Security Process Model for Tasks Within a Software Factory
First Claim
Patent Images
1. A computer-implemented method for preventing unauthorized activity within a software factory, the computer-implemented method comprising:
- detecting a request by a user to utilize a software factory;
in response to authenticating the user as being authorized to utilize the software factory, granting the user permission to access specific areas of the software factory for which the user is specifically authorized;
maintaining a log of locations in the software factory that have been accessed by the user; and
utilizing the log to audit an effectiveness of the software factory in creating deliverable software.
2 Assignments
0 Petitions
Accused Products
Abstract
Security for a software factory is provided by detecting a request by a user to utilize the software factory. Upon being authenticated, the user is granted permission to access specific areas of the software factory. A log is created of locations in software factory that have been accessed by the user. This log is then utilized in an audit that describes how effective the software factory is in creating deliverable software.
-
Citations
20 Claims
-
1. A computer-implemented method for preventing unauthorized activity within a software factory, the computer-implemented method comprising:
-
detecting a request by a user to utilize a software factory; in response to authenticating the user as being authorized to utilize the software factory, granting the user permission to access specific areas of the software factory for which the user is specifically authorized; maintaining a log of locations in the software factory that have been accessed by the user; and utilizing the log to audit an effectiveness of the software factory in creating deliverable software. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor; a data bus coupled to the processor; a memory coupled to the data bus; and a computer-usable medium embodying computer program code, the computer program code comprising instructions executable by the processor and configured for preventing unauthorized activity within a software factory by performing the steps of; detecting a request by a user to utilize a software factory; in response to authenticating the user as being authorized to utilize the software factory, granting the user permission to access specific areas of the software factory for which the user is specifically authorized; maintaining a log of locations in the software factory that have been accessed by the user; and utilizing the log to audit an effectiveness of the software factory in creating deliverable software. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-readable medium encoded with a computer program, the computer program comprising computer executable instructions configured for:
-
detecting a request by a user to utilize a software factory; in response to authenticating the user as being authorized to utilize the software factory, granting the user permission to access specific areas of the software factory for which the user is specifically authorized; maintaining a log of locations in the software factory that have been accessed by the user; and utilizing the log to audit an effectiveness of the software factory in creating deliverable software. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification