Managing security restrictions on a resource in a defined environment
First Claim
1. A method for managing security restrictions on a resource in a defined environment, the method comprising the computer-implemented steps of:
- maintaining a security restriction on a resource in a defined environment, the resource comprising at least one of;
an information technology (IT) account of a user, and an apparatus;
continuously monitoring a presence of a plurality of users in the defined environment;
managing the security restriction on the resource based on a detection of a pre-specified set of users from the plurality of users in the defined environment; and
reinstating the security restriction on the resource, wherein the security restriction is reinstated when either of;
a maximum number of users in the defined environment is attained, or a minimum number of users in the defined environment is not attained.
1 Assignment
0 Petitions
Accused Products
Abstract
Approaches described herein manage security restrictions on a resource in a defined environment to provide authorization and access. Specifically, a security system maintains a security restriction on the resource (e.g., an information technology (IT) account of a user, or an apparatus) in a defined environment. The presence of a plurality of users is continuously monitored throughout the defined environment and, based on a detection of a pre-specified set of users from the plurality of users in the defined environment, the security restriction is managed (e.g., removed or maintained). In one embodiment, the system removes the security restriction from the resource to allow at least one of: access to the IT account of the user, and operation of the apparatus. The security restriction on the resource may be reinstated in the case that the pre-specified set of users from the plurality of users is no longer present in the defined environment.
-
Citations
18 Claims
-
1. A method for managing security restrictions on a resource in a defined environment, the method comprising the computer-implemented steps of:
-
maintaining a security restriction on a resource in a defined environment, the resource comprising at least one of;
an information technology (IT) account of a user, and an apparatus;continuously monitoring a presence of a plurality of users in the defined environment; managing the security restriction on the resource based on a detection of a pre-specified set of users from the plurality of users in the defined environment; and reinstating the security restriction on the resource, wherein the security restriction is reinstated when either of;
a maximum number of users in the defined environment is attained, or a minimum number of users in the defined environment is not attained. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for managing security restrictions on a resource in a defined environment, the system comprising:
-
a memory medium comprising instructions; a bus coupled to the memory medium; and a processor coupled to a security system via the bus that when executing the instructions causes the system to; maintain a security restriction on a resource in a defined environment, the resource comprising at least one of;
an information technology (IT) account of a user, and an apparatus;continuously monitor a presence of a plurality of users in the defined environment; manage the security restriction on the resource based on a detection of a pre-specified set of users from the plurality of users in the defined environment; and reinstate the security restriction on the resource, wherein the security restriction is reinstated when either of;
a maximum number of users in the defined environment is attained, or a minimum number of users in the defined environment is not attained.- View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-readable storage device storing computer instructions, which when executed, enables a computer system to manage security restrictions on a resource in a defined environment, the computer instructions comprising:
-
maintaining a security restriction on a resource in a defined environment, the resource comprising at least one of;
an information technology (IT) account of a user, and an apparatus;continuously monitoring a presence of a plurality of users in the defined environment; managing the security restriction on the resource based on a detection of a pre-specified set of users from the plurality of users in the defined environment; and reinstating the security restriction on the resource, wherein the security restriction is reinstated when either of;
a maximum number of users in the defined environment is attained, or a minimum number of users in the defined environment is not attained. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification