Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2011-06-21
2011-06-21
Chen, Shin-Hon (Department: 2431)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S001000, C726S005000, C726S006000, C726S007000, C726S021000
Reexamination Certificate
active
07966665
ABSTRACT:
A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network. A compliance validation configuration file is created for the computer system. A maintenance service utility is configured to launch a compliance validation executable file at a specified time during operation of the computer system. A digital hash is generated for the compliance validation executable file and for the compliance validation configuration file. A determination is made if the computer system or a computer system user is a member of a configured restricted group. If the computer system or the computer system user is a member of a configured restricted group, a determination is made if a directory site code for a subnet of the restricted computer network to which the computer system is connected corresponds to a configured and allowed site. If the directory site code does not correspond to a configured and allowed site, compliance with access requirements are enforced. Enforcement actions can include a forced logoff of the computer system user, and/or a forced shutdown of the computer system.
REFERENCES:
patent: 6366913 (2002-04-01), Fitler, Jr. et al.
patent: 6466932 (2002-10-01), Dennis et al.
patent: 6470453 (2002-10-01), Vilhuber
patent: 6633872 (2003-10-01), Ambrosini et al.
patent: 6941465 (2005-09-01), Palekar et al.
patent: 7100195 (2006-08-01), Underwood
patent: 7181436 (2007-02-01), Conley et al.
patent: 7506102 (2009-03-01), Lev-Ran et al.
patent: 7853687 (2010-12-01), Le Moigne et al.
patent: 2002/0120685 (2002-08-01), Srivastava et al.
patent: 2002/0147801 (2002-10-01), Gullotta et al.
patent: 2002/0178249 (2002-11-01), Prabakaran et al.
patent: 2003/0154404 (2003-08-01), Beadles et al.
patent: 2004/0167984 (2004-08-01), Herrmann
patent: 2004/0204949 (2004-10-01), Shaji et al.
patent: 2004/0215751 (2004-10-01), Kumar et al.
patent: 2005/0075115 (2005-04-01), Corneille et al.
patent: 2005/0138110 (2005-06-01), Redlich et al.
patent: 2005/0257245 (2005-11-01), Patrick et al.
patent: 2006/0236370 (2006-10-01), John et al.
patent: 2007/0056018 (2007-03-01), Ridlon et al.
patent: 2007/0124803 (2007-05-01), Taraz
patent: 2007/0143851 (2007-06-01), Nicodemus et al.
patent: 2007/0156694 (2007-07-01), Lim
patent: 2007/0203999 (2007-08-01), Townsley et al.
patent: 2007/0211722 (2007-09-01), Subramanian
Windows IT PRO, “Guard Your Network with Software NAC”, http://www.windowsitpro.com/articles/print.cfm?articleid=95842; (2007).
Quest Software, “Quest ActiveRoles Server”, pp. 22-28 (total pp. 1-49), http://isdp.cit.nih.gov/openaccess/admmmc/ActiveRolesServer—5.2—Overview.pdf.
Canup Mark Jackson
Feeser Colin Lee
Ondrus Anthony William
Chen Shin-Hon
Mullen Williams
Open Invention Network LLC
LandOfFree
Compliance validator for restricted network access control does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Compliance validator for restricted network access control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Compliance validator for restricted network access control will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2712776