×

Targeted security policy override

  • US 9,239,937 B2
  • Filed: 01/07/2013
  • Issued: 01/19/2016
  • Est. Priority Date: 01/07/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • gathering, with an information handling device, client system identification data of a client system;

    providing, with the information handling device, the client system with at least one cryptographic key;

    generating, with the information handling device, an unlock key;

    transmitting, with the information handling device, the client system identification data, the unlock key, and a request to a third party system;

    receiving, with the information handling device, encrypted approval data from the third party system; and

    transmitting, with the information handling device, encrypted approval data, comprising the unlock key, to the client system, wherein the encrypted approval data, if legitimate, allows overriding of a security policy of targeted areas of a low-level control program of the client system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×