Targeted security policy override
First Claim
Patent Images
1. A method, comprising:
- gathering, with an information handling device, client system identification data of a client system;
providing, with the information handling device, the client system with at least one cryptographic key;
generating, with the information handling device, an unlock key;
transmitting, with the information handling device, the client system identification data, the unlock key, and a request to a third party system;
receiving, with the information handling device, encrypted approval data from the third party system; and
transmitting, with the information handling device, encrypted approval data, comprising the unlock key, to the client system, wherein the encrypted approval data, if legitimate, allows overriding of a security policy of targeted areas of a low-level control program of the client system.
2 Assignments
0 Petitions
Accused Products
Abstract
An aspect provides a method, including: gathering, with an information handling device, client system identification data of a client system; providing, with the information handling device, the client system with at least one cryptographic key; transmitting, with the information handling device, the client system identification data and a request for security policy override to a third party; receiving, with the information handling device, encrypted approval data from the third party; and transmitting, with the information handling device, encrypted approval data to the client system. Other aspects are described and claimed.
10 Citations
20 Claims
-
1. A method, comprising:
-
gathering, with an information handling device, client system identification data of a client system; providing, with the information handling device, the client system with at least one cryptographic key; generating, with the information handling device, an unlock key; transmitting, with the information handling device, the client system identification data, the unlock key, and a request to a third party system; receiving, with the information handling device, encrypted approval data from the third party system; and transmitting, with the information handling device, encrypted approval data, comprising the unlock key, to the client system, wherein the encrypted approval data, if legitimate, allows overriding of a security policy of targeted areas of a low-level control program of the client system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An information handling device, comprising:
-
one or more processors; and a memory operatively coupled to the one or more processors that stores instructions executable by the one or more processors to perform acts comprising; gathering client system identification data of a client system; providing the client system with at least one cryptographic key; generating an unlock key; transmitting the client system identification data, the unlock key, and a request to a third party system; receiving encrypted approval data from the third party system; and transmitting encrypted approval data, comprising the unlock key to the client system, wherein the encrypted approval data, if legitimate, allows overriding of a security policy of targeted areas of a low-level control program of the client system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A program product, comprising:
-
a storage device having computer program code embodied therewith, the computer program code comprising; computer program code that gathers, with an information handling device, client system identification data of a client system; computer program code that provides, with the information handling device, the client system with at least one cryptographic key; computer program code that generates, with the information handling device, an unlock key; computer program code that transmits, with the information handling device, the client system identification data, the unlock key, and a request to a third party system; computer program code that receives, with the information handling device, encrypted approval data from the third party system; and computer program code that transmits, with the information handling device, encrypted approval data, comprising the unlock key to the client system, wherein the encrypted approval data, if legitimate, allows overriding of a security policy of targeted areas of a low-level control program of the client system.
-
Specification