Method and system for verification of an endpoint security scan
First Claim
Patent Images
1. A method of granting access to resources, the method comprising the steps of:
- (a) receiving a request from a node to access a resource;
(b) generating a scanning agent to gather information about the node;
(c) generating at least one key;
(d) embedding in the scanning agent the at least one generated key;
(e) transmitting the scanning agent to the node;
(f) gathering, by the scanning agent, information regarding the node;
(g) encrypting, by the scanning agent, the gathered information using the at least one generated key;
(h) receiving from the scanning agent the encrypted gathered information; and
(i) decrypting the encrypted gathered information.
8 Assignments
0 Petitions
Accused Products
Abstract
A method of granting access to resources includes the step of receiving a request from a node to access a resource. A scanning agent is generated to gather information about the node. A key is generated and embedded in the scanning agent. The scanning agent is transmitted to the node and gathers information regarding the node. The scanning agent encrypts the gathered information using the at least one generated key. The encrypted gathered information is received from the scanning agent and decrypted.
-
Citations
20 Claims
-
1. A method of granting access to resources, the method comprising the steps of:
-
(a) receiving a request from a node to access a resource;
(b) generating a scanning agent to gather information about the node;
(c) generating at least one key;
(d) embedding in the scanning agent the at least one generated key;
(e) transmitting the scanning agent to the node;
(f) gathering, by the scanning agent, information regarding the node;
(g) encrypting, by the scanning agent, the gathered information using the at least one generated key;
(h) receiving from the scanning agent the encrypted gathered information; and
(i) decrypting the encrypted gathered information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system of granting access to resources by an access gateway comprising:
-
a receiver, receiving a request to access a resource;
an agent constructor, generating a scanning agent for gathering information about the requester, the scanning agent comprising program code;
a key generator, in communication with the receiver and the agent constructor, generating at least one key;
a encryption function generator, in communication with the agent constructor and the key generator, embedding the at least one generated key in the generated scanning agent; and
a decryptor, receiving encrypted gathered information about the requestor and decrypting the gathered information. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification