Parental control policy generation
First Claim
Patent Images
1. A method comprising:
- receiving attribute information, whereinthe attribute information identifies an attribute of a computer user, andthe attribute information is received from a parental control client;
comparing the attribute information with access control information, whereinthe access control information comprises a plurality of existing access control policies, andthe existing access control policies are stored in a repository of access control information;
selecting a value for an access restriction of a set of access restrictions, whereinthe access restriction indicates accessibility of a resource, andthe selecting comprisesidentifying a first access control policy of the plurality of existing access control policies; and
generating an access control policy, whereinthe access control policy comprises the value of the access restriction.
5 Assignments
0 Petitions
Accused Products
Abstract
Various systems and methods generate access control policies. For example, one method can receive attribute information regarding a computer user. The method can compare the attribute information with access control information and select a value of an access restriction based on a result of the comparing. The access restriction indicates whether a computer resource can be accessed or not. The method then generates an access control policy that includes the value of the access restriction.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving attribute information, wherein the attribute information identifies an attribute of a computer user, and the attribute information is received from a parental control client; comparing the attribute information with access control information, wherein the access control information comprises a plurality of existing access control policies, and the existing access control policies are stored in a repository of access control information; selecting a value for an access restriction of a set of access restrictions, wherein the access restriction indicates accessibility of a resource, and the selecting comprises identifying a first access control policy of the plurality of existing access control policies; and generating an access control policy, wherein the access control policy comprises the value of the access restriction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable storage medium storing program instructions executable to:
-
receive attribute information, wherein the attribute information identifies an attribute of a computer user, and the attribute information is received from a parental control client; compare the attribute information with access control information, wherein the access control information comprises a plurality of existing access control policies, and the existing access control policies are stored in a repository of access control information; select a value for an access restriction of a set of access restrictions, wherein the access restriction indicates accessibility of a resource, and selecting the value comprises identifying a first access control policy of the plurality of existing access control policies; and generate an access control policy, wherein the access control policy comprises the value of the access restriction. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
one or more processors; and a memory coupled to the one or more processors, wherein the memory stores program instructions executable by the one or more processors to; receive attribute information, wherein the attribute information identifies an attribute of a computer user, and the attribute information is received from a parental control client; compare the attribute information with access control information, wherein the access control information comprises a plurality of existing access control policies, and the existing access control policies are stored in a repository of access control information; select a value for an access restriction of a set of access restrictions, wherein the access restriction indicates accessibility of a resource, and selecting the value comprises identifying a first access control policy of the plurality of existing access control policies; and generate an access control policy, wherein the access control policy comprises the value of the access restriction. - View Dependent Claims (17, 18, 19, 20)
-
Specification