发明名称 |
POLICY-BASED COMPLIANCE MANAGEMENT AND REMEDIATION OF DEVICES IN AN ENTERPRISE SYSTEM |
摘要 |
The present disclosure relates generally to managing compliance of remote devices that access an enterprise system. More particularly, techniques are disclosed for using a compliance policy to manage remediation of non-compliances of remote devices that access an enterprise system. A device access management system may be implemented to automate remediation of non-compliances of remote devices accessing an enterprise system. Remediation may be controlled based on different levels of non-compliance, each defined by one or more different non-compliances. In some embodiments, a level of non-compliance may be conditionally defined by one or more user roles for which non-compliance is assessed. Access to computing resources of an enterprise system may be controlled for a remote device based on compliance of the remote device. Access may be inhibited for those resources not permitted during a time period of a non-compliance. |
申请公布号 |
US2016088021(A1) |
申请公布日期 |
2016.03.24 |
申请号 |
US201514690045 |
申请日期 |
2015.04.17 |
申请人 |
Oracle International Corporation |
发明人 |
Jayanti Venkata Bhagavati Kumar;Maheshwari Harsh;Mohamad Abdul Mohamad Raja Gani;Kandasamy Parthipan |
分类号 |
H04L29/06;H04L29/08 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
|
主权项 |
1. A method comprising:
identifying a compliance policy for using a remote device with an enterprise computer system, wherein the remote device is registered to access the enterprise computer system; detecting, based on the compliance policy, a non-compliance of the remote device; assessing, by a computer system, based on the compliance policy, a level of non-compliance of the remote device; establishing, based on the compliance policy and the level of non-compliance, a time period for remediation of the non-compliance; receiving a request to access a computing resource in the enterprise computer system; providing access to the computing resource based on the level of non-compliance; inhibiting access to the computing resource in the enterprise computer system based on the level of non-compliance and based on determining that the time period has expired; and instructing the remote device to perform an action to remedy the non-compliance based on determining that the time period has expired. |
地址 |
Redwood Shores CA US |