Graphical user interface privacy, security and anonymization
First Claim
1. A method for restricting and anonymizing a graphical user interface for a remote access session, the method comprising:
- receiving a remote access request, from a third party, to fix a problem associated with a client computer;
determining the problem associated with the client computer;
determining a plurality of appropriate permissions for the graphical user interface of the client computer for fixing the determined problem,wherein the determined plurality of appropriate permissions is structured based on the determined problem by a plurality of error messages,wherein the plurality of error messages includes one or more sets of if-then protocols,wherein determining a plurality of sensitive data is determined within the graphical user interface based on the determined plurality of appropriate permissions,wherein the determined plurality of sensitive data is anonymized;
presenting the determined problem and the determined plurality of appropriate permissions to a user;
wherein the determined plurality of restricted graphical user interface panels includes a minimum access level for a third party to fix the determined problem; and
receiving a user confirmation,wherein the user confirmation indicates the user agrees with the determined problem.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, computer system, and a computer program product for restricting and anonymizing a graphical user interface for a remote access session is provided. The present invention may include receiving a remote access request, from a third party, to fix a problem associated with a client computer. The present invention may also include determining the problem associated with the client computer utilizing a cognitive processing system. The present invention may then include determining a plurality of appropriate permissions for the graphical user interface of the client computer for fixing the determined problem utilizing the cognitive processing system. The present invention may further include presenting the determined problem and the determined plurality of appropriate permissions to a user. The present invention may also include receiving a user confirmation, wherein the user confirmation indicates the user agrees with the determined problem.
-
Citations
20 Claims
-
1. A method for restricting and anonymizing a graphical user interface for a remote access session, the method comprising:
-
receiving a remote access request, from a third party, to fix a problem associated with a client computer; determining the problem associated with the client computer; determining a plurality of appropriate permissions for the graphical user interface of the client computer for fixing the determined problem, wherein the determined plurality of appropriate permissions is structured based on the determined problem by a plurality of error messages, wherein the plurality of error messages includes one or more sets of if-then protocols, wherein determining a plurality of sensitive data is determined within the graphical user interface based on the determined plurality of appropriate permissions, wherein the determined plurality of sensitive data is anonymized;
presenting the determined problem and the determined plurality of appropriate permissions to a user;wherein the determined plurality of restricted graphical user interface panels includes a minimum access level for a third party to fix the determined problem; and receiving a user confirmation, wherein the user confirmation indicates the user agrees with the determined problem. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for restricting and anonymizing a graphical user interface for a remote access session, comprising:
-
one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage medium, and program instructions stored on at least one of the one or more tangible storage medium for execution by at least one of the one or more processors via at least one of the one or more memories, wherein the computer system is capable of performing a method comprising; receiving a remote access request, from a third party, to fix a problem associated with a client computer; determining the problem associated with the client computer;
determining a plurality of appropriate permissions for the graphical user interface of the client computer for fixing the determined problem,wherein the determined plurality of appropriate permissions is structured based on the determined problem by a plurality of error messages, wherein the plurality of error messages includes one or more sets of if-then protocols, wherein determining a plurality of sensitive data is determined within the graphical user interface based on the determined plurality of appropriate permissions, wherein the determined plurality of sensitive data is anonymized; presenting the determined problem and the determined plurality of appropriate permissions to a user; wherein the determined plurality of restricted graphical user interface panels includes a minimum access level for a third party to fix the determined problem; and receiving a user confirmation, wherein the user confirmation indicates the user agrees with the determined problem. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product for restricting and anonymizing a graphical user interface for a remote access session, comprising:
-
one or more computer-readable storage medium and program instructions stored on at least one of the one or more tangible storage medium, the program instructions executable by a processor, the program instructions comprising; program instructions to receive a remote access request, from a third party, to fix a problem associated with a client computer; program instructions to determine the problem associated with the client computer; program instructions to determine a plurality of appropriate permissions for the graphical user interface of the client computer for fixing the determined problem, wherein the determined plurality of appropriate permissions is structured based on the determined problem by a plurality of error messages, wherein the plurality of error messages includes one or more sets of if-then protocols, wherein determining a plurality of sensitive data is determined within the graphical user interface based on the determined plurality of appropriate permissions, wherein the determined plurality of sensitive data is anonymized; program instructions to present the determined problem and the determined plurality of appropriate permissions to a user; wherein the determined plurality of restricted graphical user interface panels includes a minimum access level for a third party to fix the determined problem; and program instructions to receive a user confirmation, wherein the user confirmation indicates the user agrees with the determined problem. - View Dependent Claims (18, 19, 20)
-
Specification