Federating trust in a heterogeneous network
First Claim
Patent Images
1. A method implemented by a service provider, the method comprising:
- receiving, by a communication interface of the service provider, an access request to access a network from a first device;
determining, by a processor of the service provider, whether a security check is to be performed on the first device;
causing, by the processor of the service provider and when the security check is to be performed on the first device, the security check to be performed on the first device; and
granting, by the processor of the service provider, the access request or redirecting, by the processor of the service provider, traffic from the first device based on a result of the security check.
12 Assignments
0 Petitions
Accused Products
Abstract
A check of a processing device is performed. A device may receive a network access request to access a network from a first processing device. A security check may be caused to be performed on the first processing device. Whether to grant the network access request to the first processing device is based on a result of the security check.
44 Citations
25 Claims
-
1. A method implemented by a service provider, the method comprising:
-
receiving, by a communication interface of the service provider, an access request to access a network from a first device; determining, by a processor of the service provider, whether a security check is to be performed on the first device; causing, by the processor of the service provider and when the security check is to be performed on the first device, the security check to be performed on the first device; and granting, by the processor of the service provider, the access request or redirecting, by the processor of the service provider, traffic from the first device based on a result of the security check. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for performing a security check of a user device, the system comprising:
at least one device to; cause the security check to be performed on the user device, and cause traffic from the user device to be redirected when the security check indicates that the user device is not in conformance with a security policy, to present to a user, via the user device, an option to purchase or update a security product. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
18. A system comprising:
-
a memory to store instructions; and a processor to execute the instructions to implement; means for causing a security check to be performed on a user device before permitting the user device to access a network; means for redirecting traffic from a user device when a result of a security check indicates that the user device is not in conformance with a security policy, and means for providing a user, via a user device, an option to purchase a security product, update a security product, or continue accessing the network without purchasing or updating the security product. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A method performed by a service provider device, the method comprising:
-
receiving a network access request at the service provider device from a user device; and determining, via the service provider device, whether to grant the network access request based on a security scan of the user device.
-
-
24. A computer-readable memory device having instructions recorded thereon, the instructions comprising:
-
a first plurality of instructions to cause a processor to receive a network access request from a user device; and a second plurality of instructions to cause the processor to determine whether to grant the network access request based on a security scan of the user device.
-
-
25. A method performed by a service provider device, the method comprising:
-
receiving a network access request at a service provider device from a user device; and causing, via the service provider device, a security scan of the user device to be performed in response to receiving the network access request.
-
Specification