Remote access to resources over a network
First Claim
1. A method for providing provisioning objects, the method comprising:
- receiving via a user interface an input identifying a resource associated with a rule governing access and a selection of a first zone of trust;
receiving a request to access the resource sent over a communication network from a computing device associated with a person;
interrogating the computing device to identify whether at least one required object is installed on the computing device, the at least one required object corresponding to the first zone of trust and identified by the rule governing access to the resource, wherein the at least one object is installed on the computing device when the at least one required object is not yet installed on the computing device; and
allowing the computing device to access the resource based on the at least one object being installed on the computing device in accordance with the rule governing access to the resource.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer'"'"'s ability to access a resource is determined based upon the computer'"'"'s operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer'"'"'s access to the requested resource.
-
Citations
17 Claims
-
1. A method for providing provisioning objects, the method comprising:
-
receiving via a user interface an input identifying a resource associated with a rule governing access and a selection of a first zone of trust; receiving a request to access the resource sent over a communication network from a computing device associated with a person; interrogating the computing device to identify whether at least one required object is installed on the computing device, the at least one required object corresponding to the first zone of trust and identified by the rule governing access to the resource, wherein the at least one object is installed on the computing device when the at least one required object is not yet installed on the computing device; and allowing the computing device to access the resource based on the at least one object being installed on the computing device in accordance with the rule governing access to the resource. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable storage medium having embodied thereon a program executable by a processor for providing provisioning objects, the method comprising:
-
receiving via a user interface an input identifying a resource associated with a rule governing access and a selection of a first zone of trust; receiving a request to access the resource sent over a communication network from a computing device associated with a person; interrogating the computing device to identify whether at least one required object is installed on the computing device, the at least one required object corresponding to the first zone of trust and identified by the rule governing access to the resource, wherein the at least one object is installed on the computing device when the at least one required object is not yet installed on the computing device; and allowing the computing device to access the resource based on the at least one object being installed on the computing device in accordance with the rule governing access to the resource. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus for providing provisioning objects to provide to a computing device, the apparatus comprising:
-
a user interface that receives an input identifying a resource associated with a rule governing access and a selection of a first zone of trust; a network interface that receives a request to access the resource sent over a communication network from a computing device associated with a person; and a processor that executes instructions stored in memory, wherein execution of the instructions by the processor; interrogates the computing device to identify whether at least one required object is installed on the computing device, the at least one required object corresponding to the first zone of trust and identified by the rule governing access to the resource, wherein the at least one object is installed on the computing device when the at least one required object is not yet installed on the computing device, and allows the computing device to access the resource based on the at least one object being installed on the computing device in accordance with the rule governing access to the resource. - View Dependent Claims (14, 15, 16, 17)
-
Specification