Method and system for preventing unauthorized access to the internet
First Claim
1. A method for preventing an unauthorized access to the Internet by a user or a user computer based on authorization data, the method comprising:
- identifying an access by the user or the user computer at or before an entry point;
receiving incoming authorization data associated with the access;
analyzing the incoming authorization data using information contained in an authorization database to determine the access is authorized; and
blocking the access beyond the entry point if the access is not authorized.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for preventing an unauthorized access to the Internet by a user or a user computer based on authorization data. The method includes identifying an access by the user or the user computer at or before an entry point and receiving incoming authorization data associated with the access. It also includes analyzing the incoming authorization data using information contained in an authorization database to determine the access is authorized and blocking the access beyond the entry point if the access is not authorized. The system includes a memory containing an authorization database related to the user or the user computer and a microprocessor. The microprocessor is programmed to block an access beyond an entry point by the user or the user computer when an analysis of incoming authorization data received from the user or the user computer based on information contained in the authorization database indicates that the access is unauthorized.
28 Citations
32 Claims
-
1. A method for preventing an unauthorized access to the Internet by a user or a user computer based on authorization data, the method comprising:
-
identifying an access by the user or the user computer at or before an entry point;
receiving incoming authorization data associated with the access;
analyzing the incoming authorization data using information contained in an authorization database to determine the access is authorized; and
blocking the access beyond the entry point if the access is not authorized. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An access control system for preventing an unauthorized access to the Internet by a user or a user computer, the system comprising;
-
a memory containing an authorization database related to the user or the user computer; and
a microprocessor programmed to block an access beyond an entry point by the user or the user computer when an analysis of incoming authorization data received from the user or the user computer based on information contained in the authorization database indicates that the access is unauthorized. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for preventing an unauthorized access to the Internet by a user or a user computer, the method comprising:
-
identifying an access by the user or the user computer at or before an entry point;
receiving incoming authorization data for the access;
analyzing the incoming authorization data using information contained in an authorization database to determine whether the access is authorized; and
causing the access to be blocked at or before the entry point, if the access is not authorized. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A system for preventing an unauthorized access to the Internet by a user or a user computer, the system comprising:
-
means for identifying an access by the user or the user computer at or before an entry point;
means for receiving incoming authorization data for the access;
means for analyzing the incoming authorization data using information contained in an authorization database to determine whether the access is authorized; and
means for causing the access to be blocked at or before the entry point, if the access is not authorized. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A computer-readable medium containing instructions for controlling a computer system to perform a method for preventing an unauthorized access to the Internet by a user or a user computer, the method comprising:
-
identifying an access by the user or the user computer at or before an entry point;
receiving incoming authorization data for the access;
analyzing the incoming authorization data using information contained in an authorization database to determine whether the access is authorized; and
causing the access to be blocked at or before the entry point, if the access is not authorized.
-
Specification