Systems and methods for delegation and notification of administration of internet access
First Claim
1. A computer implemented method comprising:
- receiving a signal based on a determination that a set of notifiable violations of an Internet access policy detected at an endpoint computing device over a period of time exceeds a threshold number of notifiable violations for the period of time, wherein the set of notifiable violations is included in a plurality of violations detected over the period of time, the plurality of violations also including a set of non-notifiable violations in addition to the set of notifiable violations;
determining a notification to send in response to receiving the signal;
determining a recipient of the notification; and
sending the notification to the recipient based at least in part on the determination that the set of notifiable violations exceeds the threshold number, wherein notifiable violations include attempts, by one or more users associated with the endpoint computing device, to access a particular set of websites identified, by a third-party administrator designated by the one or more users, as violating the Internet access policy and eligible to trigger notification of the recipient, and non-notifiable violations by the one or more users do not trigger notification of the recipient.
13 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems, methods, and computer readable media for delegating administrative rights to a third party in an Internet access control application comprising receiving a designation of a third party wherein the designation identifies the third party as a recipient of administrative rights in an access control application, and receiving a selection of administrative rights to be associated with the third party. Further, an invitation can be sent, or caused to be sent, to the third party. Acceptance of said invitation can be received. Also, administrative rights can be granted to the third party. The systems, methods, and computer readable media can be operable within a client/server architecture. Also disclosed are systems, methods, and computer readable media for notification of an access policy violation. Also disclosed are systems, methods, and computer readable media for administration of an access control application by a third party and access policy violation notification.
-
Citations
23 Claims
-
1. A computer implemented method comprising:
-
receiving a signal based on a determination that a set of notifiable violations of an Internet access policy detected at an endpoint computing device over a period of time exceeds a threshold number of notifiable violations for the period of time, wherein the set of notifiable violations is included in a plurality of violations detected over the period of time, the plurality of violations also including a set of non-notifiable violations in addition to the set of notifiable violations; determining a notification to send in response to receiving the signal; determining a recipient of the notification; and sending the notification to the recipient based at least in part on the determination that the set of notifiable violations exceeds the threshold number, wherein notifiable violations include attempts, by one or more users associated with the endpoint computing device, to access a particular set of websites identified, by a third-party administrator designated by the one or more users, as violating the Internet access policy and eligible to trigger notification of the recipient, and non-notifiable violations by the one or more users do not trigger notification of the recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system of notification of an Internet access policy violation comprising:
-
a server; and a first access control application resident in the server in communication with a second application resident in a client, wherein the first access control application is configured to; receive a signal from the second application resident in the client in response to a determination that a set of notifiable violations of an Internet access policy detected over a period of time exceeds a threshold number of notifiable violations for the period of time; determine a notification type to send in response to receiving the signal; determine a recipient of the notification; and send the notification to the recipient based at least in part on the determination that the set of notifiable violations exceeds the threshold number, wherein notifiable violations include attempts, by one or more users associated with the endpoint computing device, to access a particular set of websites identified, by a third-party administrator designated by the one or more users, as violating the Internet access policy and eligible to trigger notification of the recipient, and non-notifiable violations by the one or more users do not trigger notification of the recipient. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable storage medium having computer executable instructions embodied thereon, wherein said computer executable instructions cause one or more processors to perform operations comprising:
-
receiving a signal based on a determination that a set of notifiable violations of an internet access policy detected at an endpoint computing device over a period of time exceeds a threshold number of notifiable violations for the period of time, wherein the set of notifiable violations is included in a plurality of violations detected over the period of time, the plurality of violations also including a set of non-notifiable violations in addition to the set of notifiable violations; determining a notification to send in response to receiving the signal; determining a recipient of the notification; and sending the notification to the recipient based at least in part on the determination that the set of notifiable violations exceeds the threshold number, wherein notifiable violations include attempts, by one or more users associated with the endpoint computing device, to access a particular set of websites identified, by a third-party administrator designated by the one or more users, as violating the internet access policy and eligible to trigger notification of the recipient, and non-notifiable violations by the one or more users do not trigger notification of the recipient. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification