Managing security restrictions on a resource in a defined environment
First Claim
1. A method for managing security restrictions on a resource in a defined environment, the method comprising the computer-implemented steps of:
- maintaining a security restriction on a resource in a defined environment;
monitoring a presence of a plurality of users in the defined environment;
detecting a pre-specified set of users from the plurality of users in the defined environment;
allowing access to the resource by removing the security restriction on the resource; and
reinstating the security restriction on the resource in the case that the detected pre-specified set of users is no longer within a maximum and a minimum number of users of the defined environment.
1 Assignment
0 Petitions
Accused Products
Abstract
Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system allows access to the resource by removing the security restriction on the resource. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.
-
Citations
18 Claims
-
1. A method for managing security restrictions on a resource in a defined environment, the method comprising the computer-implemented steps of:
-
maintaining a security restriction on a resource in a defined environment; monitoring a presence of a plurality of users in the defined environment; detecting a pre-specified set of users from the plurality of users in the defined environment; allowing access to the resource by removing the security restriction on the resource; and reinstating the security restriction on the resource in the case that the detected pre-specified set of users is no longer within a maximum and a minimum number of users of the defined environment. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for managing security restrictions on a resource in a defined environment, the system comprising:
-
a memory medium comprising instructions; a bus coupled to the memory medium; and a processor coupled to a security system via the bus that when executing the instructions causes the system to; maintain a security restriction on a resource in a defined environment; monitor a presence of a plurality of users in the defined environment; detect a pre-specified set of users from the plurality of users in the defined environment; allow access to the resource by removing the security restriction on the resource; and reinstate the security restriction on the resource in the case that the detected pre-specified set of users is no longer within a maximum and a minimum number of users of the defined environment. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-readable storage device storing computer instructions, which when executed, enables a computer system to manage security restrictions on a resource in a defined environment, the computer instructions comprising:
-
maintaining a security restriction on a resource in a defined environment; monitoring a presence of a plurality of users in the defined environment; detecting a pre-specified set of users from the plurality of users in the defined environment; allowing access to the resource by removing the security restriction on the resource; and reinstating the security restriction on the resource in the case that the detected pre-specified set of users is no longer within a maximum and a minimum number of users of the defined environment. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification