PHYSICAL SECURITY TRIGGERED DYNAMIC NETWORK AUTHENTICATION AND AUTHORIZATION
First Claim
1. A system that facilitates management of information in a network, comprising:
- a unified access control component that can generate and enforce one or more network access policies associated with the network; and
a dynamic authentication component that is associated with the unified access control component and, after a subset of network access privileges have been granted to the user, requests re-authentication of the user if at least one of network access information or physical location information, or a combination thereof, indicates a change in at least one of physical location or network access privileges, or a combination thereof.
1 Assignment
0 Petitions
Accused Products
Abstract
A unified access control component (UACC) can maintain information relating to network access information and physical location information associated with respective users who may access a network that can include network resources (e.g., applications, information). The UACC can cross reference the network access information (e.g., user network access events, credentials, and policy) and physical location information (e.g., user physical access events, credentials, and policy) and can generate and enforce a unified network access policy based on network access information and physical location information associated with a particular user. After network access privileges have been granted to a user, the UACC can continue to monitor the user. The UACC can include a dynamic authentication component that can request a user re-authenticate if a change in the physical location and/or network access associated with the user is detected, such that a re-computation of network access privileges is desired.
-
Citations
20 Claims
-
1. A system that facilitates management of information in a network, comprising:
-
a unified access control component that can generate and enforce one or more network access policies associated with the network; and a dynamic authentication component that is associated with the unified access control component and, after a subset of network access privileges have been granted to the user, requests re-authentication of the user if at least one of network access information or physical location information, or a combination thereof, indicates a change in at least one of physical location or network access privileges, or a combination thereof. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for managing access to resources in a network, comprising:
-
monitoring at least one of network access information or physical access information, or a combination thereof, associated with a user who has been authenticated and granted access to a subset of the resources in the network; and dynamically requesting re-authentication of the user, if, after the user is granted access to the subset of the resources, a change is detected relating to at least one of network access information or physical access information, or a combination thereof, associated with the user. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A system for managing access to information in a network, comprising:
-
means for monitoring network access, associated with the network, of a user who has been previously authenticated and granted network access privileges to a subset of the information in the network; means for monitoring physical access associated with the user; and means for dynamically requesting re-authentication of the user upon detecting a change in at least one of physical access or network access, or a combination thereof, associated with the user. - View Dependent Claims (20)
-
Specification