System for monitoring access to network within secured site
First Claim
1. A system for managing access of an information terminal to a network within a secured site, comprising:
- an RFID tag coupled to the information terminal, the RFID tag including a storage device for storing security information received from the information terminal, wherein the security information includes information on a type and a version of software in a set of software on the information terminal; and
a controller including;
an RFID reader for receiving the security information regarding the information terminal from the RFID tag;
a storage device storing access permission criteria, the access permission criteria including a required type and a required version of the software in the set of software;
anda processor for determining whether to permit access of the information terminal to the network based on the security information received by the RFID reader from the storage device of the RFID tag and the access permission criteria stored in the storage device of the controller, and for generating a control signal for permitting the access of the information terminal to the network only when the type and the version of each software in the set of software on the information terminal matches the required type and the required version of each software in the set of software included in the access permission criteria stored in the storage device of the controller.
1 Assignment
0 Petitions
Accused Products
Abstract
A controller is provided which monitors/manages information terminals'"'"' access to a network within a secured site. A controller of the present invention includes: a storage device for storing security information about at least one or more information terminals received from the information terminals before accessing a network; and a processor for determining whether to permit access of an information terminal to the network based on the security information read from the storage device and access permission criteria on the security information, and generating a control signal for permitting or blocking the access of the information terminal to the network according to the determination result.
20 Citations
12 Claims
-
1. A system for managing access of an information terminal to a network within a secured site, comprising:
-
an RFID tag coupled to the information terminal, the RFID tag including a storage device for storing security information received from the information terminal, wherein the security information includes information on a type and a version of software in a set of software on the information terminal; and a controller including; an RFID reader for receiving the security information regarding the information terminal from the RFID tag; a storage device storing access permission criteria, the access permission criteria including a required type and a required version of the software in the set of software; and a processor for determining whether to permit access of the information terminal to the network based on the security information received by the RFID reader from the storage device of the RFID tag and the access permission criteria stored in the storage device of the controller, and for generating a control signal for permitting the access of the information terminal to the network only when the type and the version of each software in the set of software on the information terminal matches the required type and the required version of each software in the set of software included in the access permission criteria stored in the storage device of the controller. - View Dependent Claims (2, 3, 4)
-
-
5. A management system for managing access of an information terminal to a network within a secured site, comprising:
-
an information terminal including an RFID tag, the RFID tag including a storage device for storing security information received from the information terminal, wherein the security information includes information on a type and a version of software in a set of software stored in a storage device of the information terminal; and a controller including; a receiver for receiving security information regarding the information terminal from the RFID tag, before accessing the network; a storage device for storing access permission criteria, the access permission criteria including a required type and a required version of the software in the set of software, before accessing the network, and a processor for determining whether to permit access of the information terminal to the network based on the security information received by the receiver from the storage device of the RFID tag and the access permission criteria stored in the storage device of the controller, and for generating a control signal for permitting the access of the information terminal to the network only when the type and the version of each software in the set of software on the information terminal matches the required type and the required version of each software in the set of software included in the access permission criteria stored in the storage device of the controller. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method to monitor access of an information terminal to a network within a secured site, the method comprising:
-
receiving at an RFID tag security information regarding the information terminal from the information terminal, wherein the security information includes information on a type and a version of software in a set of software stored in a storage device of the information terminal; receiving at a controller the security information regarding the information terminal from the RFID tag using an RFID reader, the controller including a storage device storing access permission criteria, the access permission criteria including a required type and a required version of the software in the set of software; and determining at the controller whether to permit access of the information terminal to the network based on the received security information and the access permission criteria stored in the storage device of the controller, and generating a control signal for permitting access of the information terminal to the network only when the type and the version of each software in the set of software on the information terminal matches the required type and the required version of each software in the set of software included in the access permission criteria stored in the storage device of the controller. - View Dependent Claims (11, 12)
-
Specification