System for selecting and disseminating active policies to peer device and discarding policy that is not being requested
First Claim
Patent Images
1. A method for distributing policies in a network having at least one anonymous policy server and at least one anonymous peer device, comprising:
- requesting a policy from the anonymous policy server;
determining, via the anonymous policy server, whether an active version of the policy exists;
transferring, when an active version of the policy is determined to exist, the active policy version from the anonymous policy server to the anonymous peer device;
receiving, via the anonymous peer device, a policy;
determining whether the received policy is the requested policy;
discarding the received policy when the received policy is not the requested policy; and
implementing the received policy when the received policy is the requested policy.
6 Assignments
0 Petitions
Accused Products
Abstract
A method ensures that a set of anonymous peer devices (110) and anonymous policy servers (120) in a system (100) are apprised of all current versions of a policy so that they can quickly implement a version of the policy as it becomes active. The method includes determining whether new versions or a newly active version of a policy exists and generating a message containing the newly received or newly active policy version(s). The method also includes transferring the message to the peer devices (110), the transfer being initiated by either the sender or the receiver.
115 Citations
8 Claims
-
1. A method for distributing policies in a network having at least one anonymous policy server and at least one anonymous peer device, comprising:
-
requesting a policy from the anonymous policy server; determining, via the anonymous policy server, whether an active version of the policy exists; transferring, when an active version of the policy is determined to exist, the active policy version from the anonymous policy server to the anonymous peer device; receiving, via the anonymous peer device, a policy; determining whether the received policy is the requested policy; discarding the received policy when the received policy is not the requested policy; and implementing the received policy when the received policy is the requested policy. - View Dependent Claims (2, 3)
-
-
4. A network comprising:
-
at least one anonymous peer device configured to; request a policy from at least one anonymous policy server, determine whether a received policy is of a desired policy class, implement the received policy when the received policy is an active policy of the desired policy class, and discard the received policy when the received policy is not of the requested policy class; and at least one anonymous policy server configured to; receive the request from the at least one anonymous peer device, determine whether any version of the policy requested exists, and transfer all versions of the policy to the peer device, indicating the active version, if any version is determined to exist. - View Dependent Claims (5, 6)
-
-
7. A method for implementing policies, comprising:
-
receiving a message, the message containing an identifier and one or more versions of a policy; determining whether the identifier is in a list of policy identifiers; discarding the message when the identifier is absent from the list; and implementing an active version of the one or more policies when the identifier is present in the list.
-
-
8. A system for implementing policies comprising:
-
a memory configured to store instructions and an active policy database, the active policy database containing a list of policy identifiers; and a processor configured to execute the instructions to receive a message, the message containing an identifier and one or more versions of a policy, compare the identifier to the list of policy identifiers, discard the message when the identifier does not match a policy identifier in the list, and implement an active version of the policy when the identifier matches a policy identifier in the list.
-
Specification