×

Methods for managing security tokens based on security violations and devices thereof

  • US 10,812,266 B1
  • Filed: 09/29/2017
  • Issued: 10/20/2020
  • Est. Priority Date: 03/17/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing security tokens based on security violations, the method implemented by a network traffic management system comprising one or more network traffic manager apparatuses, client devices, or server devices, the method comprising:

  • monitoring network traffic data between a client and a web application, the client granted access to the web application by an access token associated with the client and the web application;

    detecting a security violation in the monitored network traffic data between the client and the web application;

    revoking the access token associated with the client and the web application in response to detecting the security violation in the monitored network traffic data between the client and the web application;

    preventing the client associated with the revoked access token from accessing the web application; and

    modifying an access right for another access token in response to detecting the security violation in the monitored network traffic data between the client and the web application, the other access token associated with the client and another web application that is different from the web application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×