Method and apparatus for network assessment and authentication
    2.
    发明授权
    Method and apparatus for network assessment and authentication 有权
    用于网络评估和认证的方法和装置

    公开(公告)号:US07634800B2

    公开(公告)日:2009-12-15

    申请号:US11430297

    申请日:2006-05-08

    IPC分类号: G06F7/04 G06F12/14 H04L29/06

    摘要: Providing a user with assurance that a networked computer is secure, typically before completion of the log-in operation. This can be accomplished by extending the local log-in process to perform a host assessment of the workstation prior to requesting the user's credentials. If the assessment finds a vulnerability, the log-in process can inform the user that the machine is or may be compromised, or repair the vulnerability, prior to completion of the log-in operation. By performing vulnerability assessment at the level of the workstation, a network server is able to determine whether the workstation is a “trusted” platform from which to accept authentication requests. If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can elect to fail the authentication on the grounds that the workstation cannot be trusted. Optionally, a vulnerability assessment tool may be able to repair the vulnerability of the workstation, and then allow the authentication to proceed.

    摘要翻译: 为用户提供网络计算机的安全性,通常在登录操作完成之前。 这可以通过在请求用户的凭据之前扩展本地登录过程来执行工作站的主机评估来实现。 如果评估发现了一个漏洞,登录过程可以在登录操作完成之前通知用户该机器已被或可能受到威胁或修复该漏洞。 通过在工作站级进行漏洞评估,网络服务器能够确定工作站是否是从其接受认证请求的“受信任”平台。 如果漏洞评估显示工作站受到威胁,或者如果远程妥协的可能性较高,则网络服务器可能会因为不能信任工作站而导致身份验证失败。 可选地,漏洞评估工具可能能够修复工作站的漏洞,然后允许身份验证继续。

    Method and apparatus for network assessment and authentication
    3.
    发明授权
    Method and apparatus for network assessment and authentication 失效
    用于网络评估和认证的方法和装置

    公开(公告)号:US07162649B1

    公开(公告)日:2007-01-09

    申请号:US09607375

    申请日:2000-06-30

    摘要: Providing a user with assurance that a networked computer is secure, typically before completion of the log-in operation. This can be accomplished by extending the local log-in process to perform a host assessment of the workstation prior to requesting the user's credentials. If the assessment finds a vulnerability, the log-in process can inform the user that the machine is or may be compromised, or repair the vulnerability, prior to completion of the log-in operation. By performing vulnerability assessment at the level of the workstation, a network server is able to determine whether the workstation is a “trusted” platform from which to accept authentication requests. If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can elect to fail the authentication on the grounds that the workstation cannot be trusted. Optionally, a vulnerability assessment tool may be able to repair the vulnerability of the workstation, and then allow the authentication to proceed.

    摘要翻译: 为用户提供网络计算机的安全性,通常在登录操作完成之前。 这可以通过在请求用户的凭据之前扩展本地登录过程来执行工作站的主机评估来实现。 如果评估发现了一个漏洞,登录过程可以在登录操作完成之前通知用户该机器已被或可能受到威胁或修复该漏洞。 通过在工作站级进行漏洞评估,网络服务器能够确定工作站是否是从其接受认证请求的“受信任”平台。 如果漏洞评估显示工作站受到威胁,或者如果远程妥协的可能性较高,则网络服务器可能会因为不能信任工作站而导致身份验证失败。 可选地,漏洞评估工具可能能够修复工作站的漏洞,然后允许身份验证继续。