RULE-BASED APPLICATION ACCESS MANAGEMENT
First Claim
Patent Images
1. A method comprising:
- receiving a request to access a resource with an altitude, the resource used in executing a first streaming application;
managing rules based access to the resource based on the altitude of the resource comprising;
determining whether the resource is associated with a DMZ;
if it is determined that the resource is associated with the DMZ, managing rules based access to the resource based on the altitude of the resource, further comprising;
determining access control rules for accessing the resource based on the altitude of the resource;
providing access to the resource based on the access control rules for the resource.
2 Assignments
0 Petitions
Accused Products
Abstract
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules.
-
Citations
23 Claims
-
1. A method comprising:
-
receiving a request to access a resource with an altitude, the resource used in executing a first streaming application; managing rules based access to the resource based on the altitude of the resource comprising; determining whether the resource is associated with a DMZ; if it is determined that the resource is associated with the DMZ, managing rules based access to the resource based on the altitude of the resource, further comprising; determining access control rules for accessing the resource based on the altitude of the resource; providing access to the resource based on the access control rules for the resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
at least one processor; memory storing instructions configured to instruct the at least one processor to perform; receiving a request to access a resource with an altitude, the resource used in executing a first streaming application; managing rules based access to the resource based on the altitude of the resource comprising; determining whether the resource is associated with a DMZ; managing rules based access to the resource based on the altitude of the resource if it is determined that the resource is associated with the DMZ, further comprising; determining access control rules for accessing the resource based on the altitude of the resource; providing access to the resource based on the access control rules for the resource. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system comprising:
-
means for receiving a request to access a resource with an altitude, the resource used in executing a first streaming application; means for managing rules based access to the resource based on the altitude of the resource comprising; means for determining whether the resource is associated with a DMZ; means for managing rules based access to the resource based on the altitude of the resource, if it is determined that the resource is associated with the DMZ, further comprising; means for determining access control rules for accessing the resource based on the altitude of the resource; means for providing access to the resource based on the access control rules for the resource.
-
Specification