COMPUTER NETWORK CROSS-BOUNDARY PROTECTION
First Claim
Patent Images
1. A computer security method comprising:
- detecting access, by a computer in a first computer network, to a computer-readable document;
determining whether the computer-readable document was retrieved from a second computer network;
identifying a reference, associated with the computer-readable document, to a resource at a location within the first computer network; and
preventing access by the computer to the resource at the location within the first computer network responsive to determining that the computer-readable document was retrieved from the second computer network.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer security method including detecting access, by a computer in a first computer network, to a computer-readable document, determining whether the computer-readable document was retrieved from a second computer network, identifying a reference, associated with the computer-readable document, to a resource at a location within the first computer network, and preventing access by the computer to the resource at the location within the first computer network responsive to determining that the computer-readable document was retrieved from the second computer network.
-
Citations
20 Claims
-
1. A computer security method comprising:
-
detecting access, by a computer in a first computer network, to a computer-readable document; determining whether the computer-readable document was retrieved from a second computer network; identifying a reference, associated with the computer-readable document, to a resource at a location within the first computer network; and preventing access by the computer to the resource at the location within the first computer network responsive to determining that the computer-readable document was retrieved from the second computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer security system comprising:
-
an access manager configured to detect access, by a computer in a first computer network, to a computer-readable document, determine whether the computer-readable document was retrieved from a second computer network, identify a reference, associated with the computer-readable document, to a resource at a location within the first computer network; and a security manager configured to prevent access by the computer to the resource at the location within the first computer network responsive to determining that the computer-readable document was retrieved from the second computer network. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for providing computer security, the computer program product comprising:
-
a non-transitory, computer-readable storage medium; and computer-readable program code embodied in the storage medium, wherein the computer-readable program code is configured to detect access, by a computer in a first computer network, to a computer-readable document, determine whether the computer-readable document was retrieved from a second computer network, identify a reference, associated with the computer-readable document, to a resource at a location within the first computer network, and prevent access by the computer to the resource at the location within the first computer network responsive to determining that the computer-readable document was retrieved from the second computer network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification