METHOD AND APPARATUS FOR PROVIDING HETEROGENEOUS SECURITY MANAGEMENT
First Claim
Patent Images
1. A method comprising:
- acting on a request that references, at least in part, a resource, the resource associated with a network identifier;
determining whether the network identifier is listed in a secure phonebook, the secure phonebook associating the network identifier with, at least in part, a security context; and
providing the security context for one or more applications, scripts, executables, or combination thereof to determine access privileges to the resource based, at least in part, on the determination.
4 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for providing a heterogeneous security management platform to combine or integrate different applications employing different security requirements. An interface acts on a request that references, at least in part, a resource, the resource associated with a network identifier. The interface determines whether the network identifier is listed in a secure phonebook. The secure phonebook associates the network identifier with, at least in part, a security context. The interface provides the security context for one or more applications, scripts, executables, or combination thereof to determine access privileges to the resource based, at least in part, on the determination.
-
Citations
20 Claims
-
1. A method comprising:
-
acting on a request that references, at least in part, a resource, the resource associated with a network identifier; determining whether the network identifier is listed in a secure phonebook, the secure phonebook associating the network identifier with, at least in part, a security context; and providing the security context for one or more applications, scripts, executables, or combination thereof to determine access privileges to the resource based, at least in part, on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, act on a request that references, at least in part, a resource, the resource associated with a network identifier; determine whether the network identifier is listed in a secure phonebook, the secure phonebook associating the network identifier with, at least in part, a security context; and provide the security context for one or more applications, scripts, executables, or combination thereof to determine access privileges to the resource based, at least in part, on the determination. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to at least perform the following steps:
-
acting on a request that references, at least in part, a resource, the resource associated with a network identifier; determining whether the network identifier is listed in a secure phonebook, the secure phonebook associating the network identifier with, at least in part, a security context; and providing the security context for one or more applications, scripts, executables, or combination thereof to determine access privileges to the resource based, at least in part, on the determination. - View Dependent Claims (18, 19, 20)
-
Specification