SYSTEM AND METHOD FOR REGULATING COMMUNICATIONS TO OR FROM AN APPLICATION
First Claim
1. A method for regulating communications to or from a first application executing on a host machine, including:
- detecting an attempt to communicate to or from the first application;
determining trusted information about the attempted communication; and
sending a message to at least one security element based upon the determined trusted information about the attempted communication.
0 Assignments
0 Petitions
Accused Products
Abstract
The flow of information to or from an application on a host machine is regulated by a trusted agent operating in conjunction with at least one security element, such as a firewall or a policy server. When a communication to or from the application is detected by the trusted agent, the trusted agent gathers information about the attempted communication, and formulates and sends a message based upon the gathered information to at least one security element. The security element makes a decision to permit or block at least part of the attempted communication based upon the message received from the trusted agent.
33 Citations
25 Claims
-
1. A method for regulating communications to or from a first application executing on a host machine, including:
-
detecting an attempt to communicate to or from the first application; determining trusted information about the attempted communication; and sending a message to at least one security element based upon the determined trusted information about the attempted communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for regulating communications to or from a first application executing on a host machine, including:
-
a trusted agent executing on the host machine, wherein said trusted agent obtains information about the attempted communication to or from the first application; and a security element that receives information about the attempted communication from the trusted agent, and determines if the attempted communication is to be permitted based upon the received information. - View Dependent Claims (10, 11)
-
-
12. A medium storing instructions adapted to be executed by a processor to perform steps including:
-
detecting an attempt to communicate between a first application executing on a host machine and an external application; determining information about the attempted communication; and sending a message to at least one security element, wherein the contents of the message are based upon the information determined about the attempted communication. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method for regulating communications between a first application executing on a host machine and an external application executing on an external machine, including:
-
receiving information about an attempted communication between the first application and the external application; making a security decision with respect to the attempted communication based upon the information received about the attempted communication; and performing a security action with respect to the attempted communication. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification