TARGETED SECURITY POLICY OVERRIDE
First Claim
Patent Images
1. A method, comprising:
- gathering, with an information handling device, client system identification data of a client system;
providing, with the information handling device, the client system with at least one cryptographic key;
transmitting, with the information handling device, the client system identification data and a request for security policy override to a third party;
receiving, with the information handling device, encrypted approval data from the third party; and
transmitting, with the information handling device, encrypted approval data to the client system.
2 Assignments
0 Petitions
Accused Products
Abstract
An aspect provides a method, including: gathering, with an information handling device, client system identification data of a client system; providing, with the information handling device, the client system with at least one cryptographic key; transmitting, with the information handling device, the client system identification data and a request for security policy override to a third party; receiving, with the information handling device, encrypted approval data from the third party; and transmitting, with the information handling device, encrypted approval data to the client system. Other aspects are described and claimed.
-
Citations
20 Claims
-
1. A method, comprising:
-
gathering, with an information handling device, client system identification data of a client system; providing, with the information handling device, the client system with at least one cryptographic key; transmitting, with the information handling device, the client system identification data and a request for security policy override to a third party; receiving, with the information handling device, encrypted approval data from the third party; and transmitting, with the information handling device, encrypted approval data to the client system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 20)
-
-
10. An information handling device, comprising:
-
one or more processors; and a memory operatively coupled to the one or more processors that stores instructions executable by the one or more processors to perform acts comprising; gathering client system identification data of a client system; providing the client system with at least one cryptographic key; transmitting the client system identification data and a request for security policy override to a third party; receiving encrypted approval data from the third party; and transmitting encrypted approval data to the client system. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A program product, comprising:
-
a storage medium having computer program code embodied therewith, the computer program code comprising; computer program code configured to gather, with an information handling device, client system identification data of a client system; computer program code configured to provide, with the information handling device, the client system with at least one cryptographic key; computer program code configured to transmit, with the information handling device, the client system identification data and a request for security policy override to a third party; computer program code configured to receive, with the information handling device, encrypted approval data from the third party; and computer program code configured to transmit, with the information handling device, encrypted approval data to the client system.
-
Specification