Access Control Method And Apparatus
First Claim
1. A method of controlling access to computing resources, comprising:
- providing a first computing device with access to a database containing data indicative of a plurality of computing resources access to which is controlled by said first computing device and a minimum level of required security capability that a second computing device must possess to be provided with access to said respective computing resources;
assigning said second computing device a security capability;
providing said second computing device with data indicative of said security capability;
configuring said first computing device to respond to receiving said data indicative of said security capability and data indicative of a desired access from said second computing device by ascertaining the minimum level of required security capability corresponding to said desired access and by comparing said minimum level of required security capability with said security capability of said second computing device; and
providing said desired access if said security capability of said second computing device meets said minimum security capability for said desired access.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desired access.
85 Citations
19 Claims
-
1. A method of controlling access to computing resources, comprising:
-
providing a first computing device with access to a database containing data indicative of a plurality of computing resources access to which is controlled by said first computing device and a minimum level of required security capability that a second computing device must possess to be provided with access to said respective computing resources; assigning said second computing device a security capability; providing said second computing device with data indicative of said security capability; configuring said first computing device to respond to receiving said data indicative of said security capability and data indicative of a desired access from said second computing device by ascertaining the minimum level of required security capability corresponding to said desired access and by comparing said minimum level of required security capability with said security capability of said second computing device; and providing said desired access if said security capability of said second computing device meets said minimum security capability for said desired access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 18)
-
-
8. A method of requesting access to a remote computing resource from a user computing device, comprising:
-
providing said user computing device with data indicative of a security capability of said user computing device; transmitting to a remote computing device said security capability and data indicative of a desired access, so that said remote computing device can assess whether said security capability meets a minimum level of required security capability specified for said desired access; and receiving data indicative of allowance of said desired access if said security capability meets said minimum level of required security capability specified for said desired access. - View Dependent Claims (9, 10, 19)
-
-
11. An access control system for controlling access to a computing resource from a user computing device, comprising:
-
an access server; a database accessible by said access server containing data indicative of a plurality of types of computing resources access to which is controlled by said access server and of a minimum level of required security capability that said user computing device must possess to be granted said respective types of access to said access server; wherein said access server is configured to receive data indicative of said security capability and data indicative of a desired access from said user computing device, to ascertain from said database the minimum level of required security capability corresponding to said desired access, to compare said minimum level of required security capability with said security capability of said user computing device, and to provide said desired access if said security capability of said user computing device meets said minimum security capability for said desired access. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A user computing device for use in accessing a remote computing resource, comprising:
-
a telecommunications module for communicating accessing said remote computing resource; a processor in data communication with said telecommunications module; and software executable on said processor; wherein said user computing device is controllable to transmit a request for access to said remote computing resource, to receive in response a request for security data pertaining to said user computing device software from or on behalf of said remote computing resource, and to respond to said request by returning said security data. - View Dependent Claims (17)
-
Specification