Systems and methods for authentication of target protocol screen names
First Claim
Patent Images
1. A method for managing communication policy in a network, comprising:
- receiving a message comprising a certain message protocol from a source within the network, the message being associated with a specific screen name;
determining a unique user name for the source;
associating the screen name with the unique user name; and
storing the association between the screen name and the unique user name.
28 Assignments
0 Petitions
Accused Products
Abstract
A protocol management system is capable of detecting certain message protocols and applying policy rules to the detected message protocols that prevent intrusion, or abuse, of a network'"'"'s resources. In one aspect, a protocol message gateway is configured to apply policy rules to high level message protocols, such as those that reside at layer 7 of the ISO protocol stack.
90 Citations
33 Claims
-
1. A method for managing communication policy in a network, comprising:
-
receiving a message comprising a certain message protocol from a source within the network, the message being associated with a specific screen name;
determining a unique user name for the source;
associating the screen name with the unique user name; and
storing the association between the screen name and the unique user name. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 32, 33)
-
- 17. A user authentication module, comprising a network interface configured to receive a message comprising a certain message protocol from a source within the network, the message being associated with a specific screen name, the user authentication module configured to determine a unique user name for the source and associate the screen name with the unique user name.
Specification