Remote access to resources over a network
First Claim
1. A method of determining and updating the computing environment of a client computer, comprising:
- a client computer sending a request to an access server requesting access to a remote resource;
the access server establishing a secure communication channel between the client computer and a server system;
installing a pre-authentication interrogator agent onto the client computer using the secure communication channel, the server system receiving a first set of interrogation results produced by the pre-authentication interrogator agent that describe one or more objects of the computing environment of the client computer;
authenticating that the first set of interrogation results correspond to at least one of a known client computer or to a known client computer user;
installing a post-authentication interrogator agent on the client computer using the secure communication channel, the server system receiving a second set of interrogation results that describe one or more other objects of the computing environment of the client computer; and
providing the remote resource to the client computer over the secure communication channel upon determination by a policy server that the first and second sets of interrogation results comply with a policy rule, the policy rule specifying a condition for the user of the client device to access the requested resource, and wherein the remote resource is provided by the server system.
20 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer'"'"'s ability to access a resource is determined based upon the computer'"'"'s operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer'"'"'s access to the requested resource.
-
Citations
10 Claims
-
1. A method of determining and updating the computing environment of a client computer, comprising:
-
a client computer sending a request to an access server requesting access to a remote resource; the access server establishing a secure communication channel between the client computer and a server system; installing a pre-authentication interrogator agent onto the client computer using the secure communication channel, the server system receiving a first set of interrogation results produced by the pre-authentication interrogator agent that describe one or more objects of the computing environment of the client computer; authenticating that the first set of interrogation results correspond to at least one of a known client computer or to a known client computer user; installing a post-authentication interrogator agent on the client computer using the secure communication channel, the server system receiving a second set of interrogation results that describe one or more other objects of the computing environment of the client computer; and providing the remote resource to the client computer over the secure communication channel upon determination by a policy server that the first and second sets of interrogation results comply with a policy rule, the policy rule specifying a condition for the user of the client device to access the requested resource, and wherein the remote resource is provided by the server system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification