CREDENTIALS ENFORCEMENT USING A FIREWALL
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques for credentials enforcement using a firewall are disclosed. In some embodiments, a system, process, and/or computer program product for enforcement using a firewall includes storing a plurality of user credentials at a network device; monitoring network traffic at the network device to determine if there is a match with one or more of the plurality of user credentials; and performing an action if the match is determined.
-
Citations
21 Claims
-
1. (canceled)
-
2. A system for credentials enforcement using a firewall, comprising:
-
a processor of a network device configured to; store a plurality of user credentials at the network device; monitor network traffic at the network device to determine whether there is a match with one or more of the plurality of user credentials for external site authentication, wherein the determining of whether there is a match is based on a bloom filter; and perform an action in response to a determination that the match is determined; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for credentials enforcement using a firewall, comprising:
-
storing a plurality of user credentials at a network device; monitoring network traffic at the network device to determine whether there is a match with one or more of the plurality of user credentials, wherein the determining of whether there is a match is based on a bloom filter; and performing an action in response to a determination that the match is determined.
-
-
21. A computer program product for credentials enforcement using a firewall, the computer program product being embodied in a tangible computer readable storage medium and comprising computer instructions for:
-
storing a plurality of user credentials at a network device; monitoring network traffic at the network device to determine whether there is a match with one or more of the plurality of user credentials, wherein the determining of whether there is a match is based on a bloom filter; and performing an action in response to a determination that the match is determined.
-
Specification