Method and system for implementing a security application services provider
First Claim
1. A method of protecting an asset of an information and/or physical type, comprising the step of:
- providing processor-based physical asset protection, providing processor-based information asset protection, and integrating said processor-based physical asset protection and said processor-based information asset protection in a hosted environment.
6 Assignments
0 Petitions
Accused Products
Abstract
An asset protection system and method integrates physical asset security with information asset security in a hosted environment, or in certain circumstances in a users environment, as a security application service provider (SASP). The SASP allows customers to acquire computer-based applications for use in information security and/or asset protection, and have those applications developed, integrated, maintained and/or operated, all in a single location. The hosted environment provides security access, generates reports, triggers alerts, and performs analysis based on usage patterns. Usage patterns of repeat system users are learned, such that an anomalous usage results in corrective action, and include physical entry data, logon and logoff times for various equipment, usage periods and file access for various information technology applications, and ingress/egress operation patterns as viewed from a monitoring device. Additionally, a visitor tracking system permits access to registered visitors having authorization. The registered visitors are authenticated using biometrics.
334 Citations
29 Claims
-
1. A method of protecting an asset of an information and/or physical type, comprising the step of:
providing processor-based physical asset protection, providing processor-based information asset protection, and integrating said processor-based physical asset protection and said processor-based information asset protection in a hosted environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17, 18, 19, 24)
-
12. A system for protecting an asset, comprising:
-
a physical asset protection module that provides physical protection for said asset;
an information asset protection module that provides information security protection for said asset; and
an integrator that performs an integration of said physical asset protection module and said information asset protection module, wherein said system is one of in a hosted environment and at said asset.
-
-
20. A method of providing asset security protection, comprising:
-
transmitting a first signal to a hosted environment, said first signal comprising user registration characteristics; and
receiving a second signal from said hosted environment indicative of asset access, wherein protection of physical and information characteristics of said asset is integrated in said hosted environment. - View Dependent Claims (21, 22, 23, 25, 26, 27, 28, 29)
-
Specification