Systems and methods of controlling network access
DCFirst Claim
1. A method for network access control, the method comprising:
- receiving audit data pertaining to a device that does not have access to a less-restricted subset of a network;
auditing the device in accordance with a security policy based at least in part on the audit data;
reconfiguring an access point to allow access to the less-restricted subset of the network in response to the security policy audit;
receiving updated audit data pertaining to the device subsequent to reconfiguring the access point; and
monitoring continued compliance of the device with the security policy using the updated audit data.
1 Assignment
Litigations
1 Petition
Accused Products
Abstract
A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.
95 Citations
19 Claims
-
1. A method for network access control, the method comprising:
-
receiving audit data pertaining to a device that does not have access to a less-restricted subset of a network; auditing the device in accordance with a security policy based at least in part on the audit data; reconfiguring an access point to allow access to the less-restricted subset of the network in response to the security policy audit; receiving updated audit data pertaining to the device subsequent to reconfiguring the access point; and monitoring continued compliance of the device with the security policy using the updated audit data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification