Maintaining Continuous Operational Access Augmented with User Authentication and Action Attribution in Shared Environments
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for maintaining continuous operational access augmented with user authentication and action attribution in shared environments. Multiple users use the same machine/platform to perform their actions. The system includes an access control application and enforcement module that limit users'"'"' actions based on authentication and authority level, enabling each user to perform the user'"'"'s role in the shared environment. In addition, the user'"'"'s activities can be monitored, logged, and interfered with (such as terminating the session), enabling a key requirement of action attribution.
34 Citations
60 Claims
-
1-23. -23. (canceled)
-
24. A method comprising the steps of:
-
(a) providing a user a first level of access to a shared environment; (b) receiving a first trigger while providing said first level of access; (c) providing the user a second level of access to the shared environment based on said first trigger and access rules; (d) receiving a second trigger while providing said second level of access; (e) providing the user a third level of access to the shared environment based on said second trigger and said access rules, wherein at least a pre-determined level of continuous access to the shared environment is provided to the user during transition; (i) from said first level of access to said second level of access; and (ii) from said second level of access to said third level of access. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A system comprising:
-
(a) a rules module configured to receive, store, and provide access rules; (b) a trigger module configured to receive, store, and provide triggers; (c) an enforcement module operational to control user input based on an access level, said enforcement module providing a user a first level of access to a shared environment; (d) an access control application module (ACA) operationally connected to said rules module, said trigger module, and said enforcement module, said ACA configured to; (i) receive a first trigger from said trigger module while said first level of access is being provided; (ii) based on said first trigger, receive a first access rule from said rules module; (iii) based on said first access rule, initiate said enforcement module to provide the user a second level of access to the shared environment; (iv) based on a second trigger, receive a second access rule from said rules module while said second level of access is being provided; (v) based on said second access rule, initiate said enforcement module to provide the user a third level of access to the shared environment; wherein at least a pre-determined level of continuous access to the shared environment is provided to the user during transition; (A) from said first level of access to said second level of access; and (B) from said second level of access to said third level of access. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59)
-
-
60. A computer-readable storage medium having embedded thereon computer-readable code for providing access, the computer readable code comprising program code for:
-
(a) providing a user a first level of access to a shared environment; (b) receiving a first trigger while providing said first level of access; (c) providing the user a second level of access to the shared environment based on said first trigger and access rules; (d) receiving a second trigger while providing said second level of access; (e) providing the user a third level of access to the shared environment based on said second trigger and said access rules, wherein at least a pre-determined level of continuous access to the shared environment is provided to the user during transition; (i) from said first level of access to said second level of access; and (ii) from said second level of access to said third level of access.
-
Specification