Method and system for dynamic adjustment of computer security based on network activity of users
First Claim
1. A computer-implemented method for securing operations with respect to a set of computational resources in a data processing system, the method comprising:
- employing computational resources on a first computational device that is being used by a first user, wherein a first user security level indicating value is associated with the first user;
employing computational resources on a second computational device that is being used by a second user, wherein a second user security level indicating-value is associated with the second user; and
automatically reconfiguring the computational resources on the first computational device based on the second user security level indicating value of the second user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level.
-
Citations
20 Claims
-
1. A computer-implemented method for securing operations with respect to a set of computational resources in a data processing system, the method comprising:
-
employing computational resources on a first computational device that is being used by a first user, wherein a first user security level indicating value is associated with the first user;
employing computational resources on a second computational device that is being used by a second user, wherein a second user security level indicating-value is associated with the second user; and
automatically reconfiguring the computational resources on the first computational device based on the second user security level indicating value of the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product on a computer-readable storage medium for securing operations with respect to a set of computational resources in a data processing system, the computer program product comprising:
-
means for employing computational resources on a first computational device that is being used by a first user, wherein a first user security level indicating value is associated with the first user;
means for employing computational resources on a second computational device that is being used by a second user, wherein a second user security level indicating value is associated with the second user; and
means for automatically reconfiguring the computational resources on the first computational device based on the second user security level indicating value of the second user. - View Dependent Claims (14, 15, 16, 17)
-
-
18. An apparatus for securing operations with respect to a set of computational resources in a data processing system, the apparatus comprising:
-
means for employing computational resources on a first computational device that is being used by a first user, wherein a first user security level indicating value is associated with the first user;
means for employing computational resources on a second computational device that is being used by a second user, wherein a second user security level indicating value is associated with the second user; and
means for automatically reconfiguring the computational resources on the first computational device based on the second user security level indicating value of the second user. - View Dependent Claims (19, 20)
-
Specification