×

Authentication via monitoring

  • US 8,806,572 B2
  • Filed: 05/30/2009
  • Issued: 08/12/2014
  • Est. Priority Date: 05/30/2009
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory tangible media encoded with executable instructions which when executed are operable to perform a method, the method comprising:

  • in a firewall;

    detecting a packet data flow of a cryptographic protocol between a first endpoint and a second endpoint;

    collecting an identity data of the first endpoint and the second endpoint;

    where the identity data is included in the packet data flow and comprises a digital certificate of the first endpoint and at least one attribute value of the second endpoint;

    making a decision, based, at least in part, on the identity data, whether to admit or deny the packet data flow through the firewall and on a trust that the first endpoint assigns to the second endpoint while establishing a connection with the second endpoint;

    verifying an identity of one or more of, the first endpoint, and the second endpoint, based on the identity data from the digital certificate and the at least one attribute value, where the collected identity data facilitates validation of the digital certificate;

    based, at least in part, on validating endpoint identity data included in the packet data flow of the cryptographic protocol that is observed at the firewall, admitting or denying the packet data flow through the firewall.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×