Systems and methods for delegation and notification of administration of internet access
First Claim
1. A computer-implemented method of delegating administrative rights to a third party comprising:
- receiving, from a first computing device, a request, by a first end user associated with a first account of a network access control application, to delegate administrative rights for the first account of the network access control application to a third party end user, wherein the request identifies the third party end user, and the access control application monitors violations of a network access policy by a particular set of end users of at least one network-enabled application, the particular set of end users associated with the first account, wherein the third party end user is outside the particular set of end users associated with the first account;
receiving a selection, specified by the first end-user, of particular administrative rights in the network access control application to delegate to the third party end user;
causing an invitation to be sent to the third party end user for acceptance by the third party end user of the delegation of the particular administrative rights for the first account; and
providing the third party end user the particular administrative rights for the first account of the access control application.
12 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems, methods, and computer readable media for delegating administrative rights to a third party in an Internet access control application comprising receiving a designation of a third party wherein the designation identifies the third party as a recipient of administrative rights in an access control application, and receiving a selection of administrative rights to be associated with the third party. Further, an invitation can be sent, or caused to be sent, to the third party. Acceptance of said invitation can be received. Also, administrative rights can be granted to the third party. The systems, methods, and computer readable media can be operable within a client/server architecture. Also disclosed are systems, methods, and computer readable media for notification of an access policy violation. Also disclosed are systems, methods, and computer readable media for administration of an access control application by a third party and access policy violation notification.
77 Citations
20 Claims
-
1. A computer-implemented method of delegating administrative rights to a third party comprising:
-
receiving, from a first computing device, a request, by a first end user associated with a first account of a network access control application, to delegate administrative rights for the first account of the network access control application to a third party end user, wherein the request identifies the third party end user, and the access control application monitors violations of a network access policy by a particular set of end users of at least one network-enabled application, the particular set of end users associated with the first account, wherein the third party end user is outside the particular set of end users associated with the first account; receiving a selection, specified by the first end-user, of particular administrative rights in the network access control application to delegate to the third party end user; causing an invitation to be sent to the third party end user for acceptance by the third party end user of the delegation of the particular administrative rights for the first account; and providing the third party end user the particular administrative rights for the first account of the access control application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system of delegating administrative rights to a third party comprising:
a server device serving at least a portion of an access control application in communication with at least one network-enabled application residing, at least in part, on a client computing device, the access control application including; a network access control module configured to monitor violations of a network access policy associated with a first account by a particular set of end users of the at least one network-enabled application, the particular set of end users associated with the first account; and an administrative rights manager configured to; receive, from a remote computing device, a request, by a first end user in the particular set of end users associated with the first account of the access control application, to delegate administrative rights for the first account of the access control application to a third party end user outside the particular set of end users associated with the first account; receive a selection, specified by the first end-user, of particular administrative rights in the access control application, for the first account, to delegate to the third party end user; cause an invitation to be sent to the third party end user for acceptance by the third party end user of the delegation of the particular administrative rights for the first account; and provide the third party end user the particular administrative rights for the first account of the access control application. - View Dependent Claims (13, 14, 15, 16)
-
17. A non-transitory computer readable medium having computer executable instructions embodied thereon for delegating administrative rights to a third party comprising:
-
receiving, from a first computing device, a request, by a first end user associated with a first account of a network access control application, to delegate administrative rights for the first account of the network access control application to a third party end user, wherein the request identifies the third party end user, and the access control application monitors violations of a network access policy by a particular set of end users of at least one network-enabled application, the particular set of end users associated with the first account, wherein the third party end user is outside the particular set of end users associated with the first account; receiving a selection, specified by the first end-user, of particular administrative rights in the network access control application to delegate to the third party end user; causing an invitation to be sent to the third party end user for acceptance by the third party end user of the delegation of the particular administrative rights for the first account; and providing the third party end user the particular administrative rights for the first account of the access control application. - View Dependent Claims (18)
-
-
19. A non-transitory computer readable medium having computer executable instructions embodied thereon for administering a network access control application comprising:
-
identifying a request, by a first end user associated with a first account of a network access control application, to delegate administrative rights for the first account of the network access control application to a third party end user; causing an invitation to be sent to the third party end user for acceptance by the third party end user of the delegation of the particular administrative rights for the first account; providing the third party end user the particular administrative rights for the first account of the access control application upon acceptance of the delegation of the particular administrative rights for the first account; authenticating, the third party end user to perform particular administrative commands to change settings of the first account of the network access control application; receiving a particular administrative command from the authenticated third party administrator end user; and modifying settings of the network access control application associated with the first account based at least in part on the administration command; wherein the network access control application monitors violations of a network access policy associated with the first account by a particular set of end users of at least one network-enabled application, the particular set of end users associated with the first account, and the third party end user is outside the particular set of end users associated with the first account. - View Dependent Claims (20)
-
Specification