Compliance validator for restricted network access control
First Claim
1. A method for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network, comprising the steps of:
- creating a compliance validation configuration file for the computer system;
configuring a maintenance service utility to launch a compliance validation executable file at a specified time during operation of the computer system;
generating a digital hash for the compliance validation executable file and the compliance validation configuration file;
determining if the computer system or a computer system user is a member of a configured restricted group;
if the computer system or the computer system user is a member of a configured restricted group, determining if a directory site code for a subnet of the restricted computer network to which the computer system is connected corresponds to a configured and allowed site; and
enforcing compliance with access requirements if the directory site code does not correspond to a configured and allowed site;
determining if there are any updates at a central update location for either the compliance validation executable or configuration files that require installation, based on the digital hash of the compliance validation executable and configuration files;
automatically updating the compliance validation executable file and compliance validation configuration file, if any updates are available;
determining if a compliance validation executable update file has been removed from the central update location;
if the update file has been removed, removing the compliance validation executable file and the compliance validation configuration file from the computer system; and
encrypting a path to the central update location to prevent tampering with at least one of the compliance validation executable update file and the compliance validation configuration file stored at the central update location.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network. A compliance validation configuration file is created for the computer system. A maintenance service utility is configured to launch a compliance validation executable file at a specified time during operation of the computer system. A digital hash is generated for the compliance validation executable file and for the compliance validation configuration file. A determination is made if the computer system or a computer system user is a member of a configured restricted group. If the computer system or the computer system user is a member of a configured restricted group, a determination is made if a directory site code for a subnet of the restricted computer network to which the computer system is connected corresponds to a configured and allowed site. If the directory site code does not correspond to a configured and allowed site, compliance with access requirements are enforced. Enforcement actions can include a forced logoff of the computer system user, and/or a forced shutdown of the computer system.
-
Citations
15 Claims
-
1. A method for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network, comprising the steps of:
-
creating a compliance validation configuration file for the computer system; configuring a maintenance service utility to launch a compliance validation executable file at a specified time during operation of the computer system; generating a digital hash for the compliance validation executable file and the compliance validation configuration file; determining if the computer system or a computer system user is a member of a configured restricted group; if the computer system or the computer system user is a member of a configured restricted group, determining if a directory site code for a subnet of the restricted computer network to which the computer system is connected corresponds to a configured and allowed site; and enforcing compliance with access requirements if the directory site code does not correspond to a configured and allowed site; determining if there are any updates at a central update location for either the compliance validation executable or configuration files that require installation, based on the digital hash of the compliance validation executable and configuration files; automatically updating the compliance validation executable file and compliance validation configuration file, if any updates are available; determining if a compliance validation executable update file has been removed from the central update location; if the update file has been removed, removing the compliance validation executable file and the compliance validation configuration file from the computer system; and encrypting a path to the central update location to prevent tampering with at least one of the compliance validation executable update file and the compliance validation configuration file stored at the central update location. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for detecting and enforcing compliance with access requirements for a computer in a restricted computer network, comprising:
-
a local data store; a processor for executing a plurality of components including; a component for creating a compliance validation configuration file and storing the configuration file in the local data store; a component for configuring a maintenance service utility to launch a compliance validation executable file stored in the local data store at a specified time during operation of the computer; a component for generating a digital hash for the compliance validation executable file and the compliance validation configuration file; a component for determining if the computer or a computer user is a member of a configured restricted group; a component for determining if a directory site code for a subnet of the restricted computer network to which the computer is connected corresponds to a configured and allowed site, if the computer or the computer user is a member of a configured restricted group; and a component for enforcing compliance with access requirements if the directory site code does not correspond to a configured and allowed site; a component for determining if there are any updates at a central update location for either the compliance validation executable or configuration files that require installation, based on the digital hash of the compliance validation executable and configuration files; a component for automatically updating the compliance validation executable file and compliance validation configuration file, if any updates are available; a component for determining if a compliance validation executable update file has been removed from the central update location, and if the update file has been removed, removing the compliance validation executable file and the compliance validation configuration file from the computer; a component for encrypting a path to the central update location to prevent tampering with at least one of the compliance validation executable update file and the compliance validation configuration file stored at the central update location; and a component for automatically removing the compliance validation executable file and the compliance validation configuration file from the computer, if either the computer or the computer user is not a member of a configured restricted group. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network when operated on a processor of the computer system, the program product comprising a computer readable medium having computer readable code embedded therein, the computer readable medium comprising:
-
program instructions that create a compliance validation configuration file for the computer system; program instructions that configure a maintenance service utility to launch a compliance validation executable file at a specified time during operation of the computer system; program instructions that generate a digital hash for the compliance validation executable file and the compliance validation configuration file; program instructions that determine if the computer system or a computer system user is a member of a configured restricted group; and program instructions that determine if a directory site code for a subnet of the restricted computer network to which the computer system is connected corresponds to a configured and allowed site, if the computer system or the computer system user is a member of a configured restricted group; and program instructions that enforce compliance with access requirements if the directory site code does not correspond to a configured and allowed site; program instructions that determine if there are any updates at a central update location for either the compliance validation executable or configuration files that require installation, based on the digital hash of the compliance validation executable and configuration files; program instructions that automatically update the compliance validation executable file and compliance validation configuration file, if any updates are available; program instructions that determine if a compliance validation executable update file has been removed from the central update location; and
program instructions that remove the compliance validation executable file and the compliance validation configuration file from the computer system, if the update file has been removed; andprogram instructions that encrypt a path to the central update location to prevent tampering with at least one of the compliance validation executable update file and the compliance validation configuration file stored at the central update location. - View Dependent Claims (12, 13, 14, 15)
-
Specification