×

ACCESSING NETWORK RESOURCES OUTSIDE A SECURITY BOUNDARY

  • US 20080189757A1
  • Filed: 02/01/2007
  • Published: 08/07/2008
  • Est. Priority Date: 02/01/2007
  • Status: Active Grant
First Claim
Patent Images

1. At a computer system connected to a network, the computer system including a host environment with a network based application running inside a security boundary of the host environment, an originating computer system and one or more other external computer systems also being connected to the network, the originating computer system and one or more other computer systems being outside of the security boundary, the network based application having been received from the originating computer system, a method for making a network access decision for the network based application, the method comprising:

  • an act of receiving a network access request from the network based application running inside the security boundary, the network access request requesting network access be implemented to one of the external computer systems outside of the security boundary;

    an act of accessing network security policies that control network access to the external computer systems, the network security policies configured to make a network access decision for the network access request based on network access information corresponding to the network access request;

    an act of accessing network access information associated with the network access request, the network access information including at least one property of a setting for the computer system and at least one property of the network access request;

    an act of applying the network security polices to the network access information to make a network access decision for the received network access request; and

    an act of returning the network access decision to the network based application to indicate to the network based application whether or not the network based application is permitted to implement the requested network access to the external computer system outside of the security boundary.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×