Remote access to resources over a network
First Claim
1. A non-transitory computer readable storage medium having embodied thereon a program executable to perform a method for administrating rules to access resources hosted by a server, the method comprising:
- displaying existing access rules when existing rules governing access to a particular resource are currently defined;
defining access rules when there are no rules currently governing access to a particular resource; and
adding access rules that govern access rights to the particular resource, wherein the access rules,permit or deny access to the particular resource to a user of a remote computer,identify a user of a remote computer,download interrogator agents on the remote computer when desired, anddefine zones of trust corresponding to the identity of the user of the remote computer, wherein the zones of trust that correspond to the identity of the user are selected from a list of a plurality of zones of trust administered by a policy server.
20 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer'"'"'s ability to access a resource is determined based upon the computer'"'"'s operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer'"'"'s access to the requested resource.
130 Citations
20 Claims
-
1. A non-transitory computer readable storage medium having embodied thereon a program executable to perform a method for administrating rules to access resources hosted by a server, the method comprising:
-
displaying existing access rules when existing rules governing access to a particular resource are currently defined; defining access rules when there are no rules currently governing access to a particular resource; and adding access rules that govern access rights to the particular resource, wherein the access rules, permit or deny access to the particular resource to a user of a remote computer, identify a user of a remote computer, download interrogator agents on the remote computer when desired, and define zones of trust corresponding to the identity of the user of the remote computer, wherein the zones of trust that correspond to the identity of the user are selected from a list of a plurality of zones of trust administered by a policy server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for administrating rules to access resources hosted by a server, the method comprising:
-
displaying existing access rules when existing rules governing access to a particular resource are currently defined; defining access rules when there are no rules currently governing access to a particular resource; and adding access rules that govern access rights to the particular resource, wherein the access rules, permit or deny access to the particular resource to a user of a remote computer, identify a user of a remote computer, download interrogator agents on the remote computer when desired, and define zones of trust corresponding to the identity of the user of the remote computer, wherein the zones of trust that correspond to the identity of the user are selected from a list of a plurality of zones of trust administered by a policy server. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification