ACCESS REQUEST AUTHORIZATION
First Claim
1. A method for controlling physical access to a computing device the method comprising:
- receiving a first access request to a room containing the computing device, and in response, one or more processors (a) determining that the first access request is valid based on the room and the date and time of the first access request and (b) unlocking a door to the room to permit entry to the room; and
subsequently, receiving a second access request to a cabinet that is located in the room and contains the computing device, and in response, one or more processors, (a) determining that the second access request is valid based on the cabinet and the date and time of the second access request and (b) unlocking the cabinet to permit access to the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
In a method for controlling physical access to a computing device a first access request to a room containing the computing device is received. In response, a processor determines that the first access request is valid based on the room and the date and time of the first access request and unlocks a door to the room to permit entry to the room. Subsequently, a second access request to a cabinet that is located in the room and contains the computing device is received. In response, a processor determines that the second access request is valid based on the cabinet and the date and time of the second access request and unlocks the cabinet to permit access to the computing device.
30 Citations
20 Claims
-
1. A method for controlling physical access to a computing device the method comprising:
-
receiving a first access request to a room containing the computing device, and in response, one or more processors (a) determining that the first access request is valid based on the room and the date and time of the first access request and (b) unlocking a door to the room to permit entry to the room; and subsequently, receiving a second access request to a cabinet that is located in the room and contains the computing device, and in response, one or more processors, (a) determining that the second access request is valid based on the cabinet and the date and time of the second access request and (b) unlocking the cabinet to permit access to the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product for controlling physical access to a computing device, the computer program product comprising:
-
one or more computer-readable storage devices and program instructions stored on the one or more computer-readable storage devices, the program instructions comprising; program instructions to receive a first access request to a room containing the computing device, and in response, program instructions to (a) determine that the first access request is valid based on the room and the date and time of the first access request and (b) unlock a door to the room to permit entry to the room; and subsequently, program instructions to receive a second access request to a cabinet that is located in the room and contains the computing device, and in response, program instructions to (a) determine that the second access request is valid based on the cabinet and the date and time of the second access request and (b) unlock the cabinet to permit access to the computing device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer system for controlling physical access to a computing device, the computer system comprising:
-
one or more computer processors, one or more computer-readable memory devices, one or more computer-readable storage devices, and program instructions stored on the computer-readable storage devices for execution by at least one of the one or more processors via the one or more memory devices, the program instructions comprising; program instructions to receive a first access request to a room containing the computing device, and in response, program instructions to (a) determine that the first access request is valid based on the room and the date and time of the first access request and (b) unlock a door to the room to permit entry to the room; and subsequently, program instructions to receive a second access request to a cabinet that is located in the room and contains the computing device, and in response, program instructions to (a) determine that the second access request is valid based on the cabinet and the date and time of the second access request and (b) unlock the cabinet to permit access to the computing device. - View Dependent Claims (18, 19, 20)
-
Specification