REMOTE ACCESS TO RESOURCES OVER A NETWORK
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer'"'"'s ability to access a resource is determined based upon the computer'"'"'s operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer'"'"'s access to the requested resource.
-
Citations
21 Claims
-
1. (canceled)
-
2. A method for providing provisioning objects, the method comprising:
-
receiving via a user interface an input identifying a resource associated with a rule governing access; receiving a request to access the resource sent over a communication network from a computing device associated with the person; interrogating the computing device to identify whether at least one required object is installed on the computing device, the at least one required object identified by the rule governing access to the resource, wherein the at least one object is installed on the computing device when the at least one required object is not installed on the computing device; and allowing the computing device to access the resource based on the at least one object being installed on the computing device in accordance with the rule governing access to the resource. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable storage medium having embodied thereon a program executable by a processor for providing provisioning objects, the method comprising:
-
receiving via a user interface an input identifying a resource associated with a rule governing access; receiving a request to access the resource sent over a communication network from a computing device associated with the person; interrogating the computing device to identify whether at least one required object is installed on the computing device, the at least one required object identified by the rule governing access to the resource, wherein the at least one object is installed on the computing device when the at least one required object is not installed on the computing device; and allowing the computing device to access the resource based on the at least one object being installed on the computing device in accordance with the rule governing access to the resource. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for providing provisioning objects to provide to a computing device, the apparatus comprising:
-
a user interface that receives an input identifying a resource associated with a rule governing access; a network interface that receives a request to access the resource sent over a communication network from a computing device associated with the person; and a processor that executes instructions stored in memory, wherein execution of the instructions by the processor; interrogates the computing device to identify whether at least one required object is installed on the computing device, the at least one required object identified by the rule governing access to the resource, wherein the at least one object is installed on the computing device when the at least one required object is not installed on the computing device, and allows the computing device to access the resource based on the at least one object being installed on the computing device in accordance with the rule governing access to the resource. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification