发明名称 Continuous Monitoring of Access of Computing Resources
摘要 Systems and methods are provided for monitoring access of computing resources. Usage rules may be created and stored that define a usage constraint based on actions available to be performed at the computing resources. An authenticator may verify login credentials received from a user and authorize the user to access a computing resource. A request to perform an action at the computing resource may be received, and a usage monitor may apply a usage rule to the requested action. If the requested action violates the usage constraint of the usage rule, the usage monitor may halt performance of the requested action and notify another user of the usage constraint violation. The authenticator may receive and verify another set of login credentials from that other user. In response to successful verification of the additional set of login credentials, the usage monitor may resume performance of the requested action.
申请公布号 US2016078203(A1) 申请公布日期 2016.03.17
申请号 US201414483589 申请日期 2014.09.11
申请人 Bank of America Corporation 发明人 Moloian Armen;Kling John H.
分类号 G06F21/31 主分类号 G06F21/31
代理机构 代理人
主权项 1. A computer-implemented method of monitoring access of computing resources comprising: creating one or more usage rules each defining a usage constraint; receiving a set of login credentials from a first user; authorizing the first user to access a computing resource based on the set of login credentials received from the first user; monitoring one or more actions the first user has requested to be performed at the computing resource by applying at least one of the one or more usage rules, wherein the one or more usage rules comprise a first usage rule defining a first usage constraint that is based on a total number of authorizations performed responsive to a usage constraint violation; determining that one of the actions violates a usage constraint; halting performance of the action until a second user authorizes the action; and notifying a third user responsive to determining that a total number of authorizations performed by the second user for the first user exceeds a predetermined threshold.
地址 Charlotte NC US