US 12,248,557 B2
Automatic workstation functionality management based on login credentials
Chad Philip McKenzie, London (CA); Benjamin James Allen Dougall, London (CA); and Lori-Anne Carley, London (CA)
Assigned to The Toronto-Dominion Bank
Filed by The Toronto-Dominion Bank, Toronto (CA)
Filed on Jun. 28, 2023, as Appl. No. 18/215,575.
Application 18/215,575 is a continuation of application No. 17/658,066, filed on Apr. 5, 2022, granted, now 11,734,410.
Application 17/658,066 is a continuation of application No. 16/778,534, filed on Jan. 31, 2020, granted, now 11,328,052, issued on May 10, 2022.
Prior Publication US 2023/0342448 A1, Oct. 26, 2023
Int. Cl. H04L 29/06 (2006.01); G06F 21/44 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/44 (2013.01) [G06F 21/6218 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for controlling access to a computer, the system comprising:
a communications interface;
at least one memory storing instructions;
at least one hardware processor interoperably coupled with the at least one memory and the communications interface, the instructions instructing the at least one hardware processor, when executed, to perform operations comprising:
detecting a login attempt associated with the computer as initiated by a user, wherein the login attempt is associated with a set of credentials;
determining that the set of credentials are associated with a limited user, wherein the limited user is associated with a pre-defined set of authorized functionality and a pre-defined set of non-authorized functionality for use with the computer;
in response to determining that the set of credentials are associated with a limited user:
initializing a lockdown application;
identifying, by the lockdown application, one or more operating non-authorized functionalities;
terminating, by the lockdown application, the identified non-authorized functionalities; and
monitoring, by the lockdown application, attempted accesses of one or more functionalities at the computer by the limited user prior to allowing access to the one or more functionalities;
detecting, by the lockdown application, attempted access to a first functionality associated with the computer by the limited user, wherein the detection occurs prior to allowing access of the first functionality;
determining, by the lockdown application, whether the first functionality is included within the pre-defined set of non-authorized functionality; and
in response to determining that the first functionality is included in the pre-defined set of non-authorized functionality, preventing, by the lockdown application, access to the first functionality associated with the computer.