SYSTEM, METHOD AND APPARATUS FOR AUTHENTICATING AND PROTECTING AN IP USER-END DEVICE
First Claim
1. A method for authenticating and protecting an Internet Protocol (IP) user-end device comprising the steps of:
- providing a client-based security software resident on the IP user-end device;
authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device;
authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node; and
protecting the IP user-end device by;
(a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node.
22 Assignments
0 Petitions
Accused Products
Abstract
A system, method and apparatus authenticates and protects an Internet Protocol (IP) user-end device by providing a client-based security software resident on the IP user-end device, authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device, authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node, and protecting the IP user-end device by: (a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node.
-
Citations
23 Claims
-
1. A method for authenticating and protecting an Internet Protocol (IP) user-end device comprising the steps of:
-
providing a client-based security software resident on the IP user-end device; authenticating the IP user-end device using the client-based security software and a network security node communicably coupled to the IP user-end device; authenticating a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node; and protecting the IP user-end device by;
(a) screening incoming IP traffic to the IP user-end device using the client-based security software, and (b) detecting an attack or a threat involving the IP user-end device using the network security node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus for authenticating and protecting an Internet Protocol (IP) user-end device comprising:
-
a communications interface; a memory; and a processor communicably coupled to the communications interface and the memory wherein the processor is configured to run a client-based security software resident on the IP user-end device; wherein the client-based security software and a network security node communicably coupled to the IP user-end device;
(a) authenticate the IP user-end device, and (b) authenticate a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node;wherein client-based security software protects the IP user-end device by screening incoming IP traffic to the IP user-end device; and wherein the network security node protects the IP user-end device by detecting an attack or a threat involving the IP user-end device.
-
-
21. A system comprising:
-
one or more Internet Protocol (IP) user-end devices, each IP end-user device comprising a first communications interface, a first memory, and a first processor communicably coupled to the first communications interface and the first memory wherein the first processor is configured to run a client-based security software resident on the IP user-end device; a network security node comprising a second communications interface, a second memory, and a second processor communicably coupled to the second communications interface and the second memory; an IP network communicably coupling the one or more IP user-end devices to the network security node; wherein the client-based security software and the network security node;
(a) authenticate the IP user-end device, and (b) authenticate a user of the IP user-end device whenever a trigger condition occurs using an in-band channel between the client-based security software and the network security node;wherein client-based security software protects the IP user-end device by screening incoming IP traffic to the IP user-end device; and wherein the network security node protects the IP user-end device by detecting an attack or a threat involving the IP user-end device. - View Dependent Claims (22, 23)
-
Specification