Method for managing computer network access
DCFirst Claim
1. A method of controlling computer network access comprising:
- (a) receiving an access configuration file at an endpoint computer;
(b) the endpoint computer initiating a computer network session at a network address;
(c) concurrent with the computer network session in step (b), the endpoint computer initiating another computer network session at another network address;
(d) transmitting to the network address via the computer network session a URL requested in the other computer network session;
(e) receiving in the computer network session data about the requested URL corresponding to category information stored in the access configuration file; and
(f) determining at the endpoint computer whether access to the requested URL is allowed or denied based on information stored in the access configuration file.
3 Assignments
Litigations
1 Petition
Accused Products
Abstract
A client computer initiates a first communication session at a first network address and receives therefrom a second network address. The client computer then initiates a second communication session at the second network address and receives therefrom an access configuration including a control setting for a communication protocol capable of being utilized during a third communication session. Concurrent with the second communication session, the client computer initiates a third communication session at a third network address whereupon the conveyance of data to or from an instantiated process on the client computer via the third communication session is controlled based on the control setting for the communication protocol.
72 Citations
7 Claims
-
1. A method of controlling computer network access comprising:
-
(a) receiving an access configuration file at an endpoint computer; (b) the endpoint computer initiating a computer network session at a network address; (c) concurrent with the computer network session in step (b), the endpoint computer initiating another computer network session at another network address; (d) transmitting to the network address via the computer network session a URL requested in the other computer network session; (e) receiving in the computer network session data about the requested URL corresponding to category information stored in the access configuration file; and (f) determining at the endpoint computer whether access to the requested URL is allowed or denied based on information stored in the access configuration file. - View Dependent Claims (2, 3)
-
-
4. A method for controlling computer network access, the method comprising the steps of:
-
(a) initiating at a client computer a communication session at a network primary server; (b) receiving at the client computer via the network primary server communication session a network address for a network data server; (c) initiating at the client computer a communication session with the network data server; (d) receiving at the client computer from the network primary server an access configuration including a control setting for at least one communication protocol capable of being utilized during a monitored communication session; (e) instantiating on the client computer a process which initiates a monitored communication session at a network address; (f) in connection with the monitored communication session, controlling the conveyance of data at least one of (i) to and (ii) from the process instantiated on the client computer based on the control setting for the one communication protocol, wherein the one communication protocol is determined from the conveyed data or client communication application, and the control setting is obtained by the client computer from the access configuration; and (g) transferring at least part of the conveyed data to the network data server via the communication session between the client computer and the network data server. - View Dependent Claims (5, 6, 7)
-
Specification