METHODS AND SYSTEMS OF DUAL-LAYER COMPUTER-SYSTEM SECURITY
First Claim
1. A computerized method for implementing dual-layer computer-system security in a private enterprise computer network comprising:
- generating a user profile, wherein the user has access to the private enterprise computer network, wherein the wherein the user profile comprises an information comprises a specified user usage of the private enterprise computer network;
setting a specified trigger value with respect to the specified user usage of the private enterprise computer network;
detecting that the user usage exceeds the trigger value; and
modifying an access privilege of the user to the private enterprise computer network.
0 Assignments
0 Petitions
Accused Products
Abstract
In one aspect, a computerized method for implementing dual-layer computer-system security in a private enterprise computer network includes the step of generating a user profile, wherein the user has access to the private enterprise computer network, wherein the wherein the user profile comprises an information comprises a specified user usage of the private enterprise computer network. The computerized method includes the step of setting a specified trigger value with respect to the specified user usage of the private enterprise computer network. The computerized method includes the step of detecting that the user usage exceeds the trigger value. The computerized method includes the step of modifying an access privilege of the user to the private enterprise computer network.
35 Citations
11 Claims
-
1. A computerized method for implementing dual-layer computer-system security in a private enterprise computer network comprising:
-
generating a user profile, wherein the user has access to the private enterprise computer network, wherein the wherein the user profile comprises an information comprises a specified user usage of the private enterprise computer network; setting a specified trigger value with respect to the specified user usage of the private enterprise computer network; detecting that the user usage exceeds the trigger value; and modifying an access privilege of the user to the private enterprise computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification