Enabling security of a computer system
First Claim
Patent Images
1. A method for enabling security of a computer system, said method comprising:
- monitoring for physical proximity of an authorized user with said computer system without requiring said authorized user to physically access the interior of said computer system; and
in response to detecting said physical proximity of an authorized user with said computer system, allowing said authorized user access to privileged operations of said computer system, wherein said detection is based on physical interaction of said authorized user with said computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
Enabling security of a computer system. Physical proximity of an authorized user with the computer system is detected without requiring the authorized user to physically access the interior of the computer system is monitored. In response to detecting the physical proximity of an authorized user, the authorized user is allowed access to privileged operations of the computer system.
7 Citations
20 Claims
-
1. A method for enabling security of a computer system, said method comprising:
-
monitoring for physical proximity of an authorized user with said computer system without requiring said authorized user to physically access the interior of said computer system; and in response to detecting said physical proximity of an authorized user with said computer system, allowing said authorized user access to privileged operations of said computer system, wherein said detection is based on physical interaction of said authorized user with said computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for enabling access to privileges operations of a computer system comprising:
-
an externally accessible interface, configured to allow detection of a physical proximity of an authorized user with said computer system; and an access control module communicatively coupled with said interface configured to control access to privileged operations of said computer system, and configured to detect said physical proximity of said authorized user, and in response, allowing said authorized user access to said privileged operations of said computer system, wherein said detection is based on physical interaction of said authorized user with said computer system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A tangible computer readable storage medium comprising instructions thereon, when executed cause a computer system to perform a method for enabling security of a computer system based on a physical proximity, said method comprising:
-
monitoring for physical proximity of an authorized user with said computer system without requiring said authorized user to physically access the interior of said computer system; and in response to detecting said physical proximity of an authorized user with said computer system, allowing said authorized user access to privileged operations of said computer system, wherein said detection is based on physical interaction of said authorized user with said computer system; and prohibiting access to said privileged operations after a predetermined amount of time since said detecting. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification