Provisioning location-based security policy
First Claim
Patent Images
1. A system comprising:
- a processor including at least one core to execute instructions;
a plurality of sensors, including a first sensor to obtain location information regarding a location of the system; and
a security engine to apply a security policy to the system, wherein the security engine includes a policy logic to determine one of a plurality of security policies to apply based at least in part on the location information, wherein the location information indicates a location different than locations associated with the plurality of security policies, the security policy to determine one or more of user authentication strength, authentication session duration, and asset access.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a system comprises: a processor including at least one core to execute instructions; a plurality of sensors, including a first sensor to determine location information regarding a location of the system; and a security engine to apply a security policy to the system. In this embodiment, the security engine includes a policy logic to determine one of a plurality of security policies to apply based at least in part on the location information, where the location information indicates a location different than locations associated with the plurality of security policies. Other embodiments are described and claimed.
21 Citations
21 Claims
-
1. A system comprising:
-
a processor including at least one core to execute instructions; a plurality of sensors, including a first sensor to obtain location information regarding a location of the system; and a security engine to apply a security policy to the system, wherein the security engine includes a policy logic to determine one of a plurality of security policies to apply based at least in part on the location information, wherein the location information indicates a location different than locations associated with the plurality of security policies, the security policy to determine one or more of user authentication strength, authentication session duration, and asset access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. At least one non-transitory computer readable storage medium comprising instructions that when executed enable a system to:
-
receive location information regarding a location of the system from one or more sources; based on the location information, determine whether a security policy is associated with the location; and if so, apply the security policy to the system, and otherwise determine a similarity between the location of the system and a second location having an associated security policy via an ontological analysis to determine the similarity based on a type classification for the location of the system, and based on the similarity, apply the associated security policy to the system. - View Dependent Claims (16, 17)
-
-
18. A system comprising:
-
a processor including at least one core and a location policy classifier to receive and weight a plurality of classification results from a plurality of sub-classifiers to output a similarity value between a location of the system and a second location associated with a stored security policy, and a policy logic to determine whether to apply the stored security policy to the system based at least in part on the similarity value; at least one sensor to obtain sensor information to be used to determine the location of the system; at least one user input device to receive user input from a user. - View Dependent Claims (19, 20, 21)
-
Specification