Method and apparatus for adapting a communication network according to information provided by a trusted client
First Claim
1. A method of adapting a communication network based on information obtained by a trusted client resident on a host, the method comprising the steps of:
- obtaining, by an adaptive networks server, information from the trusted client resident on the host about applications running on the host; and
applying policy by the adaptive networks server to the network to adjust the network for the applications running on the host by adjusting quality of service, network security, load balancing, or routing on the network for the applications.
11 Assignments
0 Petitions
Accused Products
Abstract
Hosts connecting to the network implement an adaptive networks client that monitors other applications on the host and provides information to an adaptive networks server to provide information about traffic being generated by the host. The client may also capture information about the user, host, access type, and other information of interest. The information provided by the adaptive network client may allow the network to adapt to the user, the device, the application, and the protocol being used. Users and applications can be authenticated and trusted. From a network standpoint, having a trusted client associated with the host allows the same benefits as deep packet inspection, regardless of whether the traffic is encrypted, and without requiring the network elements to actually perform deep packet inspection. The administrator may also centrally apply policy to control which applications are allowed to run on the hosts.
102 Citations
22 Claims
-
1. A method of adapting a communication network based on information obtained by a trusted client resident on a host, the method comprising the steps of:
-
obtaining, by an adaptive networks server, information from the trusted client resident on the host about applications running on the host; and applying policy by the adaptive networks server to the network to adjust the network for the applications running on the host by adjusting quality of service, network security, load balancing, or routing on the network for the applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A network, comprising:
-
an adaptive networks server; and a plurality of hosts implementing adaptive networks clients, the adaptive networks clients providing information to the adaptive networks server about applications running on their respective hosts; wherein the adaptive networks server is able to validate the trusted adaptive networks clients to determine if one or more of the adaptive networks clients has been compromised, and wherein the adaptive networks server will restrict network access to any client not implementing an adaptive networks client or implementing a compromised adaptive networks client. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of applying network policy to encrypted network traffic generated by a host on a network, the method comprising the steps of:
-
receiving information from a trusted client instantiated on the host, the trusted client being configured to monitor applications instantiated on the host and to provide information about applications that are seeking access to the network and hence likely to generate network traffic; determining policy associated with the applications; receiving encrypted network traffic generated by the host on the network; and applying the policy associated with the application that is likely to have generated the network traffic without unencrypting the network traffic to determine the type of network traffic.
-
Specification