Method and Apparatus for Object Security Session Validation
First Claim
1. An apparatus comprising:
- a memory operable to;
store a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; and
store a plurality of tokens, wherein the plurality of tokens includes a session token associated with access to the resource by a device; and
a processor communicatively coupled to the memory and operable to;
receive a first token indicating that an alarm associated with the device has been triggered;
determine, based at least in part upon at least one token-based rule from the plurality of token-based rules, that access to the resource should be terminated in response to receiving the first token; and
terminate the session token in response to the determination that access to the resource should be terminated.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule may facilitate access to a resource. The apparatus may further store a plurality of tokens. The plurality of tokens may include a session token associated with access to the resource by a device. The apparatus may receive a first token indicating that an alarm associated with the device has been triggered. The apparatus may determine, based at least in part upon at least one token-based rule from the plurality of token-based rules, that access to the resource should be terminated in response to receiving the first token and terminate the session token in response to the determination that access to the resource should be terminated.
2 Citations
33 Claims
-
1. An apparatus comprising:
-
a memory operable to; store a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; and store a plurality of tokens, wherein the plurality of tokens includes a session token associated with access to the resource by a device; and a processor communicatively coupled to the memory and operable to; receive a first token indicating that an alarm associated with the device has been triggered; determine, based at least in part upon at least one token-based rule from the plurality of token-based rules, that access to the resource should be terminated in response to receiving the first token; and terminate the session token in response to the determination that access to the resource should be terminated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
storing, by a memory, a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; storing, by the memory, a plurality of tokens, wherein the plurality of tokens includes a session token associated with access to the resource by a device; receiving, by a processor communicatively coupled to the memory, a first token indicating that an alarm associated with the device has been triggered; determining, by the processor, based at least in part upon at least one token-based rule from the plurality of token-based rules, that access to the resource should be terminated in response to receiving the first token; and terminating, by the processor, the session token in response to the determination that access to the resource should be terminated. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
store a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; store a plurality of tokens, wherein the plurality of tokens includes a session token associated with access to the resource by a device; receive a first token indicating that an alarm associated with the device has been triggered; determine, based at least in part upon at least one token-based rule from the plurality of token-based rules, that access to the resource should be terminated in response to receiving the first token; and terminate the session token in response to the determination that access to the resource should be terminated. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification