System and method for recovering a security profile of a computer system
First Claim
1. A computer system comprising:
- memory; and
a security application configured to lock down resources of said computer system by modifying a machine state of said computer system in response to a request for activating an original state of a security profile for a user, said security application configured to store data indicative of said machine state in said memory, said security application configured to modify said machine state in response to a request for activating a new state of said security profile for said user, said security application configured to retrieve said data in response to a request for recovering said original state of said security profile and to modify said machine state based on said retrieved data thereby activating said original state of said security profile for said user.
9 Assignments
0 Petitions
Accused Products
Abstract
A system for recovering previously activated security profiles utilizes memory and a security application. Initially, the security application enables a user to define a first security profile. After defining the first security profile, the user submits a request for activating the first security profile, and in response, the security application modifies a machine state of the computer system. The modification of the machine state in response to this request locks down the computer system, thereby implementing the first security profile defined by the user. Also in response to the request for activating the first security profile, the security application stores, in the memory, data indicative of the machine state so that the first security profile can be again implemented at a later time, if desired. In this regard, after causing a different security profile to be implemented by the computer system, a user may submit a request for changing the security profile of the computer system back to the first security profile. In response to such a request, the security application retrieves the data previously stored in the memory and automatically modifies the machine state so that the first security profile is again implemented by the computer system. As a result, any changes made to the security profile of the computer system since the submission of the aforementioned request for activating the first security profile are effectively nullified.
-
Citations
22 Claims
-
1. A computer system comprising:
-
memory; and a security application configured to lock down resources of said computer system by modifying a machine state of said computer system in response to a request for activating an original state of a security profile for a user, said security application configured to store data indicative of said machine state in said memory, said security application configured to modify said machine state in response to a request for activating a new state of said security profile for said user, said security application configured to retrieve said data in response to a request for recovering said original state of said security profile and to modify said machine state based on said retrieved data thereby activating said original state of said security profile for said user. - View Dependent Claims (2, 3, 4, 15, 16, 17, 18, 19)
-
-
5. A computer system, comprising:
- memory; and
a security application defining a plurality of rules, said security application configured to enable a user to select a set of said rules to define an original state of a security profile for a user, said security application configured to lock down said computer system by causing said computer system to enforce said selected set of rules in response to an activation request, said security application further configured to store data indicative of said original state of said security profile, said security application configured to change said security profile for said user from said original state to a new state by changing which of said plurality of rules are enforced by said computer system based on inputs to said computer system, said security application configured to retrieve said data in response to a user request and to automatically identify said set of rules based on said retrieved data, said security application further configured to return said security profile for said user to said original state thereby causing said computer system to enforce said identified rules in response to said user request. - View Dependent Claims (6, 7)
- memory; and
-
8. A computer system comprising:
-
means for storing data; and means for locking down resources of said computer system by modifying a machine state of said computer system in response to a request for activating an original state of a security profile for a user, said locking down means including a means for storing security profile data indicative of said machine state in said memory in response to said request for activating said original state of said security profile, said locking down means including a means for modifying said machine state in response to a request for activating a new state of said security profile for said user, said locking down means including a means for retrieving said security profile data in response to a request for recovering said original state of said security profile and for modifying said machine state based on said retrieved data thereby activating said original state of said security profile for said user.
-
-
9. A method for locking down resources of a computer system, comprising:
-
receiving a request for activating a an original state of a security profile for a user; modifying a machine state of said computer system in response to said request for activating said original state of said security profile; storing data indicative of said machine state; modifying said machine state in response to a request for activating a new state of said security profile for said user; retrieving said data in response to a request for recovering said original state of said security profile; and modifying said machine state based on said retrieved data in response to said request for recovering said first security profile. - View Dependent Claims (10, 11, 12, 20, 21)
-
-
13. A method for locking down resources of a computer system, comprising:
-
defining a plurality of rules for locking down said computer system; receiving an input from a user of said computer system; selecting a set of said rules based on said input; causing said computer system to enforce said selected set of rules in response to an activation request; storing data identifying said selected set of rules in response to said activation request; changing which of said plurality of rules are enforced by said computer system; detecting an operational problem caused by said changing; providing a request to change a security state of said computer system in response to said detecting; retrieving said data in response to said request to change said security state; automatically identifying said selected set of rules based on said retrieved data; and causing said computer system to enforce said selected set of rules in response to said request to change said security state. - View Dependent Claims (14)
-
-
22. A computer system, comprising:
-
memory; and a security application configured to define a security profile for controlling access to at least one resource of said computer system, said security application configured to activate an original state of said security profile and to store data indicative of said original state in said memory, said security application further configured to activate a new state of said security profile in response to a user request, said security application further configured to enable a user to undo an error in defining said new state by allowing said user to initiate activation of said original state based on said data.
-
Specification