Method and apparatus for protecting a remediated computer network from entry of a vulnerable computer system thereinto
First Claim
Patent Images
1. A method for protecting a computer network from vulnerabilities, comprising:
- quarantining a computer system seeking to connect to said computer network until said quarantined computer system is remediated; and
upon completing remediation of said quarantined computer system, connecting said remediated computer system to said computer network.
3 Assignments
0 Petitions
Accused Products
Abstract
Method and apparatus for protecting a remediated computer network during reconnection of a previously disconnected computer system. Upon initiation of reconnection to the computer network, the previously disconnected computer system raises a firewall to temporarily limit exchanges between the computer system and the remediated computer network until after a client remediation server residing on the computer network has resolved vulnerabilities of the computer system. The limitations on exchanges between the computer system and the remediated computer network are then removed by lowering the firewall.
-
Citations
31 Claims
-
1. A method for protecting a computer network from vulnerabilities, comprising:
-
quarantining a computer system seeking to connect to said computer network until said quarantined computer system is remediated; and
upon completing remediation of said quarantined computer system, connecting said remediated computer system to said computer network. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. For a computer network comprised of a plurality of computer systems and a client remediation server coupled to each one of said plurality of computer systems, said client remediation server remediating said computer network by resolving vulnerabilities in said plurality of computer systems, a method for protecting said remediated computer network from unresolved vulnerabilities, comprising:
if one of said computer systems of said remediated computer network is disconnected from said remediated computer network, upon a subsequent re-connection of said computer system to said remediated computer network, temporarily limiting exchanges between said remediated computer network and said computer systems. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
14. A method for protecting a computer network from nefarious software associated with a computer system being connected to said computer network, comprising:
-
upon initiating a connection between said computer system and said computer network, quarantining said computer system from said computer network;
performing a scan on said computer system;
lifting said quarantine of said computer system upon completing the removal of any nefarious software detected by said scan. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A remediated computer network comprising:
-
a computer system; and
a client remediation server coupled to said computer system, said client remediation server configured to periodically resolve vulnerabilities in said computer system;
wherein said computer system includes a firewall for periodically isolating said computer system, from said remediated computer network, until said client remediation server resolves vulnerabilities of said computer system. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer system, comprising:
-
a processor subsystem;
a memory subsystem coupled to said processor subsystem;
at least one application residing in said memory subsystem and executable by said processor subsystem; and
a firewall switchable between a closed position in which traffic to and/or from said computer system is restricted and an open position in which traffic to and/or from said computer system is unrestricted;
wherein said firewall is configured to switch into said closed position upon power-up of said computer system and upon initiation of registration with a computer network. - View Dependent Claims (31)
-
Specification