System and Method for Restricting Access to an Enterprise Network
First Claim
Patent Images
1. A method for restricting access to an enterprise network, comprising:
- providing a security verification station located in a secured reception area of a facility associated with an enterprise;
determining, at the security verification station, whether a computer that may be connected to an enterprise network associated with the enterprise on a temporary basis has one or more malicious code items, the computer accompanying a visitor to the facility associated with the enterprise; and
providing an indication to a human if it is determined that the computer has one or more malicious code items.
4 Assignments
0 Petitions
Accused Products
Abstract
One aspect of the invention is a method for restricting access to an enterprise network that includes determining whether a computer that may be connected to an enterprise network on a temporary basis has one or more malicious code items where the computer accompanies a visitor to a facility associated with the enterprise network. An indication is provided to a human if it is determined that the computer has one or more malicious code items.
33 Citations
42 Claims
-
1. A method for restricting access to an enterprise network, comprising:
-
providing a security verification station located in a secured reception area of a facility associated with an enterprise; determining, at the security verification station, whether a computer that may be connected to an enterprise network associated with the enterprise on a temporary basis has one or more malicious code items, the computer accompanying a visitor to the facility associated with the enterprise; and providing an indication to a human if it is determined that the computer has one or more malicious code items. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for restricting access to an enterprise network, comprising:
-
an enterprise network associated with an enterprise; and a security verification station located in a secured reception area of a facility associated with the enterprise, the security verification station at least partially isolated from the enterprise network and operable to; determine whether a computer that may be connected to the enterprise network on a temporary basis has one or more malicious code items, the computer accompanying a visitor to the facility associated with the enterprise; and provide an indication to a human if it is determined that the computer has one or more malicious code items. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification