User Mapping Mechanisms
First Claim
1. A method performed by a network appliance for identifying users associated with network traffic, the method comprising:
- receiving a first type of network traffic;
determining a source network address of the first type of network traffic;
determining information associating a user with a source network address of a second type of network traffic; and
performing an action with the first type of network traffic based on the source network address of the first type of network traffic and the information associating the user with the source network address of the second type of network traffic.
3 Assignments
0 Petitions
Accused Products
Abstract
In various embodiments, techniques can be provided for identifying a user or group of users who initiated network traffic. The user or group of users may be identified as an employee who can be found in corporate or organizational directory. In some embodiments, different authentication mechanisms may be used for various types of network traffic. For example, by proxying instant messaging (IM) communications, a proxy server can know which users are associated with what network traffic. In another example, transparent and non-transparent mechanisms may be provided to authenticate HTTP URL traffic. For other types of traffic, such as non-proxied IM, P2P, and spyware, an existing authentication cache or credential cache may be used to identify the user who generated the traffic.
55 Citations
27 Claims
-
1. A method performed by a network appliance for identifying users associated with network traffic, the method comprising:
-
receiving a first type of network traffic; determining a source network address of the first type of network traffic; determining information associating a user with a source network address of a second type of network traffic; and performing an action with the first type of network traffic based on the source network address of the first type of network traffic and the information associating the user with the source network address of the second type of network traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable storage medium configured to store program code of a network appliance for identifying users associated with network traffic, the computer-readable storage medium comprising:
-
code for receiving a first type of network traffic; code for determining a source network address of the first type of network traffic; code for determining information associating a user with a source network address of a second type of network traffic; and code for performing an action with the first type of network traffic based on the source network address of the first type of network traffic and the information associating the user with the source network address of the second type of network traffic. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A network appliance for identifying users associated with network traffic, the network appliance comprising:
-
a communications interface configured to exchange data with a communications network; and a processor configured to; determine a source network address of a first type of network traffic; determine information associating a user with a source network address of a second type of network traffic; and perform an action with the first type of network traffic based on the source network address of the first type of network traffic and the information associating the user with the source network address of the second type of network traffic. - View Dependent Claims (24, 25, 26, 27)
-
Specification