System, method, apparatus, and computer program product for facilitating digital communications
First Claim
1. A computer-implemented method, performed by at least one processor, for preventing unsecured access to a secured computer over a network by a client running on a remote computerhaving a plurality of client policies stored thereon, at least one of the plurality of client policies including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer, the method comprising:
- receiving a request from a user of the remote computer for access to the secured computer;
determining an identity of the user;
selecting, based on the identity of the user, one of the at least one of the plurality of client policies including a configuration of the remote computer that reduces the likelihood of a security breach of the secured computer;
verifying that the remote computer conforms with the selected client policy; and
connecting the client to the secured computer if the remote computer conforms with the selected client policy.
7 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method and apparatus prevents unsecured access to a computer over a network by a client running on a remote computer. In one aspect of the present invention, a client policy is stored on the remote computer. The client policy includes a configuration of the remote computer that reduces the likelihood of a security breach of the computer as a result of the remote computer accessing the computer. A request is received from a user for access to the computer. It is verified that the remote computer conforms with the client policy, and the client is connected to said computer.
-
Citations
28 Claims
-
1. A computer-implemented method, performed by at least one processor, for preventing unsecured access to a secured computer over a network by a client running on a remote computer
having a plurality of client policies stored thereon, at least one of the plurality of client policies including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer, the method comprising: -
receiving a request from a user of the remote computer for access to the secured computer; determining an identity of the user; selecting, based on the identity of the user, one of the at least one of the plurality of client policies including a configuration of the remote computer that reduces the likelihood of a security breach of the secured computer; verifying that the remote computer conforms with the selected client policy; and connecting the client to the secured computer if the remote computer conforms with the selected client policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method, performed by at least one processor, for preventing unsecured access to a secured computer over a network by a client running on a remote computer, the method comprising:
-
transmitting at least one client policy to the remote computer, the at least one client policy including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer; receiving identity information indicating an identity of a user of the remote computer; receiving policy violation information from the remote computer, the policy violation information indicating a policy violation based on the identity of the user; and modifying access rights of the user based on the received policy violation information. - View Dependent Claims (10)
-
-
11. A computer-readable storage medium encoded with a plurality of instructions that, when executed by a computer perform a method of preventing unsecured access to a secured computer over a network by a client running on a remote computer
having at least one client policy stored thereon, the at least one client policy including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer, the method comprising: -
receiving a request from a user of the remote computer for access to the secured computer; receiving identity information indicating an identity of the user; determining whether the remote computer conforms with the at least one client policy, the determination being based, at least in part, on the identity information; and connecting the client to the secured computer if the remote computer conforms with the at least one client policy.
-
-
12. A computer-readable storage medium encoded with a plurality of instructions that, when executed by a computer perform a method of preventing unsecured access to a secured computer over a network by a client running on a remote computer, the method comprising:
-
transmitting at least one client policy to the remote computer, the at least one client policy including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer; receiving identity information indicating an identity of a user of the remote computer; receiving policy violation information from said remote computer, the policy violation information indicating a policy violation based on the identity of the user; and modifying access rights of the user of the remote computer based on the received policy violation information, wherein modifying access rights comprises preventing the remote computer from accessing the secured computer over the network until the policy violation is removed.
-
-
13. An apparatus for preventing unsecured access to a secured computer over a network by a client running on a remote computer having a plurality of client policies stored thereon, at least one of said plurality of client policies including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer, the apparatus comprising:
-
at least one processor programmed to; receive a request from a user of the remote computer for access to the secured computer, the request including identity information indicating an identity of the user; select one of said plurality of client policies based on the identity information; verify that the remote computer conforms with the selected client policy; and connect the client to the secured computer if the remote computer conforms with the required client policy.
-
-
14. An apparatus for preventing unsecured access to a secured computer over a network by a client running on a remote computer, the apparatus comprising:
-
at least one processor programmed to; transmit at least one client policy to the remote computer, the at least one client policy including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer; receive identity information indicating an identity of a user of the remote computer; receive priority violation information from the remote computer, the policy violation information indicating a policy violation based on the identity of the user; and modify access rights of the user of the remote computer based on the received policy violation information.
-
-
15. A computer system comprising:
-
a remote computer comprising a client executing thereon and a storage device configured to store a plurality of client policies, the plurality of client policies comprising at least one client policy including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer; and an input/output device having at least one processor configured to; receive a request from a user of the remote computer for access to the secured computer, the request including identity information indicating an identity of the user; and select one of the plurality of client policies based on the identity information; verify that the remote computer conforms with the selected client policy; and connect the client to the secured computer if the remote computer conforms with the required client policy. - View Dependent Claims (16, 17, 18, 19)
-
-
20. An apparatus for preventing unsecured access to a secured computer over a network by a client running on a remote computer having a plurality of client policies stored thereon, the apparatus comprising:
an input/output device including at least one processor programmed to; transmit at least one client policy to the remote computer, the at least one client policy including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer receive a list of policy violations from the remote computer; receive a request from a user of the remote computer for access to the secured computer, the request including identity information indicating an identity of the user; select one of the plurality of client policies based on the identity information; verify that the remote computer conforms to the selected client policy; and modify access rights of the user of the remote computer for access to the secured computer. - View Dependent Claims (21)
-
22. A computer-implemented method, performed by at least one processor, for preventing unsecured access to a secured computer over a network by a client running on a remote computer, the method comprising:
-
storing a plurality of client policies, at least one of the plurality of client policies including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer; receiving a request from a specified user of the remote computer for access to the secured computer; determining an identity of the specified user; selecting, based on the identity of the specified user, one of the plurality of client policies, the selected client policy including a list of forbidden applications that cannot run on the remote computer if the specified user is using the remote computer and a list of required applications that must run on the remote computer if the specified user is using the remote computer; verifying that the remote computer conforms with the selected client policy; and connecting the client to the secured computer if the remote computer conforms with the selected client policy. - View Dependent Claims (23, 24)
-
-
25. A computer-implemented method, performed by at least one processor, for preventing unsecured access to a secured computer over a network by a client running on a remote computer, the method comprising:
-
storing a plurality of client policies, at least one of the plurality of client policies including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer; receiving a request from a user at the remote computer for access to the secured computer; determining a status of the remote computer; selecting, based on the status of the remote computer, one of the plurality of client policies; verifying that the remote computer conforms with the selected client policy; and connecting the client to the secured computer if the remote computer conforms with the selected client policy.
-
-
26. A computer-implemented method, performed on at least one processor, for preventing unsecured access to a secured computer over a network by a client running on a remote computer, the method comprising:
-
transmitting a client policy to the remote computer, the client policy including a configuration of the remote computer that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer; receiving status information indicating a status of the remote computer; receiving policy violation information from the remote computer, the policy violation information indicating a policy violation based on the status of the remote computer; and modifying access rights of the remote computer to access a resource of the secured computer based on the policy violation information.
-
-
27. A computer-implemented method, performed on at least one processor, for preventing unsecured access to a secured computer over a network by a client running on a remote computer, comprising:
-
storing a plurality of client policies, at least one of the plurality of client policies including information of a preferred connection method that reduces a likelihood of a security breach of the secured computer as a result of the remote computer accessing the secured computer; receiving a request from a user at the remote computer for access to the secured computer; determining a location of the remote computer; selecting, based on the location of the remote computer, one of the plurality of client policies, the selected client policy including the preferred connection method; and connecting the client to the secured computer in accordance with the selected client policy and the preferred connection method. - View Dependent Claims (28)
-
Specification