Provisioning location-based security policy
First Claim
Patent Images
1. A system comprising:
- a system on chip (SoC) including at least one core to execute instructions and a sensor hub to couple to a plurality of sensors, including a first sensor to obtain location information regarding a location of the system; and
a security circuit to apply a security policy to the system to control one or more settings of the system, wherein the security circuit includes a policy logic to determine one of a plurality of security policies to apply based at least in part on the location information, wherein the location information indicates a location different than locations associated with the plurality of security policies.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a system comprises: a processor including at least one core to execute instructions; a plurality of sensors, including a first sensor to determine location information regarding a location of the system; and a security engine to apply a security policy to the system. In this embodiment, the security engine includes a policy logic to determine one of a plurality of security policies to apply based at least in part on the location information, where the location information indicates a location different than locations associated with the plurality of security policies. Other embodiments are described and claimed.
20 Citations
20 Claims
-
1. A system comprising:
-
a system on chip (SoC) including at least one core to execute instructions and a sensor hub to couple to a plurality of sensors, including a first sensor to obtain location information regarding a location of the system; and a security circuit to apply a security policy to the system to control one or more settings of the system, wherein the security circuit includes a policy logic to determine one of a plurality of security policies to apply based at least in part on the location information, wherein the location information indicates a location different than locations associated with the plurality of security policies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
receiving location information regarding a location of a system from one or more sensors of the system; based on the location information, determining whether a security policy is associated with the location; if the security policy is associated with the location, applying the security policy to the system; and if the security policy is not associated with the location, determining a similarity between the location of the system and a second location having an associated security policy via an ontological analysis to determine the similarity based on a type classification for the location, and based at least in part on the similarity, applying the associated security policy to the system. - View Dependent Claims (15, 16)
-
-
17. A processor comprising:
-
a plurality of cores; and a security circuit coupled to the plurality of cores, wherein the security circuit is to receive and weight a plurality of classification results from a plurality of sub-classifiers to output a similarity value between a location of a system including the processor and a second location associated with a stored security policy, and determine whether to apply the stored security policy to the system based at least in part on the similarity value. - View Dependent Claims (18, 19, 20)
-
Specification