Method and system for controlling access to network resources based on connection security
First Claim
1. A method of controlling a network, comprising the steps of:
- establishing a computer network connection between a computer and an intermediate device which has network resources connected thereto;
determining a level of security of the computer network connection; and
controlling a level of access of the computer to the network resources using the level of security of the computer network connection which has been determined.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for controlling a network, such as a computer network. A computer network connection is established between one or more computers or computing devices and an intermediate device to which network resources are connected. There is a controlling of a level of access of the computer or computing device to the network resources based on the level of security of the computer network connection between the computer or computing device and the intermediate device. Such a controlling may be performed by the intermediate device, a separate firewall device, and/or components of a network operating system or network controlling software. The computing devices are connected to the intermediate device using a wireless connection, although as an alternative a wired connection may be utilized.
-
Citations
40 Claims
-
1. A method of controlling a network, comprising the steps of:
-
establishing a computer network connection between a computer and an intermediate device which has network resources connected thereto;
determining a level of security of the computer network connection; and
controlling a level of access of the computer to the network resources using the level of security of the computer network connection which has been determined. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system for controlling a network, comprising:
-
means for establishing a computer network connection between a computer and an intermediate device which has network resources connected thereto;
means for determining a level of security of the computer network connection; and
means for controlling a level of access of the computer to the network resources using the level of security of the computer network connection which has been determined. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification