Secure access management of devices
First Claim
Patent Images
1. An apparatus comprising a hardware processor to implement:
- a security module driver to issue a first device lock instruction to lock a peripheral device based on a predetermined period of user inactivity,a user presence logic to determine that a user is no longer present, anda subscription logic to,receive an indication that the user is no longer present,set a period, in response to the indication that the user is no longer present, to issue a second device lock instruction to lock the peripheral device, andissue the second device lock instruction to lock the peripheral device in response to expiration of the period and a determination that the first device lock instruction to lock the peripheral device, which has issued, has not resulted in the lock of the peripheral device.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods may provide implementing one or more device locking procedures to block access to a device. In one example, the method may include receiving an indication that a user is no longer present, initiating a timing mechanism to set a period to issue a first device lock instruction to lock a peripheral device, relaying timing information from the timing mechanism to a controller module associated with the peripheral device; and locking the peripheral device upon expiration of the period.
-
Citations
20 Claims
-
1. An apparatus comprising a hardware processor to implement:
-
a security module driver to issue a first device lock instruction to lock a peripheral device based on a predetermined period of user inactivity, a user presence logic to determine that a user is no longer present, and a subscription logic to, receive an indication that the user is no longer present, set a period, in response to the indication that the user is no longer present, to issue a second device lock instruction to lock the peripheral device, and issue the second device lock instruction to lock the peripheral device in response to expiration of the period and a determination that the first device lock instruction to lock the peripheral device, which has issued, has not resulted in the lock of the peripheral device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one non-transitory computer readable storage medium comprising a set of instructions which, if executed by a processor, cause a computer to:
-
receive an indication that a user is no longer present; set a period, in response to the indication that the user is no longer present, to issue a second device lock instruction to lock a peripheral device; and issue the second device lock instruction to lock the peripheral device in response to expiration of the period and a determination that a first device lock instruction to lock the peripheral device, which has issued, has not resulted in a lock of the peripheral device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
implementing a sensor to determine that a user is no longer present; and implementing a hardware processor to; receive an indication that the user is no longer present; set a period, in response to the indication that the user is no longer present, to issue a second device lock instruction to lock a peripheral device; and issue the second device lock instruction to lock the peripheral device in response to expiration of the period and a determination that a first device lock instruction to lock the peripheral device, which has issued, has not resulted in a lock of the peripheral device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification