System and method for restricting access to an enterprise network
First Claim
Patent Images
1. A method for determining whether a computer has one or more malicious code items, comprising:
- determining whether a computer that may be connected to an enterprise network on a temporary basis has one or more malicious code items, the computer accompanying a visitor to a facility associated with the enterprise network;
providing an indication to a human if it is determined that the computer has one or more malicious code items;
printing a label to adhere to the computer to identify the computer as having passed an inspection for malicious code items.
4 Assignments
0 Petitions
Accused Products
Abstract
One aspect of the invention is a method for restricting access to an enterprise network that includes determining whether a computer that may be connected to an enterprise network on a temporary basis has one or more malicious code items where the computer accompanies a visitor to a facility associated with the enterprise network. An indication is provided to a human if it is determined that the computer has one or more malicious code items.
58 Citations
74 Claims
-
1. A method for determining whether a computer has one or more malicious code items, comprising:
-
determining whether a computer that may be connected to an enterprise network on a temporary basis has one or more malicious code items, the computer accompanying a visitor to a facility associated with the enterprise network; providing an indication to a human if it is determined that the computer has one or more malicious code items; printing a label to adhere to the computer to identify the computer as having passed an inspection for malicious code items. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for determining whether a computer has one or more malicious code items, comprising:
-
determining whether a computer that may be connected to an enterprise network on a temporary basis has one or more malicious code items, the computer accompanying a visitor to a facility associated with the enterprise network; providing an indication to a human if it is determined that the computer has one or more malicious code items; and printing a label to adhere to the computer to identify the computer as having failed an inspection for malicious code items. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A system for determining whether a computer has one or more malicious code items, comprising:
-
an enterprise network; and a security verification station associated with the enterprise network, the security verification station at least partially isolated from the enterprise network and operable to; determine whether a computer that may be connected to the enterprise network on a temporary basis has one or more malicious code items, the computer accompanying a visitor to a facility associated with the enterprise network; provide an indication to a human if it is determined that the computer has one or more malicious code items; and print a label to adhere to the computer to identify the computer as having passed an inspection for malicious code items. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A system for determining whether a computer has one or more malicious code items, comprising:
-
an enterprise network; and a security verification station associated with the enterprise network, the security verification station at least partially isolated from the enterprise network and operable to; determine whether a computer that may be connected to the enterprise network on a temporary basis has one or more malicious code items, the computer accompanying a visitor to a facility associated with the enterprise network; provide an indication to a human if it is determined that the computer has one or more malicious code items; and print a label to adhere to the computer to identify the computer as having failed an inspection for malicious code items. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74)
-
Specification