Provisioning an operating environment of a remote computer
First Claim
1. A method of provisioning an operating environment of a remote computer, the method comprising:
- providing a first interrogator agent for installation onto the remote computer to determine artifacts present on the remote computer;
authenticating an identity of a user of the remote computer based on information regarding the artifacts received from the first interrogator agent;
providing a second interrogator agent for installation on the remote computer based on the authentication of the identity of the user of the remote computer;
determining whether to grant the user access to a resource based on;
information received from the second interrogator agent, anda zone of trust associated with a user and criteria associated with the zone of trust, wherein determining the zone of trust includes;
classifying the user as a member of a community comprising a plurality of zones of trust,creating a graph of signatures associated with each zone of trust, andassociating the information concerning artifacts with a signature from the graph; and
providing a process object for provisioning the remote computer to access the resource based on the determination.
18 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer'"'"'s ability to access a resource is determined based upon the computer'"'"'s operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer'"'"'s access to the requested resource.
76 Citations
16 Claims
-
1. A method of provisioning an operating environment of a remote computer, the method comprising:
-
providing a first interrogator agent for installation onto the remote computer to determine artifacts present on the remote computer; authenticating an identity of a user of the remote computer based on information regarding the artifacts received from the first interrogator agent; providing a second interrogator agent for installation on the remote computer based on the authentication of the identity of the user of the remote computer; determining whether to grant the user access to a resource based on; information received from the second interrogator agent, and a zone of trust associated with a user and criteria associated with the zone of trust, wherein determining the zone of trust includes; classifying the user as a member of a community comprising a plurality of zones of trust, creating a graph of signatures associated with each zone of trust, and associating the information concerning artifacts with a signature from the graph; and providing a process object for provisioning the remote computer to access the resource based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-readable storage medium, having embodied thereon a program, the program being executable by a processor to perform a method for provisioning an operating environment of a remote computer, the method comprising:
-
providing a first interrogator agent for installation onto the remote computer to determine artifacts present on the remote computer; authenticating an identity of a user of the remote computer based on information regarding the artifacts received from the first interrogator agent; providing a second interrogator agent for installation on the remote computer based on the authentication of the identity of the user of the remote computer; determining whether to permit the user to access a resource based on; information received from the second interrogator agent, and a zone of trust associated with a user and criteria associated with the zone of trust, wherein determining the zone of trust includes; classifying the user as a member of a community comprising a plurality of zones of trust, creating a graph of signatures associated with each zone of trust, and associating the information concerning artifacts with a signature from the graph; and providing a process object for provisioning the remote computer to access the resource based on the determination. - View Dependent Claims (14, 15, 16)
-
Specification