Securing Access to Resources on a Network
First Claim
Patent Images
1. A method comprising:
- receiving a request for at least one resource;
determining whether the at least one resource comprises a secure resource;
in response to determining that the at least one resource comprises a secure resource, causing the at least one resource to be retrieved; and
applying at least one security policy to the at least one resource.
1 Assignment
0 Petitions
Accused Products
Abstract
Secure access to resources on a network may be provided. Upon receiving a request for at least one resource, a determination may be made as to whether the at least one resource comprises a secure resource. In response to determining that the at least one resource comprises a secure resource, the at least one resource may be retrieved; and at least one security policy may be applied to the at least one resource.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a request for at least one resource; determining whether the at least one resource comprises a secure resource; in response to determining that the at least one resource comprises a secure resource, causing the at least one resource to be retrieved; and applying at least one security policy to the at least one resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
a memory storage; and a processing unit coupled to the memory storage, the processing unit configured to; receive a request for at least one resource, determine whether the at least one resource comprises a secure resource, in response to determining that the at least one resource comprises a secure resource, cause the at least one resource to be retrieved, and apply at least one security policy to the at least one resource. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer-readable medium which stores a set of instructions that when executed performs a method executed by the set of instructions comprising:
-
receiving a request for at least one resource; determining whether the at least one resource comprises a secure resource; in response to determining that the request comprises a secure request, causing the at least one resource to be retrieved; and applying at least one security policy to the at least one resource. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification