×

System and method to apply network traffic policy to an application session

  • US 8,312,507 B2
  • Filed: 05/27/2010
  • Issued: 11/13/2012
  • Est. Priority Date: 10/17/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for applying a security policy to an application session, comprising:

  • (a) recognizing the application session between a network and an application via a security gateway;

    (b) determining by the security gateway a user identity of the application session using information about the application session, wherein the determining comprises;

    (b1) determining the user identity from an application session record for the application session, wherein the application session record comprises the user identity used for accessing the network through a host, a host identity for the host, and an application session time, wherein a creating of the application session record comprises;

    (b1i) querying an identity server by sending the host identity and the application session time in the application session record, wherein the identity server comprises an access session record for an access session between a second host and the network, wherein the access session record comprises a second user identity used for accessing the network through the second host, a second host identity for the second host, and an access session time;

    (b1ii) comparing by the identity server the host identity in the application session record with the second host identity in the access session record, and comparing the access session time with the application session time;

    (b1iii) returning by the identity server the second user identity in the access session record, if the host identity in the application session record matches the second host identity in the access session record, and if the access session time matches the application session time; and

    (b1iv) storing the second user identity as a network user identity used for accessing the network in the application session record;

    (c) obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and

    (d) applying the security policy to the application session by the security gateway.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×