System and method for enhanced network client security
First Claim
1. A method comprising:
- receiving a security-related policy associated with a user;
determining a security model associated with the security-related policy; and
applying the security model to a network connection on a client device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems are methods for enhanced network client security are described. One aspect of one embodiment of the present invention includes receiving a security-related policy associated with a user, determining a security model associated with the security-related policy, and applying the security model to a network connection on a client device. One aspect of another embodiment of the present invention includes receiving a first measure associated with a usage characteristic, the usage characteristic associated with a user, receiving a second measure associated with the usage characteristic, comparing the first measure and second measure, and determining the likelihood that an unauthorized access has occurred based at least in part on the comparison.
182 Citations
17 Claims
-
1. A method comprising:
-
receiving a security-related policy associated with a user;
determining a security model associated with the security-related policy; and
applying the security model to a network connection on a client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving a first measure associated with a usage characteristic, the usage characteristic associated with a user;
receiving a second measure associated with the usage characteristic;
comparing the first measure and second measure; and
determining the likelihood that an unauthorized access has occurred based at least in part on the comparison. - View Dependent Claims (11, 12, 13)
-
-
14. A computer-readable medium on which is encoded program code, the program code comprising:
-
program code for receiving a security-related policy associated with a user;
program code for determining a security model associated with the security-related policy; and
program code for applying the security model to a network connection on a client device.
-
-
15. A computer-readable medium on which is encoded program code, the program code comprising:
-
program code for receiving a first measure associated with a usage characteristic, the usage characteristic associated with a user;
program code for receiving a second measure associated with the usage characteristic;
program code for comparing the first measure and second measure; and
program code for determining the likelihood that an unauthorized access has occurred based at least in part on the comparison.
-
-
16. A system comprising:
-
a policy reader operable to determine a policy associated with a user; and
a client security module operable to;
receive a security-related policy associated with a user;
determine a security model associated with the security-related policy; and
apply the security model to a network connection on a client device.
-
-
17. A system comprising:
-
a policy reader operable to determine a policy associated with a user; and
a unauthorized access detector operable to;
receive a first measure associated with a usage characteristic, the usage characteristic associated with a user;
receive a second measure associated with the usage characteristic;
compare the first measure and second measure; and
determine the likelihood that an unauthorized access has occurred based at least in part on the comparison.
-
Specification