Physical access request authorization
First Claim
1. A method for controlling physical access to a computing device the method comprising:
- receiving a first access request to a room containing the computing device, and one or more processors determining whether the first access request is valid based on the room and the date and time of the first access request, wherein responsive to determining the first access request is valid unlocking a door to the room to permit entry to the room;
subsequently, receiving a second access request to a cabinet that is located in the room and contains the computing device, and one or more processors determining whether the second access request is valid based on the cabinet and the date and time of the second access request, wherein responsive to determining the second access request is valid unlocking the cabinet to permit access to the computing device; and
wherein the first access request comprises a first identification data and a first change request number and the second access request comprises a second identification data and a second change request number, wherein the first and second change request numbers are associated with one or more conditions, wherein two or more individuals listed as approvers of the first and second change request numbers agree to all conditions of the one or more conditions of the first and second change request number.
2 Assignments
0 Petitions
Accused Products
Abstract
In a method for controlling physical access to a computing device a first access request to a room containing the computing device is received. In response, a processor determines that the first access request is valid based on the room and the date and time of the first access request and unlocks a door to the room to permit entry to the room. Subsequently, a second access request to a cabinet that is located in the room and contains the computing device is received. In response, a processor determines that the second access request is valid based on the cabinet and the date and time of the second access request and unlocks the cabinet to permit access to the computing device.
14 Citations
18 Claims
-
1. A method for controlling physical access to a computing device the method comprising:
-
receiving a first access request to a room containing the computing device, and one or more processors determining whether the first access request is valid based on the room and the date and time of the first access request, wherein responsive to determining the first access request is valid unlocking a door to the room to permit entry to the room; subsequently, receiving a second access request to a cabinet that is located in the room and contains the computing device, and one or more processors determining whether the second access request is valid based on the cabinet and the date and time of the second access request, wherein responsive to determining the second access request is valid unlocking the cabinet to permit access to the computing device; and wherein the first access request comprises a first identification data and a first change request number and the second access request comprises a second identification data and a second change request number, wherein the first and second change request numbers are associated with one or more conditions, wherein two or more individuals listed as approvers of the first and second change request numbers agree to all conditions of the one or more conditions of the first and second change request number. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for controlling physical access to a computing device, the computer program product comprising:
-
one or more computer-readable storage devices and program instructions stored on the one or more computer-readable storage devices, the program instructions comprising; program instructions to receive a first access request to a room containing the computing device, and program instructions to determine whether the first access request is valid based on the room and the date and time of the first access request, wherein responsive to determining the first access request is valid unlock a door to the room to permit entry to the room; subsequently, program instructions to receive a second access request to a cabinet that is located in the room and contains the computing device, and program instructions to determine whether the second access request is valid based on the cabinet and the date and time of the second access request, wherein responsive to determining the second access request is valid unlock the cabinet to permit access to the computing device; and wherein the first access request comprises a first identification data and a first change request number and the second access request comprises a second identification data and a second change request number, wherein the first and second change request numbers are associated with one or more conditions, wherein two or more individuals listed as approvers of the first and second change request numbers agree to all conditions of the one or more conditions of the first and second change request number. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer system for controlling physical access to a computing device, the computer system comprising:
-
one or more computer processors, one or more computer-readable memory devices, one or more computer-readable storage devices, and program instructions stored on the computer-readable storage devices for execution by at least one of the one or more processors via the one or more memory devices, the program instructions comprising; program instructions to receive a first access request to a room containing the computing device, and program instructions to determine whether the first access request is valid based on the room and the date and time of the first access request, wherein responsive to determining the first access request is valid unlock a door to the room to permit entry to the room; and subsequently, program instructions to receive a second access request to a cabinet that is located in the room and contains the computing device, and program instructions to determine whether the second access request is valid based on the cabinet and the date and time of the second access request, wherein responsive to determining the second access request is valid unlock the cabinet to permit access to the computing device; and wherein the first access request comprises a first identification data and a first change request number and the second access request comprises a second identification data and a second change request number, wherein the first and second change request numbers are associated with one or more conditions, wherein two or more individuals listed as approvers of the first and second change request numbers agree to all conditions of the one or more conditions of the first and second change request number. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification