System, method, apparatus and computer program product for facilitating digital communications
First Claim
1. A computer-implemented method for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
- storing at least one client policy, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer;
receiving a request from a user for access to said computer;
determining a location type of said remote computer;
selecting a desired policy from among said at least one client policy based on said location type of said remote computer;
selecting a connection type from available connections to said computer based on said desired policy;
verifying that said remote computer conforms with said desired policy; and
connecting said client to said computer.
9 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method and apparatus prevents unsecured access to a computer over a network by a client running on a remote computer. In one aspect of the present invention, a client policy is stored on the remote computer. The client policy includes a configuration of the remote computer that reduces the likelihood of a security breach of the computer as a result of the remote computer accessing the computer. A request is received from a user for access to the computer. It is verified that the remote computer conforms with the client policy, and the client is connected to said computer.
-
Citations
16 Claims
-
1. A computer-implemented method for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
storing at least one client policy, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer; receiving a request from a user for access to said computer; determining a location type of said remote computer; selecting a desired policy from among said at least one client policy based on said location type of said remote computer; selecting a connection type from available connections to said computer based on said desired policy; verifying that said remote computer conforms with said desired policy; and connecting said client to said computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product including a computer storage medium, said computer storage medium comprising one of volatile media and non-volatile media, and a computer program code mechanism embedded in the computer storage medium for preventing unsecured access to a computer over a network by a client running on a remote computer, the computer code mechanism comprising:
-
a computer code device configured to store at least one client policy, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer; a computer code device configured to receive a request from a user for access to said computer; a computer code device configured to determine a location type of said remote computer; a computer code device configured to select a desired policy from among said at least one client policy based on said location type of said remote computer; a computer code device configured to select a connection type from available connections to said computer based on said desired policy; a computer code device configured to verify that said remote computer conforms with said desired policy; and a computer code device configured to connect said client to said computer; wherein said remote computer accesses said computer over said network if said remote computer conforms with said desired policy.
-
-
11. An apparatus for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
means for storing at least one client policy, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer; means for receiving a request from a user for access to said computer;
means for determining a location type of said remote computer;means for selecting a desired policy from among said at least one client policy based on said location type of said remote computer; means for selecting a connection type from available connections to said computer based on said desired policy; means for verifying that said remote computer conforms with said desired policy; and means for connecting said client to said computer.
-
-
12. An apparatus for preventing unsecured access to a computer over a network by a client running on a remote computer comprising:
-
a storage mechanism configured to store at least one client policy, said client policy including a configuration of said remote computer that reduces the likelihood of a security breach of said computer as a result of said remote computer accessing said computer; an input/output device configured to receive a request from a user for access to said computer; and a processor including; a location determination mechanism configured to determine a location type of said remote computer; a policy selection mechanism configured to select a desired policy from among said at least one client policy based on said location type of said remote computer; a connection selection mechanism configured to select a connection type from available connections to said computer based on said desired policy; and a verification mechanism configured to verify that said remote computer conforms with said desired policy, wherein said input/output device is configured to connect said client to said computer. - View Dependent Claims (13, 14, 15, 16)
-
Specification