Method and system to control access to a secure asset via an electronic communications network
First Claim
1. A method for providing security to an asset of an information technology network, the method comprising:
- a. assigning the asset as a member of a first user group, wherein each member of the first user group interact with the information technology network in accordance with a first user group policy set;
b. merging the first user group policy set with an alternate set of policies of an alternate user group to form a derivative user group policy set; and
d. enabling each member of the alternate user group to interact with the information technology network in accordance with the derivative user group policy set.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for enabling a secure electronic network communications asset is provided. A computational engine networked with an electronic communications is configured to comprise a network endpoint. One, two or a group of particular applications or network services enabled by that endpoint are identified as an addressable secure asset. Policies are established and implemented to limit interactivity between the secure asset and any communications interface to which the asset is connected. The endpoint is configured to be accessible by one or more specific user groups under possibly unique sets policies assigned to each user group. Any network endpoint must be a member of one at least user group in order to access the secure asset and must abide by the policies imposed by the secure asset onto the including user group.
46 Citations
21 Claims
-
1. A method for providing security to an asset of an information technology network, the method comprising:
-
a. assigning the asset as a member of a first user group, wherein each member of the first user group interact with the information technology network in accordance with a first user group policy set;
b. merging the first user group policy set with an alternate set of policies of an alternate user group to form a derivative user group policy set; and
d. enabling each member of the alternate user group to interact with the information technology network in accordance with the derivative user group policy set.
-
-
2. A method for controlling access to a secure asset of an information technology network, the method comprising:
-
a. assigning at least one user as a member of a first user group, wherein each member of the first user group is enabled to interact with the information technology network according to a first user group policy set;
b. assigning the secure asset to a second user group, wherein each member of the second user group is enabled to interact with the information technology network according to a second user group policy set;
c. forming a derivative user group, the derivative user group including all members of the second user group, wherein each member of the derivative user group may interact with the information technology network to access the secure asset in accordance with the first user group policy set and the second user group policy set. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computational system, the system communicatively coupled with an asset of an information technology network, the system comprising:
-
a. means to assign at least one user as a member of a first user group, wherein each member of the first user group is enabled to interact with the information technology network according to a first user group policy set;
b. means to assign the secure asset to a second user group, wherein each member of the second user group is enabled to interact with the information technology network according to a second user group policy set, c. means to form a derivative user group, the derivative user group including all members of the second user group, wherein each member of the derivative user group may interact with the information technology network to access the secure asset in accordance with the first user group policy set and the second user group policy set. - View Dependent Claims (18, 19, 20)
-
-
21. A method for managing the security provided to a secure asset by permitting a query of the access allowed by any individual user based on membership in a user group policy set.
Specification