System and method for restricting access to an enterprise network
First Claim
Patent Images
1. A method for restricting access to an enterprise network, comprising:
- connecting, by a security verification station, to a computer before the computer is able to access the enterprise network, the security verification station comprising a stand-alone device, separate from the computer, that is isolated from the enterprise network;
determining, by the security verification station, whether the computer has one or more malicious code items;
providing, by the security verification station, an indication if it is determined that the computer has one or more malicious code items; and
printing a label to identify the computer as having either passed or failed an inspection for malicious code items.
4 Assignments
0 Petitions
Accused Products
Abstract
One aspect of the invention is a method for restricting access to an enterprise network that includes determining whether a computer that may be connected to an enterprise network on a temporary basis has one or more malicious code items where the computer accompanies a visitor to a facility associated with the enterprise network. An indication is provided to a human if it is determined that the computer has one or more malicious code items.
27 Citations
33 Claims
-
1. A method for restricting access to an enterprise network, comprising:
-
connecting, by a security verification station, to a computer before the computer is able to access the enterprise network, the security verification station comprising a stand-alone device, separate from the computer, that is isolated from the enterprise network; determining, by the security verification station, whether the computer has one or more malicious code items; providing, by the security verification station, an indication if it is determined that the computer has one or more malicious code items; and printing a label to identify the computer as having either passed or failed an inspection for malicious code items. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A security verification station for restricting access to an enterprise network, comprising:
-
a processor; and a computer-readable medium storing instructions that, when executed, cause the processor to perform at least the following steps before a computer brought to a secured reception area of a facility associated with the enterprise network is able to connect to the enterprise network; establish a communication path with the computer; determine whether the computer has one or more malicious code items; provide an indication to a human if it is determined that the computer has one or more malicious code items; and print a label to identify the computer as having either passed or failed an inspection for malicious code items, wherein the security verification station is located in the secured reception area; and wherein the security verification station comprises a stand-alone device, separate from the computer, that is isolated from the enterprise network. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification