Method for Managing Computer Network Access
First Claim
1. A method of controlling computer network access comprising:
- (a) receiving an access configuration at an endpoint of a computer network;
(b) determining at the endpoint whether access to a network address is permitted by the access configuration; and
(c) either allowing or denying the endpoint access to the network address based on the determination in step (b).
3 Assignments
0 Petitions
Accused Products
Abstract
A client computer initiates a first communication session at a first network address and receives therefrom a second network address. The client computer then initiates a second communication session at the second network address and receives therefrom an access configuration including a control setting for a communication protocol capable of being utilized during a third communication session. Concurrent with the second communication session, the client computer initiates a third communication session at a third network address whereupon the conveyance of data to or from an instantiated process on the client computer via the third communication session is controlled based on the control setting for the communication protocol.
71 Citations
13 Claims
-
1. A method of controlling computer network access comprising:
-
(a) receiving an access configuration at an endpoint of a computer network; (b) determining at the endpoint whether access to a network address is permitted by the access configuration; and (c) either allowing or denying the endpoint access to the network address based on the determination in step (b). - View Dependent Claims (2, 3, 4)
-
-
5. A method of controlling computer network access comprising:
-
(a) an endpoint computer of a computer network accessing a network address on the computer network; (b) the endpoint computer analyzing data received in real-time from the network address based on an access configuration received at the endpoint computer from another network address of the computer network; (c) the endpoint computer either blocking or conveying the data received in real-time from the network address based on the analysis in step (c); and (d) in response to blocking data in step (c), the endpoint computer dispatching to the other network address a notification of the blocking data. - View Dependent Claims (6, 7)
-
-
8. A method of controlling computer network access comprising:
-
(a) receiving an access configuration file at an endpoint computer; (b) the endpoint computer initiating a computer network session at a network address; (c) concurrent with the computer network session in step (b), the endpoint computer initiating another computer network session at another network address; (d) transmitting to the network address via the computer network session a URL requested in the other computer network session; (e) receiving in the computer network session data about the requested URL corresponding to category information stored in the access configuration file; and (f) determining at the endpoint computer whether access to the requested URL is allowed or denied based on information stored in the access configuration file. - View Dependent Claims (9)
-
-
10. A method of controlling computer network access comprising:
-
(a) a server computer receiving via a computer network from an endpoint computer of the computer network a request for an access configuration file; (b) the server computer dispatching to each endpoint computer an access configuration file; and (c) following step (b), the server computer dispatching to each endpoint computer an update to the access configuration file dispatched in step (b) or another access configuration file. - View Dependent Claims (11)
-
-
12. A method of controlling computer network access comprising:
-
(a) a server computer receiving via a computer network from endpoint computers of the computer network requests for access configuration files; (b) the server computer dispatching a unique access configuration file to each endpoint computer for which a unique access configuration file was prepared; and (c) the server computer dispatching a generic access configuration file to each endpoint computer for which a unique access configuration file was not prepared. - View Dependent Claims (13)
-
Specification