Network firewall host application identification and authentication
First Claim
1. A system for providing host application identification and authentication to a network based firewall, comprising:
- an identifying and transmitting agent configured to identify an application in use, tag the application identity with a host computer identity, combine these into a data packet, and transmit the data packet to the network based firewall; and
an application identity listener configured to receive the data packet, decode the data packet and provide to the network based firewall the identity of the application.
6 Assignments
0 Petitions
Accused Products
Abstract
Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host computer, configured to identify each application in use, tag the application identity with a host identity, combine these and other information into a data packet, and securely transmit the data packet to the network based firewall. The embodiment also includes an application identity listener on the network based firewall, configured to receive the information data packet, decode the data packet and provide to the network based firewall the identity of the application. The network based firewall is provided with an application-awareness via an extension of firewall filtering or security policy rules via the addition of a new application identity parameter upon which filtering can be based. Other systems and methods are also provided.
239 Citations
46 Claims
-
1. A system for providing host application identification and authentication to a network based firewall, comprising:
-
an identifying and transmitting agent configured to identify an application in use, tag the application identity with a host computer identity, combine these into a data packet, and transmit the data packet to the network based firewall; and
an application identity listener configured to receive the data packet, decode the data packet and provide to the network based firewall the identity of the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for providing host application identification and authentication to a network based firewall, comprising the steps of:
-
identifying an application resident on a host computer;
authenticating the identified application;
tagging the identified application information with an identity of the host computer; and
conveying the tagged information in a secure manner to the network based firewall. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer-readable medium, comprising:
-
logic configured to identify an application resident on a host computer;
logic configured to authenticate the identified application;
logic configured to tag the identified application with an identity of the host computer; and
logic configured to convey the tagged information in a secure manner to a network based firewall. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
Specification