×

Identity and policy-based network security and management system and method

  • US 8,984,620 B2
  • Filed: 08/21/2007
  • Issued: 03/17/2015
  • Est. Priority Date: 07/06/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a computer, authenticated and authorized identity information associated with a user that includes at least a user id and one or more user IP addresses associated with the user id;

    receiving at least one data packet from a source, wherein the at least one packet comprises source information comprising a source IP address and destination information of a destination to which to transmit the packet;

    identifying, by the computer, a connection object associated with the connection based at least on the source information and the destination information of the at least one data packet;

    associating the identified connection object with the at least one packet;

    attempting to match the source IP address to one of the one or more user IP addresses;

    responsive to determining that the source IP address matches one of the one or more user IP addresses;

    identifying the identity information associated with the authorized user based on the source IP address;

    updating the identified connection object with the authenticated and authorized identity information;

    identifying a firewall rule associated with the at least one packet and the updated connection object based at least on a combination of the user id, the matched user IP address, the source information of the at least one data packet, and the destination information of the at least one data packet;

    applying the firewall rule to the at least one packet of the connection;

    performing a firewall action for the at least one packet in view of applying the firewall rule, wherein the action is selected from the group consisting of;

    accepting the at least one packet, dropping the at least one packet, or rejecting the at least one packet; and

    responsive to accepting the at least one packet after applying the firewall rule,identifying at least one management policy associated with the connection object;

    applying the at least one identified management policy to the at least one packet; and

    transmitting the at least one packet to the destination.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×