Apparatus, and method for implementing remote client integrity verification
First Claim
1. An apparatus for verifying the security integrity of remote network devices, comprising:
- a proxy device for receiving a request for network services by at least one remote network device and performing a security integrity scanning operation on the requesting remote network device; and
an authorization processing unit and access control rules unit for determining if the remote network device is authorized to access the requested network services based on the results of the security scanning operation.
4 Assignments
0 Petitions
Accused Products
Abstract
Apparatus, system, method and computer program product for verifying the integrity of remote network devices that request access to network services and resources. Unintended computer programs such as viruses, worms, or Trojan horses, may compromise remote devices. The invention involves downloading verification software over the web into the web browser of a client for the purpose of performing checks to verify the integrity and security of the client'"'"'s device or system. The results of such checks are returned over the web to be used in security decisions involving authentication and the grant of authorization to access services and resources.
80 Citations
48 Claims
-
1. An apparatus for verifying the security integrity of remote network devices, comprising:
-
a proxy device for receiving a request for network services by at least one remote network device and performing a security integrity scanning operation on the requesting remote network device; and
an authorization processing unit and access control rules unit for determining if the remote network device is authorized to access the requested network services based on the results of the security scanning operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for verifying security integrity of remote network devices, comprising:
-
at least one remote network device that accesses a network via a network connection to make a request for one or more network resident services;
a gateway device for receiving the request for services and performing a security integrity scanning operation on the remote network device prior to allowing access to the requested network services;
an authentication server that verifies user authentication credentials of users of remote network devices that access the network; and
at least one network server that provides requested network services to at least one remote network device accessing the network through the gateway device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 28)
-
-
22. A method for verifying security integrity of remote network devices, that includes the steps of:
-
defining at least one variable used as a vehicle to convey the results of the scanning process downloading verification software via a network connection to the remote network device that performs scanning process and reports result used in scanning script includes at least one variable performing at least one scanning operation on the remote network device to verify the security integrity of the remote device; and
obtaining the results of the scanning operation for purposes of determining whether or not the remote network device is authorized to access the requested network services. - View Dependent Claims (23, 24, 25, 26, 27, 29, 30, 31, 32, 33, 34)
-
-
35. A method for assessing the integrity of remote network devices for purposes of regulating access to network services via a network gateway comprising the steps of:
-
defining at least one access control policy for accessing network services wherein the access control policy depends, at least in part, on the results of an integrity scan performed on the remote network device;
downloading verification software that an administyrator can specify what scan scripts are to used under what conditions to the remote network device;
performing an integrity scan on the remote network device and conveying at least one result of the scan to a gateway device; and
regulating access by the remote network device to network services via the gateway device based, at least in part, on the results of the integrity scan. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
Specification