Network security method
First Claim
Patent Images
1. A method, comprising:
- detecting software installed on a first computer;
checking the software to see if the first computer is security compliant;
preventing the first computer from communicating with a second computer if it is security non-compliant; and
allowing the first computer to communicate with a third computer, the third computer making the first computer security compliant.
0 Assignments
0 Petitions
Accused Products
Abstract
A method includes detecting software installed on a first computer; checking the software to see if it is security compliant; preventing the first computer from communicating with a second computer if the software is security non-compliant; and allowing the first computer to communicate with a third computer, the third computer making the first computer security compliant.
-
Citations
20 Claims
-
1. A method, comprising:
-
detecting software installed on a first computer;
checking the software to see if the first computer is security compliant;
preventing the first computer from communicating with a second computer if it is security non-compliant; and
allowing the first computer to communicate with a third computer, the third computer making the first computer security compliant. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
providing a first computer which runs software;
detecting with a second computer the software running on the first computer to see if it needs to be updated;
allowing the first computer to communicate with a third computer if the software has been updated;
preventing the first computer from communicating with the third computer if the software has not been updated; and
updating the software on the first computer if it needs to be updated so that the first computer is security compliant. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
detecting software installed on a plurality of computers;
checking the software installed on each computer to see if it is up to date;
allowing each computer in the plurality of computers to connect to a first communication network if its software is up to date;
allowing each computer in the plurality of computers to connect to a second communication network if its software is not up to date; and
updating the software installed on each computer if it is not up to date. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification