Method and system to automatically update a configuration scheme
First Claim
Patent Images
1. A computer-implemented method comprising:
- using one or more processors to perform operations of;
monitoring one or more operations that override a restriction in a security configuration scheme, the security configuration scheme being stored at a computer system; and
automatically updating the security configuration scheme based on the one or more monitored operations.
3 Assignments
0 Petitions
Accused Products
Abstract
A system to automatically update configuration settings based on activities of a user monitored while a training mode is activated is provided. The system may reside at a computer system hosting a computing application and may include a monitoring module and a configuration update module. The monitoring module may be configured to monitor operations or events that invoke a configuration scheme, such as, e.g., a security configuration scheme. The configuration update module may be configured to update the configuration scheme based on monitored operations.
17 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
using one or more processors to perform operations of; monitoring one or more operations that override a restriction in a security configuration scheme, the security configuration scheme being stored at a computer system; and automatically updating the security configuration scheme based on the one or more monitored operations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
executing instructions on a specific apparatus that result in digital electronic signal implementation of a process in which one or more operations that override a restriction in a security configuration scheme are monitored, the security configuration scheme being represented by digital electronic signals and stored in a memory location of said specific apparatus; and executing instructions on a specific apparatus that result in updating the security configuration scheme based on the one or more monitored operations.
-
-
11. A computer-implemented system comprising:
-
a monitoring module to monitor one or more operations that override a restriction in a security configuration scheme, the security configuration scheme being stored at a computer system; and a configuration update module to update the security configuration scheme based on the one or more monitored operations. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A machine-readable non-transitory storage medium having instruction data to cause a machine to:
-
monitor one or more operations that override a restriction in a security configuration scheme, the security configuration scheme being stored at a computer system; and update the security configuration scheme based on the one or more monitored operations.
-
Specification