METHOD FOR MANAGING SECURITY OF A DATA PROCESSING SYSTEM WITH CONFIGURABLE SECURITY RESTRICTIONS
    1.
    发明申请
    METHOD FOR MANAGING SECURITY OF A DATA PROCESSING SYSTEM WITH CONFIGURABLE SECURITY RESTRICTIONS 有权
    用于管理具有可配置的安全限制的数据处理系统的安全性的方法

    公开(公告)号:US20150347741A1

    公开(公告)日:2015-12-03

    申请号:US14292711

    申请日:2014-05-30

    Applicant: Apple Inc.

    CPC classification number: G06F21/32 G06F2221/2133

    Abstract: Techniques for managing security of a data processing system are described herein. According to one embodiment, in response to a request for modifying a security settings of a data processing system, a message is displayed on a display of the data processing system to request a user who operates the data processing system to perform a physical action to prove that the user was physically present to issue the request for modifying the security settings. It is verified whether a user action physically performed by the user conforms to the requested physical action. The security settings of the data processing system is modified, in response to determining that the user action conforms to the requested physical action.

    Abstract translation: 本文描述了用于管理数据处理系统的安全性的技术。 根据一个实施例,响应于修改数据处理系统的安全设置的请求,在数据处理系统的显示器上显示消息以请求操作数据处理系统的用户执行物理动作以证明 用户实际存在以发出修改安全设置的请求。 验证用户物理地执行的用户动作是否符合所请求的物理动作。 响应于确定用户动作符合所请求的物理动作,修改数据处理系统的安全设置。

    Method for managing security of a data processing system with configurable security restrictions
    2.
    发明授权
    Method for managing security of a data processing system with configurable security restrictions 有权
    用于管理具有可配置安全限制的数据处理系统的安全性的方法

    公开(公告)号:US09411947B2

    公开(公告)日:2016-08-09

    申请号:US14292711

    申请日:2014-05-30

    Applicant: Apple Inc.

    CPC classification number: G06F21/32 G06F2221/2133

    Abstract: Techniques for managing security of a data processing system are described herein. According to one embodiment, in response to a request for modifying a security settings of a data processing system, a message is displayed on a display of the data processing system to request a user who operates the data processing system to perform a physical action to prove that the user was physically present to issue the request for modifying the security settings. It is verified whether a user action physically performed by the user conforms to the requested physical action. The security settings of the data processing system is modified, in response to determining that the user action conforms to the requested physical action.

    Abstract translation: 本文描述了用于管理数据处理系统的安全性的技术。 根据一个实施例,响应于修改数据处理系统的安全设置的请求,在数据处理系统的显示器上显示消息以请求操作数据处理系统的用户执行物理动作以证明 用户实际存在以发出修改安全设置的请求。 验证用户物理地执行的用户动作是否符合所请求的物理动作。 响应于确定用户动作符合所请求的物理动作,修改数据处理系统的安全设置。

Patent Agency Ranking