TEMPORARY AUTHORIZATIONS TO ACCESS A COMPUTING SYSTEM BASED ON USER SKILLS
First Claim
1. A computer-implemented method of controlling access to a computing system, the computer-implemented method comprising:
- receiving an escalation request for performing a protected activity on the computing system by a user not authorized to perform the protected activity;
retrieving at least one activity indicator being indicative of a skill required to perform the protected activity;
retrieving at least one user indicator being indicative of skill possessed by the user;
determining an indication of a capability of the user to perform the protected activity according to a comparison between said at least one activity indicator and said at least one user indicator; and
granting or denying to the user according to the capability thereof a temporary authorization for performing the protected activity, the temporary authorization lasting for a limited time window.
1 Assignment
0 Petitions
Accused Products
Abstract
Controlling access to a computing system. An escalation request is received for performing a protected activity on the computing system by a user not authorized to perform the protected activity. At least one activity indicator being indicative of a skill required to perform the protected activity is retrieved. At least one user indicator being indicative of the skill possessed by the user is retrieved. An indication of a capability of the user to perform the protected activity according to a comparison between the at least one activity indicator and the at least one user indicator is determined. A temporary authorization for performing the protected activity to the user according to the capability thereof is granted or denied. The temporary authorization lasts for a limited time window.
23 Citations
20 Claims
-
1. A computer-implemented method of controlling access to a computing system, the computer-implemented method comprising:
-
receiving an escalation request for performing a protected activity on the computing system by a user not authorized to perform the protected activity; retrieving at least one activity indicator being indicative of a skill required to perform the protected activity; retrieving at least one user indicator being indicative of skill possessed by the user; determining an indication of a capability of the user to perform the protected activity according to a comparison between said at least one activity indicator and said at least one user indicator; and granting or denying to the user according to the capability thereof a temporary authorization for performing the protected activity, the temporary authorization lasting for a limited time window. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system for controlling access to a computing system, the computer system comprising:
-
a memory; and a processor in communication with the memory, wherein the computer system is configured to perform a method, said method comprising; receiving an escalation request for performing a protected activity on the computing system by a user not authorized to perform the protected activity; retrieving at least one activity indicator being indicative of a skill required to perform the protected activity; retrieving at least one user indicator being indicative of skill possessed by the user; determining an indication of a capability of the user to perform the protected activity according to a comparison between said at least one activity indicator and said at least one user indicator; and granting or denying to the user according to the capability thereof a temporary authorization for performing the protected activity, the temporary authorization lasting for a limited time window. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer program product for controlling access to a computing system, the computer program product comprising:
a computer readable storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising; receiving an escalation request for performing a protected activity on the computing system by a user not authorized to perform the protected activity; retrieving at least one activity indicator being indicative of a skill required to perform the protected activity; retrieving at least one user indicator being indicative of skill possessed by the user; determining an indication of a capability of the user to perform the protected activity according to a comparison between said at least one activity indicator and said at least one user indicator; and granting or denying to the user according to the capability thereof a temporary authorization for performing the protected activity, the temporary authorization lasting for a limited time window. - View Dependent Claims (16, 17, 18, 19, 20)
Specification