End Point Control
First Claim
1. A method of determining an operating environment of a remote computer, comprising:
- installing an interrogator agent onto the remote computer; and
receiving interrogation results produced by the interrogator agent.
18 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer'"'"'s ability to access a resource is determined based upon the computer'"'"'s operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer'"'"'s access to the requested resource.
-
Citations
2 Claims
-
1. A method of determining an operating environment of a remote computer, comprising:
-
installing an interrogator agent onto the remote computer; and receiving interrogation results produced by the interrogator agent.
-
-
2-18. -18. (canceled)
Specification