User presence detection for altering operation of a computing system
First Claim
1. A method for enhancing security of a computer when a user is detected to be absent comprising the steps of:
- detecting an absence of a user from a computer system; and
disabling at least one system port or service on the computer system that does not need to be enabled while the user is absent to increase a security state of the computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
Various technologies and techniques are disclosed that modify a computer system based on user presence detection. An input device detects whether a user is present and adjusts the operation of an application accordingly. For example, ports or services can be disabled to increase security, a logging operation can be increased, a port or service that was previously disabled can be enabled, at least one system feature based on a number of users present can be adjusted, etc. If the user is detected to be absent, for example, then the system can disable at least one system port or service that does not need to be enabled while the user is absent to increase the security state of the computer. An attack directory can be accessed to retrieve information about the most likely services to be attacked, and that information can be used to help determine what services to disable.
61 Citations
20 Claims
-
1. A method for enhancing security of a computer when a user is detected to be absent comprising the steps of:
-
detecting an absence of a user from a computer system; and disabling at least one system port or service on the computer system that does not need to be enabled while the user is absent to increase a security state of the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable medium having computer-executable instructions for causing a computer to perform steps comprising:
-
use at least one input device to detect whether one or more users are present; access an attack directory to retrieve information that includes at least one most likely service to be attacked; and use at least part of the information retrieved from the attack directory along with the detection of whether one or more users are present to make at least one adjustment to a system operation. - View Dependent Claims (13, 14)
-
-
15. A method for adjusting the operation of a computer based on a classification of a user present comprising the steps of:
-
using at least one input device to detect that at least one user is present; determining a classification associated with the at least one user present; and adjusting an operation of at least one application based on the classification of the at least one user present. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification