Strong identity management and cyber security software
First Claim
1. A non-transitory computer-readable medium having stored thereon a network security software, the software executed by at least one computer, the execution of the security software by the at least one computer performing:
- configuring by an administrative module that a user interacts with, one or more user profiles;
using one or more web access filtering engines and a particular user profile of the one or more user profiles of a user tocheck an identity of a requesting client against identities of one or more user approved clients of the particular user profile, andcheck an identity of said client requested web resource against one or more user approved web resources of the particular user profile;
wherein the requesting client is at least one of (i) an Hypertext Transfer Protocol (HTTP) application and (ii) a web browser,wherein checking the identity of the requesting client involves checking one or more identity attributes of the requesting client, andwherein the requesting client is distinct from the user.
2 Assignments
0 Petitions
Accused Products
Abstract
A security software comprises administrative module for configuring access levels and creating types of accounts and application server for domain filtering by checking against friendly and unfriendly inbound, outbound and exception lists. Hard filtering either approves, terminates requests or re-routes request without the user'"'"'s knowledge. Soft filtering passes disapproved requests and sends an e-mail alert to authorized recipients. Content filtering includes checking a content of a requested document against a friendly, unfriendly list and exception list. Hard filtering passes or rejects the requested document. Soft filtering passes the requested document or rejects or approves by highlighting its content. Options include e-mail filtering that checks subject, sender'"'"'s address and domain against an unfriendly, friendly and exception list. e-mail alert for hard filtering, inbound privacy shield, a pop up blocker, the application server acts as proxy server with proxy chaining capabilities.
-
Citations
21 Claims
-
1. A non-transitory computer-readable medium having stored thereon a network security software, the software executed by at least one computer, the execution of the security software by the at least one computer performing:
-
configuring by an administrative module that a user interacts with, one or more user profiles; using one or more web access filtering engines and a particular user profile of the one or more user profiles of a user to check an identity of a requesting client against identities of one or more user approved clients of the particular user profile, and check an identity of said client requested web resource against one or more user approved web resources of the particular user profile; wherein the requesting client is at least one of (i) an Hypertext Transfer Protocol (HTTP) application and (ii) a web browser, wherein checking the identity of the requesting client involves checking one or more identity attributes of the requesting client, and wherein the requesting client is distinct from the user. - View Dependent Claims (2, 3)
-
-
4. A non-transitory computer-readable medium having stored thereon a network security software, the software executed by at least one computer, the execution of the network security software by the at least one computer performing:
-
performing by an administrative module that a user interacts with any of;
(i) creating one or more user profiles, and (ii) configuring one or more user profiles;assigning one or more identities of one or more user approved clients to one or more of the user profiles; assigning one or more identities of one or more user approved resources to one or more of the user profiles, using one or more web access filtering engines to verify an identity of a requesting client against at least one of the identities of the one or more user approved clients assigned to a particular user profile, and verifying at least one of the identities of one or more client requested web resources against the one or more user approved resources assigned to a particular user profile, wherein the said requesting client is at least one of (i) an Hypertext Transfer Protocol (HTTP) application and (ii) a web browser, wherein verifying the identity of the requesting client involves verifying one or more identity attributes of the requesting client, and wherein the requesting client is distinct from the user. - View Dependent Claims (5)
-
-
6. A non-transitory computer-readable medium having stored thereon a network security software, the software executed by at least one computer, the execution of the security software by the at least one computer performing:
-
creating, by an administrative module that a user interacts with, one or more user profiles; assigning one or more identities of one or more user approved clients to one or more of the user profiles, assigning one or more identities of one or more user approved resources to one or more of the user profiles; using one or more web access filtering engines and a particular user profile of the one or more user profiles of the user to check an identity of a requesting client of the user against one or more user approved clients of the user, and to check an identity of said client requested web resource against one or more user approved web resources of the user; wherein the requesting client is at least one of (i) an Hypertext Transfer Protocol (HTTP) application and (ii) a web browser, wherein checking the identity of the requesting client involves checking one or more identity attributes of the requesting client, and wherein the requesting client is distinct from the user.
-
-
7. A non-transitory computer-readable medium having stored thereon a network security software, the software executed by at least one computer, the execution of the network security software by the at least one computer performing:
-
configuring, by an administrative module that a user interacts with, one or more user accounts; assigning one or more identities of one or more user approved clients to one or more of the configured user accounts; assigning one or more identities of one or more user approved web resources to one or more user approved clients of the configured user accounts, using one or more web access filtering engines to verify an identity of a requesting client against at least one of the identities of the one or more of the user approved clients assigned to a particular user account, and verifying an identity of said client requested web resource against one or more user approved web resources whose one or more identities was assigned to a particular user approved client of the particular user account, wherein the said requesting client is at least one of (i) an Hypertext Transfer Protocol (HTTP) application and (ii) a web browser, wherein verifying the identity of the requesting client involves verifying one or more identity attributes of the requesting client, and wherein the requesting client is distinct from the user. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having stored thereon a network security software, the software executed by at least one computer, the execution of the network security software by the at least one computer performing:
-
creating, by an administrative module that a user interacts with, one or more user profiles, and configuring those user profiles; using one or more web access filtering engines to verify an identity of a requesting client of a user against at least one of the identities of one or more of the user approved clients for a particular user profile of the one or more user profiles, and verify an identity of a client requested web resource against at least one of the identities of one or more of the user approved resources for a particular user profile of the one or more user profiles wherein the requesting client is at least one of (i) an Hypertext Transfer Protocol (HTTP) application and (ii) a web browser, wherein verifying the identity of the requesting client involves checking one or more identity attributes of the requesting client, and wherein the requesting client is distinct from the user.
-
-
16. A non-transitory computer-readable medium having stored thereon a network security software, the software executed by at least one computer, the execution of the security software by the at least one computer performing:
-
configuring by an administrative module that a user interacts with, one or more user profiles; assigning one or more identities of one or more user approved resources to one or more of the user profiles; assigning one or more identities of one or more user approved clients to one or more of the user profiles; using at least one of a web access filtering engines and a particular user profile of the one or more user profiles to check an identity of a requesting client against one or more identities of the one or more user approved clients of the particular user profile, and check an identity of a client requested web resource against one or more of the user approved resources of the particular user profile, wherein the said requesting client is at least one of (i) an Hypertext Transfer Protocol (HTTP) application and (ii) a web browser, wherein checking the identity of the requesting client involves checking one or more identity attributes of the requesting client, and wherein the requesting client is distinct from the user.
-
-
17. A non-transitory computer-readable medium having stored thereon a network security and filtering software, the software executed by at least one computer, the execution of the network security and filtering software by the at least one computer performing:
-
configuring, by an administrative module that a user interacts with, one or more user profiles of the user; using one or more web access filtering engines to check against at least one of (i) a friendly outbound list of a particular user profile of the one or more configured user profiles, and (ii) an unfriendly outbound list of the particular user profile of the one or more configured user profiles, and to check against at least one of (i) a friendly inbound list of the particular user profile of the one or more configured user profiles and (ii) an unfriendly inbound list of the particular user profile of the one or more configured user profiles; wherein using at least one of the web access filtering engines to check against at least one of (i) the friendly outbound list and (ii) the unfriendly outbound list of the particular user profile of the one or more configured user profiles includes using at least one of the web access filtering engines to check a client requested web resources against at least one of (i) the friendly outbound list of the particular user profile of the one or more configured user profiles and (ii) the unfriendly outbound list of the particular user profile of the one or more configured user profiles, wherein using at least one of the web access filtering engines to check against the at least one of (i) the friendly inbound list of the particular user profile of the one or more configured user profiles and (ii) the unfriendly inbound list of the particular user profile of the one or more configured user profiles includes using at least one of the web access filtering engines to check an identity of the requesting client against one or more identities of one or more clients in at least one of (i) the friendly inbound list of the particular user profile of the one or more configured user profiles and (ii) the unfriendly inbound list of the particular user profile of the one or more configured user profiles, wherein the requesting client is at least one of (i) an Hypertext Transfer Protocol (HTTP) application and (ii) a web browser, wherein checking the identity of the requesting client involves checking one or more identity attributes of the requesting client, and wherein the requesting client is distinct from the user.
-
-
18. A non-transitory computer-readable medium having stored thereon a web security software, the software executed by at least one computer, the execution of the web security software by the at least one computer performing:
- performing, by an administrative module that a user interacts with, any of;
(i) creating, one or more user profiles, and (ii) configuring one or more user profiles;using a web security method to check against at least one of (i) a friendly inbound list of a particular user profile of the one or more user profiles and (ii) an unfriendly inbound list of the particular user profile of the one or more user profiles, and against at least one of;
(i) a friendly outbound list of the particular user profile of the one or more user profiles and (ii) an unfriendly outbound list of the particular user profile of the one or more user profiles;wherein using said web security method to check against at least one of (i) said friendly inbound list of the particular user profile and (ii) said unfriendly inbound list of the particular user profile includes using the web security method to check an identity of a requesting client against one or more identities of one or more clients in at least one of (i) said friendly inbound list of the particular user profile and (ii) said unfriendly inbound list of the particular user profile, wherein using said web security method to check against at least one of (i) said friendly outbound list of the particular user profile of the one or more user profiles and (ii) said unfriendly outbound list of the particular user profile of the one or more user profiles includes using the web security method to check a client requested web resource against one of (i) said friendly outbound list of the particular user profile of the one or more user profiles and (ii) said unfriendly outbound list of the particular user profile of the one or more user profiles, wherein said requesting client is at least one of an Hypertext Transfer Protocol (HTTP) application and a web browser, wherein checking the identity of said requesting client involves checking one or more identity attributes of the requesting client, and wherein the requesting client is distinct from the user. - View Dependent Claims (19)
- performing, by an administrative module that a user interacts with, any of;
-
20. A non-transitory computer-readable medium having stored thereon a network security and filtering software, the software executed by at least one computer, the execution of the network security and filtering software by the at least one computer performing:
-
configuring, by an administrative module that a user interacts with, one or more user accounts, wherein the user configures, for a particular user account, at least one of;
(i) a friendly outbound list and (ii) an unfriendly outbound list, and at least one of (i) a friendly inbound list, and (ii) an unfriendly inbound list;using one or more web access filtering engines to check against at least one of;
(i) a friendly outbound list of the configured user account, and (ii) an unfriendly outbound list of the configured user account and to check against at least one of (i) a friendly inbound list of the configured user account and (ii) an unfriendly inbound list of the configured user account;wherein using at least one of the web access filtering engines to check against at least one of the friendly outbound list and the unfriendly outbound list of the configured user account includes using at least one of the web access filtering engines to check a client requested web resource against at least one of (i) the friendly outbound list of the configured user account and (ii) the unfriendly outbound list of the configured user account, wherein using at least one of the web access filtering engines to check against the at least one of (i) the friendly inbound list of the configured user account and (ii) the unfriendly inbound list of the configured user account includes using at least one of the web access filtering engines to check an identity of the requesting client against one or more identities of one or more clients in at least one of (i) the friendly inbound list of the configured user account and (ii) the unfriendly inbound list of the configured user account, wherein the requesting client is at least one of (i) an Hypertext Transfer Protocol (HTTP) application and (ii) a web browser, wherein checking the identity of the requesting client involves checking one or more identity attributes of the requesting client, and wherein the requesting client is distinct from the user. - View Dependent Claims (21)
-
Specification