Method and system for dynamic adjustment of computer security based on network activity of users
First Claim
1. A computer-implemented method for securing operations with respect to a set of computational resources in a data processing system, the method comprising:
- employing computational resources on a first computational device that is being used by a first user, wherein a first user security level indicating value is associated with the first user;
employing computational resources on a second computational device that is being used by a second user, wherein a second user security level indicating value is associated with the second user;
monitoring network activity with respect to the computational resources that are used by the second user; and
automatically reconfiguring the computational resources on the first computational device based on the second user security level indicating value of the second user, wherein the second user security level indicating value of the second user is determined based on the monitored network activity with respect to the computational resources that are used by the second user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level.
-
Citations
20 Claims
-
1. A computer-implemented method for securing operations with respect to a set of computational resources in a data processing system, the method comprising:
-
employing computational resources on a first computational device that is being used by a first user, wherein a first user security level indicating value is associated with the first user; employing computational resources on a second computational device that is being used by a second user, wherein a second user security level indicating value is associated with the second user; monitoring network activity with respect to the computational resources that are used by the second user; and automatically reconfiguring the computational resources on the first computational device based on the second user security level indicating value of the second user, wherein the second user security level indicating value of the second user is determined based on the monitored network activity with respect to the computational resources that are used by the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product on a non-transitory computer-readable storage medium for securing operations with respect to a set of computational resources in a data processing system, the computer program product comprising:
-
instructions to employ computational resources on a first computational device that is being used by a first user, wherein a first user security level indicating value is associated with the first user; instructions to employ computational resources on a second computational device that is being used by a second user, wherein a second user security level indicating value is associated with the second user; instructions to monitor network activity with respect to computational resources that are used by the second user; and instructions to automatically reconfigure the computational resources on the first computational device based on the second user security level indicating value of the second user, wherein the second user security level indicating value of the second user is determined based on the monitored network activity with respect to the computational resources that are used by the second user. - View Dependent Claims (14, 15, 16, 17)
-
-
18. An apparatus for securing operations with respect to a set of computational resources in a data processing system, the apparatus comprising:
-
a data processor coupled to a memory and operable for executing instructions in the memory to perform steps of; employing computational resources on a first computational device that is being used by a first user, wherein a first user security level indicating value is associated with the first user; employing computational resources on a second computational device that is being used by a second user, wherein a second user security level indicating value is associated with the second user; automatically reconfiguring the computational resources on the first computational device based on the second user security level indicating value of the second user; assigning a computational security level indicating value to a computational resource on the first computational device; and adjusting the computational security level indicating value for the computational resource on the first computational device in response to detected network activity by the second computational device that is being used by the second user. - View Dependent Claims (19, 20)
-
Specification