FIREWALL CONTROL SYSTEM
First Claim
1. A method for controlling a firewall for a user computer system, the method comprising:
- receiving a data request at a firewall, the data request being associated with a program of the user computer system;
determining whether an authentication plan is required to be matched for the associated program;
in response to determining that matching an authentication plan is required for the associated program, accessing a stored authentication plan associated with the program, the stored authentication plan having one or more authentication records each having expected information relating to user access to a particular server;
accessing a current authentication plan from an authentication store, the current authentication plan having one or more authentication records each having current information relating to user access to a particular server;
comparing the stored authentication plan with the received current authentication plan to determine whether they match; and
in response to the comparison between the stored authentication plan and the current authentication plan, performing one or more firewall actions.
1 Assignment
0 Petitions
Accused Products
Abstract
Generally speaking, systems, methods and media for implementing a firewall control system responsive to user authentications are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program. Embodiments may include determining whether an authentication plan is required to be matched for the associated program and, if so, accessing a stored authentication plan associated with the program and having one or more authentication records each having expected information relating to user access to a particular server. Embodiments may include accessing a current authentication plan from an authentication store, the current authentication plan having one or more authentication records each having information relating to user access to a particular server. Embodiments may include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response, performing one or more firewall actions.
50 Citations
20 Claims
-
1. A method for controlling a firewall for a user computer system, the method comprising:
-
receiving a data request at a firewall, the data request being associated with a program of the user computer system; determining whether an authentication plan is required to be matched for the associated program; in response to determining that matching an authentication plan is required for the associated program, accessing a stored authentication plan associated with the program, the stored authentication plan having one or more authentication records each having expected information relating to user access to a particular server; accessing a current authentication plan from an authentication store, the current authentication plan having one or more authentication records each having current information relating to user access to a particular server; comparing the stored authentication plan with the received current authentication plan to determine whether they match; and in response to the comparison between the stored authentication plan and the current authentication plan, performing one or more firewall actions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product comprising a computer-useable medium having a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
receiving a data request at a firewall, the data request being associated with a program of the user computer system; determining whether an authentication plan is required to be matched for the associated program; in response to determining that matching an authentication plan is required for the associated program, accessing a stored authentication plan associated with the program, the stored authentication plan having one or more authentication records each having expected information relating to user access to a particular server; accessing a current authentication plan from an authentication store, the current authentication plan having one or more authentication records each having current information relating to user access to a particular server; comparing the stored authentication plan with the received current authentication plan to determine whether they match; and in response to the comparison between the stored authentication plan and the current authentication plan, performing one or more firewall actions. - View Dependent Claims (13, 14)
-
-
15. A firewall system implemented on a computer system, the firewall system comprising:
-
a network stack to interrogate incoming and outgoing data packets and to apply one or more firewall rules against them to allow or deny the data packets access to a program; and an authentication verifier in communication with the network stack to further control access to data packets, the authentication verifier comprising; an authentication module to access a stored authentication plan for a program associated with a particular data packet, the stored authentication plan comprising one or more authentication records each having expected information relating to access by a user to a particular server; an authentication store interface module to receive a current authentication plan for the associated program, the current authentication plan comprising one or more authentication records each having current information relating to access by a user to a particular server; wherein the authentication module compares the stored authentication plan with the received current authentication plan to determine whether they match; and a firewall action manager to perform one or more firewall actions in response to a determination of whether the stored authentication plan and the received current authentication plan match. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification