SECURITY BYPASS ENVIRONMENT FOR CIRCUMVENTING A SECURITY APPLICATION IN A COMPUTING ENVIRONMENT

Exemplary embodiments of the present disclosure are directed to performing an operation in a computing environment that is prohibited by a security application governing the computing environment. Exemplary embodiments can generate a security bypass environment in a computing environment governed by...

Full description

Saved in:
Bibliographic Details
Main Author Scaife, Walter N
Format Patent
LanguageEnglish
Published 03.05.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Exemplary embodiments of the present disclosure are directed to performing an operation in a computing environment that is prohibited by a security application governing the computing environment. Exemplary embodiments can generate a security bypass environment in a computing environment governed by the security application to provide a bypass to the security application. In exemplary embodiments, a request to perform the operation can be received via the security bypass environment and the operation can be performed through the security bypass environment in response to satisfaction of access control criteria specified for the security bypass environment so that the performance of the operation bypasses the security application.
Bibliography:Application Number: US201715852494