System, apparatuses, methods and computer-readable media for determining security status of computer before establishing connection thereto first group of embodiments-claim set 1
First Claim
1. A method comprising the steps of:
- (a) retrieving security state data at a first computer;
(b) incorporating the security state data into a request message to request a connection with a second computer via a network; and
(c) transmitting the request message including the security state data to the second computer via the network.
3 Assignments
0 Petitions
Accused Products
Abstract
A system of the invention comprises first and second computers. The first computer retrieves and incorporates its security state data in a message requesting a network connection with the second computer. The second computer receives the message and determines whether its security policy data permits connection with the first computer given the security state of the first computer as indicated by its security state data. The security state data can comprise data indicating whether an anti-virus application, firewall application, or operating system are running on the first computer, and are up-to-date. If so, the second computer permits the network connection to proceed. If not, then the second computer either drops the connection request or terminates the connection request by transmitting a disconnection message to the first computer. The invention also comprises related apparatuses, methods, and computer-readable media.
-
Citations
45 Claims
-
1. A method comprising the steps of:
-
(a) retrieving security state data at a first computer;
(b) incorporating the security state data into a request message to request a connection with a second computer via a network; and
(c) transmitting the request message including the security state data to the second computer via the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-readable medium storing computer code that when executed by a first computer attempting to open a network connection with a second computer via a network, the first computer performs the following steps:
-
(a) retrieving security state data at a first computer;
(b) incorporating the security state data into a request message to request a connection with a second computer via a network; and
(c) transmitting the request message including the security state data to the second computer via the network. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. An apparatus using a communications network, the apparatus comprising:
a first computer retrieving security state data related to the first computer, incorporating the security state data into a request message to request a connection with a second computer via the network, and transmitting the request message including the security state data to the second computer via the network. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
Specification