Controlling a network connection using dual-switching
First Claim
Patent Images
1. An apparatus comprising:
- a host execution environment; and
a tunnel proxy coupled with the host execution environment, the tunnel proxy to provide a proxy of a policy decision point to the host execution environment, wherein the tunnel proxy includes logic to provide a security protocol client and logic to provide a security protocol server.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention are generally directed to systems, methods, and apparatuses for controlling a network connection based, at least in part, on dual-switching. In an embodiment, a tunnel proxy is coupled with a host execution environment. The tunnel proxy includes logic to provide a security protocol client and logic to provide a security protocol server. In one embodiment, the tunnel proxy provides a proxy for a policy decision point to the host execution environment. Other embodiments are described and claimed.
-
Citations
22 Claims
-
1. An apparatus comprising:
-
a host execution environment; and
a tunnel proxy coupled with the host execution environment, the tunnel proxy to provide a proxy of a policy decision point to the host execution environment, wherein the tunnel proxy includes logic to provide a security protocol client and logic to provide a security protocol server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
authenticating a tunnel proxy to a remote policy decision point, wherein the tunnel proxy is to provide a proxy for the remote decision point;
receiving a network connection request from a host coupled with the tunnel proxy;
determining whether to grant a network connection to the host based, at least in part, on an enforcement policy; and
unblocking a data channel to allow the host to access the network, if the network connection is granted to the host. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a processor;
a volatile memory coupled with the processor to provide main memory for the processor; and
a tunnel proxy coupled with the processor, the tunnel proxy to provide a proxy of a policy decision point, wherein the tunnel proxy includes logic to provide a security protocol client and logic to provide a security protocol server. - View Dependent Claims (19, 20, 21, 22)
-
Specification