Site access via intervening control layer
First Claim
1. A computerized system comprising:
- a plurality of sites, each site having content referenced by addresses, the sites hosted on one or more servers;
a monitoring server, distinct from the one or more servers, maintaining a database of permissible content on at least one of the plurality of sites, the permissible content referenced by addresses; and
, a client having an intervening control layer within an otherwise standard mechanism by which programs running on the client access the content on the plurality of sites, such that the intervening control layer polls the monitoring server to determine whether a program attempting to access content on one of the sites as referenced by an address should be permitted to do so.
1 Assignment
0 Petitions
Accused Products
Abstract
Monitoring site access via an intervening control layer within a client is disclosed. In one embodiment of the invention, a computerized system includes a plurality of sites, a monitoring server, and a client. Each site has content referenced be addresses. The monitoring server maintains a database of permissible content on at least one of the plurality of sites, where the permissible content is also referenced by addresses. The client has an intervening control layer within an otherwise standard mechanism by which programs running on the client access the content on the plurality of sites. The intervening control layer polls the monitoring server to determine whether a program attempting to access content on one of the sites as referenced by an address should be permitted to do so.
-
Citations
48 Claims
-
1. A computerized system comprising:
-
a plurality of sites, each site having content referenced by addresses, the sites hosted on one or more servers;
a monitoring server, distinct from the one or more servers, maintaining a database of permissible content on at least one of the plurality of sites, the permissible content referenced by addresses; and
,a client having an intervening control layer within an otherwise standard mechanism by which programs running on the client access the content on the plurality of sites, such that the intervening control layer polls the monitoring server to determine whether a program attempting to access content on one of the sites as referenced by an address should be permitted to do so. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 19, 20)
-
-
13. A computer comprising:
-
a processor;
a computer-readable medium;
a standard mechanism executed by the processor from the medium by which programs running on the computer access content on a plurality of sites, the sites hosted on one or more servers; and
,an intervening control layer within the standard mechanism executed by the processor from the medium, such that the layer polls a monitoring server, distinct from the one or more servers, to determine whether a program attempting to access content on one of the sites as referenced by an address should be permitted to do so.
-
-
21. A server comprising:
-
a processor;
a computer-readable medium; and
,a computer program executed by the processor from the medium to receive polling from clients to determine whether a client program attempting to access content on one of a plurality of sites as referenced by an address should be permitted to do so, the sites hosted on one or more servers and distinct from the processor and computer program, such that in response to the polling the computer program returns whether the client program is permitted to access the content on the one of the plurality of sites. - View Dependent Claims (22, 23, 24, 25, 30, 31, 32, 33, 34, 35, 36, 37, 39, 40)
-
-
26. A computerized method comprising:
-
generating at a program running on a client a request to access content at a site as referenced by an address so, the site hosted on one or more servers;
receiving the request at a standard mechanism on the client by which programs running on the client access content on a plurality of sites;
intercepting the request by an intervening layer within the standard mechanism on the client;
determining at the intervening layer whether the content is present in a cache of content previously determined to be permissible;
upon failure to determine that the content is present in the cache, polling by the layer of a monitoring server distinct from the one or more servers to determine whether the content is permissible;
determining at the monitoring server whether the content is present in a database of permissible content; and
,permitting by the layer to the program running on the client to access the content upon determining that the content is permissible.
-
-
27. A computer-readable medium storing a computer program to cause a client computer having an intervening control layer within an otherwise standard mechanism by which programs running on the client access content on a plurality of sites to perform the computerized method comprising:
-
generating at one of the programs running on the client a request to access content at one of the sites as referenced by an address, the sites hosted on one or more server computers;
receiving the request at the standard mechanism;
intercepting the request by the intervening layer;
determining at the intervening layer whether the content is present in a cache of content previously determined to be permissible;
polling by the layer of a monitoring server distinct from the one or more servers to determine whether the content is permissible upon failure to determine that the content is present in the cache; and
,permitting by the layer to the one of the programs running on the client to access the content upon determining that the content is permissible.
-
-
28. A computer-readable medium storing a computer program to cause a monitoring server to perform the computerized method comprising:
-
receiving polling from a client computer at a computer distinct from one or more servers hosting content on a plurality of sites to determine whether particular content on one of a plurality of sites as referenced by an address is permissible;
determining whether the particular content is present in a database of permissible content; and
,indicating to the client computer whether the particular content is permissible, wherein the client computer includes an intervening control layer within an otherwise standard mechanism by which programs running on the client access content on the plurality of sites.
-
-
29. A computerized system comprising:
-
a client that has access to one or more destination sites, the one or more destination sites being hosted on one or more servers and having content referenced by one or more addresses; and
a monitoring server distinct from the one or more servers, the monitoring server having one or more rules that govern access to the one or more destination sites, wherein the monitoring server includes a software component operable on a computing platform for interpreting the one or more rules and determining if the client is restricted from accessing the one or more destination sites.
-
-
38. A system comprising:
-
a computer that has access to one or more destination sites, the one or more destination sites being hosted on one or more servers and having content referenced by one or more addresses; and
a monitoring server that is distinct from the one or more servers, the monitoring server having one or more rules that govern access to the one or more destination sites, and wherein the computer is denied access to one of the destination sites if the one or more rules disallow such access.
-
-
41. A computerized system comprising:
-
one or more client computers operatively coupled to an Internet;
one or more content servers operatively coupled to the Internet; and
a monitoring server, wherein the one or more content servers are referenced by one or more addresses, and wherein the monitoring server determines whether one of the client computers has permission to access one of the one or more addresses of the one or more content servers based on a set of one or more permissible content rules. - View Dependent Claims (42, 43, 44, 46, 47)
-
-
45. A computerized method comprising:
-
creating one or more access rules on a monitoring server that relate to a controlling of access to a plurality of destination sites, the destination sites being hosted on one or more servers that are distinct from the monitoring server;
initiating a request on a client computer to access content on one of the destination sites, the content being referenced by one or more addresses; and
allowing access to the content of one of the destination sites by the client computer if the one or more access rules on the monitoring server do not restrict such access.
-
-
48. A computer-readable medium having a computer program stored thereon that controls access to a destination site by performing a computerized method comprising:
-
creating one or more rules on a monitoring server that govern access to the destination site, the destination site being hosted on one or ore servers that are distinct from the monitoring server;
receiving notification of a request by a computer to access content on the destination site, the content on the destination site being referenced by one or more addresses; and
restricting access to the content of the destination site according to the one or more rules.
-
Specification