Method for managing security of a data processing system with configurable security restrictions
First Claim
1. A computer-implemented method, comprising:
- booting a data processing device;
in response to receiving a request from an application for modifying a security settings of a data processing system;
rebooting the data processing system, including rebooting a kernel of an operating system of the data processing device;
before the kernel of the operating system has finished rebooting, displaying a message on a display of the data processing system to request a user who operates the data processing system to perform a physical action specified in the displayed message to prove that the user was physically present to issue the request for modifying the security settings;
in response to receiving an action physically performed by the user, verifying whether the action physically performed by the user conforms to the requested physical action specified in the displayed message; and
modifying the security settings of the data processing system in response to determining that the user action conforms to the requested physical action specified in the displayed message.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for managing security of a data processing system are described herein. According to one embodiment, in response to a request for modifying a security settings of a data processing system, a message is displayed on a display of the data processing system to request a user who operates the data processing system to perform a physical action to prove that the user was physically present to issue the request for modifying the security settings. It is verified whether a user action physically performed by the user conforms to the requested physical action. The security settings of the data processing system is modified, in response to determining that the user action conforms to the requested physical action.
10 Citations
23 Claims
-
1. A computer-implemented method, comprising:
-
booting a data processing device; in response to receiving a request from an application for modifying a security settings of a data processing system; rebooting the data processing system, including rebooting a kernel of an operating system of the data processing device; before the kernel of the operating system has finished rebooting, displaying a message on a display of the data processing system to request a user who operates the data processing system to perform a physical action specified in the displayed message to prove that the user was physically present to issue the request for modifying the security settings; in response to receiving an action physically performed by the user, verifying whether the action physically performed by the user conforms to the requested physical action specified in the displayed message; and modifying the security settings of the data processing system in response to determining that the user action conforms to the requested physical action specified in the displayed message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory machine-readable medium having instructions stored therein, which when executed by a processor, cause the processor to perform a method, the method comprising:
-
booting a data processing device; in response to receiving a request from an application for modifying a security settings of a data processing system; rebooting the data processing system, including rebooting a kernel of an operating system of the data processing device; before the kernel of the operating system has finished rebooting, displaying a message on a display of the data processing system to request a user who operates the data processing system to perform a physical action specified in the displayed message to prove that the user was physically present to issue the request for modifying the security settings; in response to receiving an action physically performed by the user, verifying whether the action physically performed by the user conforms to the requested physical action specified in the displayed message; and modifying the security settings of the data processing system in response to determining that the user action conforms to the requested physical action specified in the displayed message. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A data processing system, comprising:
-
a processor; and a memory coupled to the processor for storing instructions, which when executed from the memory, cause the processor to perform operations, the operations including; booting a data processing device; in response to receiving a request from an application for modifying a security settings of a data processing system; rebooting the data processing system, including rebooting a kernel of an operating system of the data processing device; before the kernel of the operating system has finished rebooting, displaying a message on a display of the data processing system to request a user who operates the data processing system to perform a physical action specified in the displayed message to prove that the user was physically present to issue the request for modifying the security settings, in response to receiving an action physically performed by the user, verifying whether the action physically performed by the user conforms to the requested physical action specified in the displayed message, and modifying the security settings of the data processing system in response to determining that the user action conforms to the requested physical action specified in the displayed message. - View Dependent Claims (20, 21, 22, 23)
-
Specification