CLOUD-BASED NETWORK SECURITY
First Claim
Patent Images
1. A method for managing a connection between a computing device and a destination computing device, the method comprising:
- managing, by a first managing component, traffic between a first computing device and a destination computing device, including;
identifying, by the first managing component, at least one characteristic of the traffic;
accessing, by the first managing component, a database including at least one connection policy associated with the identified at least one characteristic;
determining, by the first managing component, an applicable connection policy based at least in part on the identified at least one characteristic;
retrieving, by the first managing component, the applicable connection policy; and
implementing, by the first managing component, the applicable connection policy in managing the traffic between the first computing device and the destination computing device and in managing a first connection between the first computing device and the destination computing device, the managing the first connection including;
providing, to a second computing device, a request for a first connection over a network, the second computing device;
configuring the first connection, andestablishing, after the first computing device is authenticated, the first connection.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for managing the use of gateways on a network includes authenticating a user, determining and managing a path between a user computing device and a destination computing device, the path including at least one of the gateways, and managing user traffic on the path according to a policy associated with the user.
-
Citations
44 Claims
-
1. A method for managing a connection between a computing device and a destination computing device, the method comprising:
managing, by a first managing component, traffic between a first computing device and a destination computing device, including; identifying, by the first managing component, at least one characteristic of the traffic; accessing, by the first managing component, a database including at least one connection policy associated with the identified at least one characteristic; determining, by the first managing component, an applicable connection policy based at least in part on the identified at least one characteristic; retrieving, by the first managing component, the applicable connection policy; and implementing, by the first managing component, the applicable connection policy in managing the traffic between the first computing device and the destination computing device and in managing a first connection between the first computing device and the destination computing device, the managing the first connection including; providing, to a second computing device, a request for a first connection over a network, the second computing device; configuring the first connection, and establishing, after the first computing device is authenticated, the first connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
37. A method for managing a path between a computing device and a destination computing device, the method comprising:
managing, by a first managing software component, traffic between a first computing device and a destination computing device, including; identifying, by the first managing software component, at least one characteristic of the traffic; accessing, by the first managing software component, a database including at least one connection policy associated with the identified at least one characteristic; determining, by the first managing software component, an applicable connection policy based at least in part on the identified at least one characteristic; retrieving, by the first managing software component, the applicable connection policy; and implementing, by the first managing software component, the applicable connection policy in managing the traffic between the first computing device and the destination computing device and in managing a path between the first computing device and the destination computing device, the managing the path between a first computing device and a destination computing device, including; choosing a first gateway located on the network, the first gateway including an entrance to a tunnel between the first computing device and the destination computing device. - View Dependent Claims (38, 39, 40)
-
41. A method for managing a plurality of gateways, the method comprising:
-
managing, by one or more instances of a managing software component, a path between a first computing device and a destination computing device, the path using a subset of the plurality of gateways; managing, by one or more instances of a managing software component, the use of the plurality of gateways, including; authenticating a user associated with traffic attempting to use the plurality of gateways; accessing a database including at least one policy associated with the user; retrieving the at least one associated policy; and implementing the at least one associated policy in managing the use of the plurality of gateways. - View Dependent Claims (42, 43, 44)
-
Specification