End Point Control
First Claim
1. A method of determining a computing environment, comprising:
- establishing a secure communication method with the client computer in response to receipt of a network connection request from the client computer;
installing an interrogator agent onto a client computer using the secute communication method; and
receiving interrogation results produced by the interrogator agent that describe one or more elements of the computing environment of the client computer.
18 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer'"'"'s ability to access a resource is determined based upon the computer'"'"'s operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer'"'"'s access to the requested resource.
56 Citations
2 Claims
-
1. A method of determining a computing environment, comprising:
-
establishing a secure communication method with the client computer in response to receipt of a network connection request from the client computer; installing an interrogator agent onto a client computer using the secute communication method; and receiving interrogation results produced by the interrogator agent that describe one or more elements of the computing environment of the client computer.
-
-
2-45. -45. (canceled)
Specification