Methods for managing security tokens based on security violations and devices thereof
First Claim
1. A method for managing security tokens based on security violations, the method implemented by a network traffic management system comprising one or more network traffic manager apparatuses, client devices, or server devices, the method comprising:
- monitoring network traffic data between a client and a web application, the client granted access to the web application by an access token associated with the client and the web application;
detecting a security violation in the monitored network traffic data between the client and the web application;
revoking the access token associated with the client and the web application in response to detecting the security violation in the monitored network traffic data between the client and the web application;
preventing the client associated with the revoked access token from accessing the web application; and
modifying an access right for another access token in response to detecting the security violation in the monitored network traffic data between the client and the web application, the other access token associated with the client and another web application that is different from the web application.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, non-transitory computer readable media, and network traffic manager apparatus that assists managing security tokens based on security violations includes monitoring network traffic data between a client and a web application server. Next, the monitored network traffic data is determined for at least one security violation. One or more access tokens associated with the client is modified when the at least one security violation is detected in the monitored network traffic data. The client is restricted from accessing one or more web applications based on the modified one or more access tokens.
824 Citations
20 Claims
-
1. A method for managing security tokens based on security violations, the method implemented by a network traffic management system comprising one or more network traffic manager apparatuses, client devices, or server devices, the method comprising:
-
monitoring network traffic data between a client and a web application, the client granted access to the web application by an access token associated with the client and the web application; detecting a security violation in the monitored network traffic data between the client and the web application; revoking the access token associated with the client and the web application in response to detecting the security violation in the monitored network traffic data between the client and the web application; preventing the client associated with the revoked access token from accessing the web application; and modifying an access right for another access token in response to detecting the security violation in the monitored network traffic data between the client and the web application, the other access token associated with the client and another web application that is different from the web application. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer readable medium having stored thereon instructions for managing security tokens based on security violations comprising executable code which when executed by one or more processors, causes the processors to:
-
monitor network traffic data between a client and a web application, the client granted access to the web application by an access token associated with the client and the web application; detect a security violation in the monitored network traffic data between the client and the web application; revoke the access token associated with the client and the web application in response to detecting the security violation in the monitored network traffic data between the client and the web application; prevent the client associated with the revoked access token from accessing the web application; and modify an access right for another access token in response to detecting the security violation in the monitored network traffic data between the client and the web application, the other access token associated with the client and another web application that is different from the web application. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A network traffic manager apparatus, comprising memory comprising programmed instructions stored in the memory and one or more processors configured to be capable of executing the programmed instructions stored in the memory to:
-
monitor network traffic data between a client and a web application, the client granted access to the web application by an access token associated with the client and the web application; detect a security violation in the monitored network traffic data between the client and the web application; revoke the access token associated with the client and the web application in response to detecting the security violation in the monitored network traffic data between the client and the web application; prevent the client associated with the revoked access token from accessing the web application; and modify an access right for another access token in response to detecting the security violation in the monitored network traffic data between the client and the web application, the other access token associated with the client and another web application that is different from the web application. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A network traffic management system, comprising one or more traffic management apparatuses, client devices, or server devices, the network traffic management system comprising memory comprising programmed instructions stored thereon and one or more processors configured to be capable of executing the stored programmed instructions to:
-
monitor network traffic data between a client and a web application, the client granted access to the web application by an access token associated with the client and the web application; detect a security violation in the monitored network traffic data between the client and the web application; revoke the access token associated with the client and the web application in response to detecting the security violation in the monitored network traffic data between the client and the web application; prevent the client associated with the revoked access token from accessing the web application; and modify an access right for another access token in response to detecting the security violation in the monitored network traffic data between the client and the web application, the other access token associated with the client and another web application that is different from the web application. - View Dependent Claims (17, 18, 19, 20)
-
Specification