Classifying an Operating Environment of a Remote Computer
14 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer'"'"'s ability to access a resource is determined based upon the computer'"'"'s operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer'"'"'s access to the requested resource.
120 Citations
14 Claims
-
1. (canceled)
-
2. A method for classifying an operating environment of a remote computer, the method comprising:
-
maintaining a list of zones of trust in memory, each zone of trust associated with a set of resources; and executing instructions stored in memory, wherein execution of the instructions by a processor; selects a zone of trust from the list of zones of trust, wherein the selected zone of trust is defined by a signature comprising one or more literal values concerning a computer state, compares the one or more literal values with a corresponding state of the operating environment of the remote computer, and classifies the operating environment of the remote computer into the selected zone of trust when the one or more literal values are true for the operating environment, wherein classification into the selected zone of trust includes access to the set of resources associated with the selected zone of trust. - View Dependent Claims (3, 4, 5, 6, 7)
-
-
8. A system for classifying an operating environment of a remote computer, the system comprising:
-
a policy server that; maintains a list of zones of trust in memory, each zone of trust associated with a set of resources, selects a zone of trust from the list of zones of trust, wherein the selected zone of trust is defined by a signature comprising one or more literal values concerning a computer state, and compares the one or more literal values with a corresponding state of the operating environment of the authenticated remote computer; and an end point control server for classifying the operating environment of the authenticated remote computer into the selected zone of trust when the one or more literal values are true for the operating environment, wherein classification into the selected zone of trust includes access to the set of resources associated with the selected zone of trust. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for classifying an operating environment of a remote computer, the method comprising:
-
maintaining a list of zones of trust in memory, each zone of trust associated with a set of resources; selecting a zone of trust from the list of zones of trust, wherein the selected zone of trust is defined by a signature comprising one or more literal values concerning a computer state; comparing the one or more literal values with a corresponding state of the operating environment of the remote computer; and classifying the operating environment of the remote computer into the selected zone of trust when the one or more literal values are true for the operating environment wherein classification into the selected zone of trust includes access to the set of resources associated with the selected zone of trust.
-
Specification