Method for Managing Computer Network Access
First Claim
1. A method of controlling computer network access comprising:
- (a) a server computer receiving via a computer network from an endpoint computer of the computer network a request for an access configuration file;
(b) the server computer dispatching to said endpoint computer an access configuration file; and
(c) following step (b), the server computer dispatching to said endpoint computer an update to the access configuration file dispatched in step (b) or another access configuration file.
3 Assignments
0 Petitions
Accused Products
Abstract
In a method of controlling computer network access, a server computer receives via a computer network from an endpoint computer of the computer network a request for an access configuration file. In response, the server computer dispatches to the endpoint computer an access configuration file. Thereafter, the server computer dispatches to the endpoint computer an update to the dispatched access configuration file or another access configuration file. The server computer can store data received from the endpoint computer regarding a violation of at least one policy included in the access configuration file, the updated access configuration file, or the other access configuration file. The server computer can either dispatch a unique access configuration file to each endpoint computer for which a unique access configuration file was prepared or dispatch a generic access configuration file to each endpoint computer for which a unique access configuration file was not prepared.
35 Citations
4 Claims
-
1. A method of controlling computer network access comprising:
-
(a) a server computer receiving via a computer network from an endpoint computer of the computer network a request for an access configuration file; (b) the server computer dispatching to said endpoint computer an access configuration file; and (c) following step (b), the server computer dispatching to said endpoint computer an update to the access configuration file dispatched in step (b) or another access configuration file.
-
-
2. The method of claim 2, further including:
(d) the server computer storing data received from said endpoint computer regarding a violation of at least one policy included in the access configuration file, the updated access configuration file, or the other access configuration file.
-
3. A method of controlling computer network access comprising:
-
(a) a server computer receiving via a computer network from endpoint computers of the computer network requests for access configuration files; (b) the server computer dispatching a unique access configuration file to each endpoint computer for which a unique access configuration file was prepared; and (c) the server computer dispatching a generic access configuration file to each endpoint computer for which a unique access configuration file was not prepared. - View Dependent Claims (4)
-
Specification