Rule-based application access management
First Claim
Patent Images
1. A method comprising:
- receiving a request to access a resource with an altitude, the resource used in executing a first streaming application;
managing rule-based access to the resource based on the altitude of the resource comprising;
determining whether the resource is associated with a DMZ;
if it is determined that the resource is associated with the DMZ, the managing the rule-based access to the resource based on the altitude of the resource further comprising;
determining access control rules for accessing the resource based on the altitude of the resource;
providing access to the resource based on the access control rules for the resource;
executing the first streaming application using the resource;
setting a timer for the first streaming application;
determining if the timer has expired, and if it is determined that the timer has expired, the method further comprising;
pausing execution of the first streaming application;
executing a second streaming application to completion;
resuming execution of the first streaming application after the second streaming application is executed to completion;
resetting the timer.
2 Assignments
0 Petitions
Accused Products
Abstract
A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules.
254 Citations
20 Claims
-
1. A method comprising:
-
receiving a request to access a resource with an altitude, the resource used in executing a first streaming application; managing rule-based access to the resource based on the altitude of the resource comprising; determining whether the resource is associated with a DMZ; if it is determined that the resource is associated with the DMZ, the managing the rule-based access to the resource based on the altitude of the resource further comprising; determining access control rules for accessing the resource based on the altitude of the resource; providing access to the resource based on the access control rules for the resource; executing the first streaming application using the resource; setting a timer for the first streaming application; determining if the timer has expired, and if it is determined that the timer has expired, the method further comprising; pausing execution of the first streaming application; executing a second streaming application to completion; resuming execution of the first streaming application after the second streaming application is executed to completion; resetting the timer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
at least one processor; memory storing instructions configured to instruct the at least one processor to perform; receiving a request to access a resource with an altitude, the resource used in executing a first streaming application; managing rule-based access to the resource based on the altitude of the resource comprising; determining whether the resource is associated with a DMZ; if it is determined that the resource is associated with the DMZ, the managing the rule-based access to the resource based on the altitude of the resource further comprising; determining access control rules for accessing the resource based on the altitude of the resource; providing access to the resource based on the access control rules for the resource; executing the first streaming application using the resource; setting a timer for the first streaming application; determining if the timer has expired, and if it is determined that the timer has expired, the instructions further configured to instruct the at least one processor to perform; pausing execution of the first streaming application; executing a second streaming application to completion; resuming execution of the first streaming application after the second streaming application is executed to completion; resetting the timer. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification