Client enforced network tunnel vision
First Claim
1. One or more computer-readable media comprising computer-executable instructions for restricting network access based on one or more monitored states, the computer-executable instructions directed to steps comprising:
- monitoring the one or more monitored states;
comparing the one or more monitored states to one or more benchmark states indicating acceptable states;
restricting network access if the comparing indicates that the one or more monitored states are not acceptable; and
re-enabling network access if the one or more monitored unacceptable states become acceptable.
2 Assignments
0 Petitions
Accused Products
Abstract
If a service detects that a state of a computer system deviates from an acceptable state, the computer system can be prevented from accessing network resources or locations, except for those network resources or locations that would bring the state into compliance. Monitored states can include whether applications or the operating system have been properly purchased, whether they have been properly updated, and whether they are being properly used given the environment of their usage. Network restrictions can be implemented through a parental control mechanism, a domain name service mechanism, or other like mechanisms, and can include redirection to appropriate network resources or locations.
78 Citations
20 Claims
-
1. One or more computer-readable media comprising computer-executable instructions for restricting network access based on one or more monitored states, the computer-executable instructions directed to steps comprising:
-
monitoring the one or more monitored states; comparing the one or more monitored states to one or more benchmark states indicating acceptable states; restricting network access if the comparing indicates that the one or more monitored states are not acceptable; and re-enabling network access if the one or more monitored unacceptable states become acceptable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of enforcing a policy, the method comprising the steps of:
-
monitoring one or more monitored states associated with the policy; comparing the one or more monitored states to one or more benchmark states selected according to the policy; restricting network access if the comparing indicates that the one or more monitored states are not in conformance with the policy; and re-enabling network access if the one or more monitored states changes to conform with the policy. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A parental control mechanism for limiting activities of one or more users of a computing device, the parental control mechanism performing steps comprising:
-
receiving a request to restrict network access based on the activities of the one or more users, the activities of the one or more users consisting of at least one of;
failing to properly purchase a license to one or more software products installed on the computing device, failing to properly apply critical updates to one or more software products installed on the computing device, and attempting to access specific network resources during predetermined times; andrestricting network access for the one or more users, the one or more users comprising non-administrator and administrator users. - View Dependent Claims (17, 18, 19, 20)
-
Specification