System and method for recovering a security profile of a computer system
First Claim
1. A computer system comprising:
- memory; and
a security application configured to lock down resources of said computer system by modifying a machine state of said computer system in response to a request for activating a first security profile, said security application configured to store data indicative of said machine state in said memory in response to said request for activating said first security profile, said security application configured to modify said machine state in response to a request for activating a second security profile, said security application configured to retrieve said data in response to a request for recovering said first security profile and to modify said machine state based on said retrieved data.
9 Assignments
0 Petitions
Accused Products
Abstract
A system for recovering previously activated security profiles utilizes memory and a security application. Initially, the security application enables a user to define a first security profile. After defining the first security profile, the user submits a request for activating the first security profile, and in response, the security application modifies a machine state of the computer system. The modification of the machine state in response to this request locks down the computer system, thereby implementing the first security profile defined by the user. Also in response to the request for activating the first security profile, the security application stores, in the memory, data indicative of the machine state so that the first security profile can be again implemented at a later time, if desired. In this regard, after causing a different security profile to be implemented by the computer system, a user may submit a request for changing the security profile of the computer system back to the first security profile. In response to such a request, the security application retrieves the data previously stored in the memory and automatically modifies the machine state so that the first security profile is again implemented by the computer system. As a result, any changes made to the security profile of the computer system since the submission of the aforementioned request for activating the first security profile are effectively nullified.
-
Citations
14 Claims
-
1. A computer system comprising:
-
memory; and
a security application configured to lock down resources of said computer system by modifying a machine state of said computer system in response to a request for activating a first security profile, said security application configured to store data indicative of said machine state in said memory in response to said request for activating said first security profile, said security application configured to modify said machine state in response to a request for activating a second security profile, said security application configured to retrieve said data in response to a request for recovering said first security profile and to modify said machine state based on said retrieved data. - View Dependent Claims (2, 3, 4)
-
-
5. A computer system, comprising:
-
memory; and
a security application defining a plurality of rules, said security application configured to enable a user to select a set of said rules for enforcement by said computer system, said security application configured to lock down said computer system by causing said computer system to enforce said selected set of rules in response to an activation request, said security application further configured to store data identifying said selected set in response to said activation request, said security application configured to change which of said plurality of rules are enforced by said computer system based on inputs to said computer system, said security application configured to retrieve said data in response to a user request and to automatically identify said set of rules based on said retrieved data, said security application further configured to cause said computer system to enforce said identified rules in response to said user request. - View Dependent Claims (6, 7)
-
-
8. A computer system comprising:
-
means for storing data; and
means for locking down resources of said computer system by modifying a machine state of said computer system in response to a request for activating a first security profile, said locking down means including a means for storing security profile data indicative of said machine state in said memory in response to said request for activating said first security profile, said locking down means including a means for modifying said machine state in response to a request for activating a second security profile, said locking down means including a means for retrieving said security profile data in response to a request for recovering said first security profile and for modifying said machine state based on said retrieved data.
-
-
9. A method for locking down resources of a computer system, comprising the steps of:
-
receiving a request for activating a first security profile;
modifying a machine state of said computer system in response to said request for activating said first security profile;
storing data indicative of said machine state in response to said request for activating said first security profile;
modifying said machine state in response to a request for activating a second security profile;
retrieving said data in response to a request for recovering said first security profile; and
modifying said machine state based on said retrieved data in response to said request for recovering said first security profile. - View Dependent Claims (10, 11, 12, 14)
-
-
13. A method for locking down resources of a computer system, comprising the steps of:
-
defining a plurality of rules for locking down said computer system;
receiving an input from a user of said computer system;
selecting a set of said rules based on said input;
causing said computer system to enforce said selected set of rules in response to an activation request;
storing data identifying said selected set of rules in response to said activation request;
changing which of said plurality of rules are enforced by said computer system;
retrieving said data in response to a user request;
automatically identifying said selected set of rules based on said retrieved data, and causing said computer system to enforce said selected set of rules in response to said user request.
-
Specification