shield is installed on the user'"'"'s display and wherein the first and second resource control policies are determined based on the first and second presence data.
-
-
12. A non-transitory computer readable storage medium comprising instructions that when executed cause one or more processors to perform a method of managing a user'"'"'s access to network resources, the method comprising:
-
receiving, from a computer and over a network, first presence data of a logged in user of the computer; receiving a first network request by the logged in user from the computer for first resources external to the computer; determining a first resource control policy to apply to the first network request by the logged in user for the first resources external to the computer based on the first presence data; applying the first resource control policy to the first network request; receiving, from the computer over the network, second presence data of the logged in user of the computer; receiving a second network request by the logged in user from the computer for second resources external to the computer; determining a second resource control policy to apply to the second network request by the logged in user based on the second presence data; and applying the second resource control policy to the second network request, wherein the first and second presence data indicate at least one of;
(a) a first and second ambient light level at the computer, (b) first and second font sizes displayed on the user'"'"'s computer, (c) first and second contrast levels displayed on the user'"'"'s computer, and (d) first and second indications respectively of whether a privacy shield is installed on the user'"'"'s display and wherein the first and second resource control policies are determined based on the first and second presence data.
-
Specification