Applying security policy to an application session

Information

  • Patent Grant
  • 9497201
  • Patent Number
    9,497,201
  • Date Filed
    Monday, January 4, 2016
    9 years ago
  • Date Issued
    Tuesday, November 15, 2016
    8 years ago
Abstract
Applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session.
Description
BACKGROUND OF THE INVENTION

1. Field


This invention relates generally to data networking, and more specifically, to a system and method to apply a network traffic policy based on a user identity during an application session.


2. Related Art


The secure data network of a company is a critical component for day-to-day functioning of company business activities. Company employees access the secure data network for communication within the company and with the outside world. Company information, oftentimes proprietary or confidential, is exchanged during the communication.


Typically, an employee gains access to the company's secure data network by means of a network logon procedure using a private user identity, such as a user name “Robert P. Williamson” or an employee number “NG01-60410”. Subsequent information exchange using the company's office applications, such as email, file transfer or document control is traceable based on the private user identity through network event logs.


Since the late 1990's, we have been witnessing the phenomenal rising popularity of public communication applications and services, such as email and Instant Messaging offered by Yahoo™, America Online™ (AOL), or Google™, conferencing and collaboration services offered by WebEx™ or Centra™, or peer-to-peer services for a variety of file sharing. Generally, a public communication service allows a user to exchange information through messaging, text chat or document exchange using a public user identity, such as “butterdragon”, “fingemai11984”, or “peterrabbit”.


However, in a company setting, when an employee connects to a public communication service with a public user identity over the company's secure data network, the information exchange is not easily traceable if at all since the public user identity is not tied to the private user identity.


In one example, a company's information technology (IT) department notices that an employee Victor has been using the company's email system to send out proprietary documents, violating the company's security policy. After issuing a warning to Victor, the IT department finds no further violations. Unfortunately, they are not aware of the fact that Victor has continued this activity using Yahoo™ email with a public user identity “PiratesOfCaribbean@Yahoo.com”.


In another example, two weeks before a major trade show, a company implements a security measure to monitor communication activities of employees of director level and above to ensure confidentiality of competitive information. This security measure, covering company email, phone conversation and voice messaging, nevertheless proves to be a failure as sensitive information leaks out to a business reporter anyway prior to the trade show. The source of the leak may never be confirmed, but the business reporter privately discloses that he gets the information from an anonymous employee of the company using AOL Instant Messaging™ with screen name “opensecret2006”.


The above discussion illustrates the need for a security solution to associate a user identity to a public application.


BRIEF SUMMARY OF THE INVENTION

Method for applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1A illustrates a secure network.



FIG. 1B illustrates an access session and an application session.



FIG. 1C illustrates an access session record and an application session record.



FIG. 2 illustrates a process to generate an application session record.



FIG. 3 illustrates a process to recognize an application session.



FIG. 4A illustrates a process to determine a public user identity of application session.



FIG. 4B illustrates a data packet in an AIM log-on packet.



FIG. 5 illustrates a process to determine a private user identity.



FIG. 6 illustrates an embodiment of a security gateway obtaining a security policy by querying a corporate directory.



FIG. 7 illustrates a security policy including a security control.



FIG. 8 illustrates a plurality of embodiments of network traffic policy.





DETAILED DESCRIPTION OF THE INVENTION


FIG. 1A illustrates a secure network.


A secure network 160 includes a host 130. User 120 uses host 130 to access a public application 180 hosted in application server 190. Application server 190 is outside of secure network 160. The network traffic between host 130 and application server 190 passes through security gateway 150. The security gateway 150 is operationally coupled to a processor 171 and a computer readable medium 172. The computer readable medium 172 stores computer readable program code for implementing the various embodiments of the present invention as described herein.


Host 130 is a computing device with network access capabilities. The host 130 is operationally coupled to a processor 173 and a computer readable medium 174. The computer readable medium 174 stores computer readable program code for implementing the various embodiments of the present invention as described herein. In some embodiments, host 130 is a workstation, a desktop personal computer or a laptop personal computer. In some embodiments, host 130 is a Personal Data Assistant (PDA), a smartphone, or a cellular phone.


In some embodiments, secure network 160 is an Internet Protocol (IP) network. In some embodiments, secure network 160 is a corporate data network or a regional corporate data network. In some embodiments, secure network 160 is an Internet service provider network. In some embodiments, secure network 160 is a residential data network. In some embodiments, secure network 160 includes a wired network such as Ethernet. In some embodiments, secure network 160 includes a wireless network such as a WiFi network.


Public application 180 provides a service that allows user 120 to communicate with other users in a real-time fashion. In some embodiments, the service includes text chat. In some embodiments, the service includes a voice call or a video call. In some embodiments, the service includes a network game. In some embodiments, the service includes exchanging a document, such as sending or receiving a text document, a PowerPoint™ presentation, an Excel™ spreadsheet, an image file, a music file or a video clip. In some embodiments, the service includes a collaborative document processing such as creating a document, a business plan, an agreement, wherein user 120 collaborates with other users in a real time fashion. In some embodiments, the service includes a collaborative information exchange such as a conference call. In some embodiments, the service is a social networking service. In some embodiments, the service includes real-time collaboration and non real-time collaboration.


In one example, public application 180 provides America Online Instant Messenger™ service. In one example, public application 180 provides Yahoo Instant Messenger™ voice service. In some embodiments, public application 180 provides a file sharing service such as Kazaa™ file sharing service. In some embodiments, public application 180 provides a network game service such as Microsoft™ Network Game service. In some embodiments, public application 180 provides an on-line collaborative document processing such as Google Docs™, and Salesforce.com™. In some embodiments, public application 180 provides an on-line information exchange and communications such as WebEx™. In some embodiments, public application 180 provides live information streaming such as live video streaming, live audio streaming, and instantaneous picture uploading.


Security gateway 150 is situated at the edge of secure network 160. Security gateway 150 connects secure network 160 to public application 180. Security gateway 150 receives network traffic from secure network 160 and transmits the network traffic to application server 190. Likewise, security gateway 150 receives network traffic from application server 190 and transmits the network traffic to secure network 160.


In some embodiments, security gateway 150 includes the function of a corporate Wide Area Network (WAN) gateway. In some embodiments, security gateway 150 includes the function of a residential broadband gateway. In some embodiments, security gateway 150 includes the function of a WAN gateway for an Internet service provider.



FIG. 1B illustrates an access session and an application session.


User 120 uses host 130 to access secure network 160 during an access session 162.


Host 130 has a host identity 134. Host 130 uses host identity 134 to connect to secure network 160. In some embodiments, host identity 134 includes an IP address. In some embodiments, host identity 134 includes a Media Access Control (MAC) address.


Within secure network 160, user 120 has a private user identity 124. In some embodiments, private user identity 124 is an employee number or an employee name. In some embodiments, private user identity 124 is an Internet service subscription identity. In some embodiments, access session 162 is established after a successful network user log-in procedure, such as an employee network log-in, for secure network 160 using private user identity 124. Private user identity 124 is associated with host identity 134. In some embodiments, host 130 is a guest computing device. Private user identity 124 is associated with an Ethernet switch port where host 130 connects. In this embodiment, private user identity 124 is a port number, an Ethernet interface identity, or an Ethernet VLAN identity.


User 120 uses host 130 to access public application 180 in an application session 182. User 120 uses a public user identity 127 during application session 182. In some embodiments, public application 180 prompts user 120 to log-in before establishing application session 182. During the application user log-in procedure, user 120 provides to public application 180 public user identity 127. In another embodiment, public application 180 selects a public user identity 127 for user 120 for application session 182. In some embodiments, public user identity 127 is set up through a user registration process or a service subscription process. Network traffic in application session 182 passes through security gateway 150.



FIG. 1C illustrates an access session record and an application session record.


Access session record 164 records information about access session 162. The information includes private user identity 124, host identity 134 and access session time 166. In some embodiments, access session time 166 is the starting time when access session 162 is established. In some embodiments, access session time 166 includes the starting time and the ending time when user 120 finishes access session 162. In some embodiments, access session time 166 is a time stamp for a time during access session 162.


Application session record 184 records information about application session 182. The information includes private user identity 124, public user identity 127, and application session time 186. In some embodiments, the information further includes host identity 134. In some embodiments, application session time 186 includes the starting time when application session 182 is established. In some embodiments, application session time 186 includes a time stamp during application session 182. In some embodiments, application session time 186 includes a time stamp when security gateway 150 recognizes application session 182.



FIG. 2 illustrates a process to generate an application session record.


The process of generating application session record 184 includes multiple steps.


In step 201, security gateway 150 recognizes an application session.


In step 202, security gateway 150 determines a public user identity of the application session.


In step 203, security gateway 150 determines a private user identity using information about the application session.



FIGS. 3-5 illustrates steps 201-203 respectively.



FIG. 3 illustrates a process to recognize an application session.


Security gateway 150 inspects network traffic between host 130 and application server 190 to recognize application session 182 for public application 180.


In some embodiments, security gateway 150 inspects data packet 339 between host 130 and application server 190 for the recognition of application session 182.


Security gateway 150 includes an application identifier 355 for public application 180. Application identifier 355 includes information for recognizing application session 182. In some embodiments, application identifier 355 includes a transport layer information, such as Transmission Control Protocol (TCP) or User Diagram Protocol (UDP); and at least one transport port number, such as a TCP port number or a UDP port number. In some embodiments, application identifier 355 includes application layer information, such as one or more data filters wherein a data filter specifies a value and a position of the value in a data packet. In one example, a data filter is [byte 0 with value “0x52”]. In one example, a data filter is [byte 4-7 with ASCII value of “ADEH”].


Security gateway 150 matches data packet 339 against application identifier 355.


In some embodiments, application identifier 355 includes transport protocol type of TCP and a destination TCP port number of 5190, the TCP port number used by AIM protocol. In this embodiment, data packet 339 is a TCP packet from host 130 to application server 190. Security gateway 150 matches data packet 339 against application identifier 355 and determines that public application 180 provides AIM service.


Security gateway 150 creates application session record 184. Security gateway 150 extracts the source IP address from the IP header of data packet 339, and stores the source IP address as host identity 134. In some embodiments, data packet 339 includes link layer information, such as a source MAC address; security gateway 150 extracts and stores the source MAC address as host identity 134.


In some embodiments, security gateway 150 connects to a clock 359. Clock 359 indicates the current time of day. Security gateway 150 stores the time of day indicated by clock 359 in application session time 186.



FIG. 4A illustrates a process to determine a public user identity of application session 182.


The method for determining public user identity 127 is typically specific to public application 180. In some embodiments, data packet 339 is an application packet. For example, public application 180 provides AIM service; data packet 339 is an AIM packet.


An AIM packet includes multiple fields, for example

    • Command start field is a 1-byte data field starting at byte offset 0 having a fixed hexadecimal value “0x02”;
    • Channel ID field is a 1-byte data field starting at byte offset 1;
    • Sequence number field is a 2-byte integer starting at byte offset 2;
    • Data field length field is a 2-byte data field starting at byte offset 4;
    • Family field is a 2-byte data field starting at byte offset 6; and
    • Subtype field is a 2-byte data field starting at byte offset 8.


An AIM log-on packet is a AIM packet with family field having a fixed hexadecimal value of “0x00 0x17” and subtype field having a fixed hexadecimal value of “0x00 0x06”.


AIM log-on packet further includes buddy name length field, a 1-byte integer starting at byte offset 19, and a variable length buddy name field starting at byte offset 20. Buddy name length field indicates the length in bytes of buddy name field.


Security gateway 150 matches data packet 339 to determine if data packet 339 is an AIM log-on packet. In some embodiments, data packet 339 is an AIM log-on packet 400 illustrated in FIG. 4B. Security gateway 150 extracts buddy name length field 405. Security gateway 150 furthers extracts buddy name field 407. In this embodiment, buddy name length field 405 is integer “13” and buddy name field 407 is “JohnSmithI984”. Security gateway 150 stores “JohnSmithI984” as public user identity 127 in application session record 184.


In some embodiments, data packet 339 is not an AIM log-on packet. Security gateway 150 inspects another data packet from host 130.



FIG. 5 illustrates a process to determine a private user identity.


Secure network 160 includes an identity server 570. The identity server 570 is operationally coupled to a processor 581 and a computer readable medium 582. The computer readable medium 582 stores computer readable program code for implementing the various embodiments of the present invention as described herein. Identity server 570 includes access session record 164 of access session 162 during which user 120 accesses application session 182.


Security gateway 150 queries identity server 570. Security gateway 150 sends host identity 134 and application session time 186 to identity server 570.


Identity server 570 receives host identity 134 and application session time 186. Identity server 570 matches host identity 134 and application session time 186 against access session record 164. Identity server 570 determines that host identity 134 matches host identity of access session record 164. Identity server 570 further determines that application session time 186 matches access session time 166 of access session record 164 as application session time 186 is between the starting time and the ending time of access session record 164. Identity server 570 sends private user identity 124 of access session record 164 to security gateway 150 as a response to the query.


Security gateway 150 receives private user identity 124 from identity server 570, and stores private user identity 124 in application session record 184.


In some embodiments, security gateway 150 stores public user identity 127 in application session record 184 after recognizing a log-on approval indication for the public user identity 127 from public application 180.


In some embodiments, security gateway 150 queries identity server 570 immediately after determining public user identity 127. In some embodiments, security gateway 150 queries identity server 570 after application session 182 ends.


In some embodiments, security gateway 150 queries identity server 570 by sending a plurality of host identities in a bulk request; and receives a plurality of private user identities in a bulk response.


In some embodiments, application session record 184 includes additional user information associated with private user identity 124, such as cubicle or office number, cubicle or office location, telephone number, email address, mail-drop location, department name/identity, or manager name.


In some embodiments, security gateway 150 obtains the additional user information from identity server 570. In some embodiments, security gateway 150 obtains the additional user information by querying a different server, such as a corporate directory server, by using the private user identity 124 received from identity server 570.


In some embodiments, public application 180 provides file transfer service using File Transfer Protocol (FTP) protocol or a proprietary protocol. In some embodiments, public application 180 provides email service using Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP) or Post Office Protocol version 3 (POP3) protocol.


By using the application session record, the private user identity 124 and the public user identity 127 for an application session 182 may be determined. In some embodiments as illustrated by FIG. 6, upon determining the public user identity and the private user identity, security gateway 150 obtains security policy 402 for the application session 182 by querying corporate directory 470. In an embodiment, corporate directory 470 comprises security policy 402. In some embodiments, corporate directory 470 is a server computer comprising a storage 601 that includes security policy 402. In some embodiments, corporate directory 470 is a database comprising security policy 402. In another embodiment, corporate directory 470 is a software module with program code stored on a computer readable medium (not shown) running in a computer. In some embodiments, corporate directory 470 resides in identity server 570. In some embodiments, corporate directory 470 uses directory technologies such as Microsoft Active Directory™, lightweight directory access protocol (LDAP) directory services, web services, directory services using Java™ technologies. In some embodiments, corporate directory 470 includes a policy server hosting security policy 402 and other policies.


Security gateway 150 queries corporate directory 470 for a security policy, where the query includes user identity 424. User identity 424 may include private user identity 124 or public user identity 127. Corporate directory 470 matches user identity 424 against security policy 402 and determines security policy 402 is applicable to user identity 424. In some embodiments security policy 402 maps network parameters to a user identity and there is a match between user identity 424 and the user identity in the security policy 402. In some embodiments, security policy 402 maps network parameters to a group identity (not shown) and user identity 424 is a member of the group identity. In response to finding the match between the user identity 424 and the user identity in the security policy 402, corporate directory 470 sends security policy 402 to security gateway 150.


In some embodiments, security gateway 150 generates security report 475 based on application session record 184 and security policy 402. In some embodiments, security gateway 150 generates security report 475 based on a pre-determined user identity or a list of pre-determined user identities. For example, the security report may be generated based on an input of user identity or identities. In some embodiments, security gateway 150 generates security report 475 based on a pre-defined schedule or when requested by an operator.


In some embodiments, security policy 402 includes a security control function as illustrated in FIG. 7. Security gateway 150 applies the security policy 402 received from corporate directory 470 in response to the query to application session 182. Security policy 402 typically are configured by a company to protect against improper access to the company confidential documents and to protect against improper usage of the company secure network 160 vital for the company operation. In some embodiments, in response to receiving the security policy 402, the security gateway 150 confirms that the received security policy 402 contains a user identity that matches the user identity 424 sent in the query. In response to the confirmation, the security gateway 150 applies the security policy 402 to the application session 182. In FIG. 7, security policy 402 includes network traffic policy 451 or document access policy 453.



FIG. 8 illustrates a plurality of embodiments of network traffic policy 451. In some embodiments, network traffic policy 451 specifies network based application session access control indicating if user identity 424 is denied or allowed to continue application session 182. If denied, security gateway 150 may stop forwarding data packets 439 of application session 182. In some embodiments, network traffic policy 451 specifies bandwidth rate capacity such as 1 Mbps, 100 MB per day, or 5 GB per month. In an embodiment, bandwidth rate capacity is measured in packets such as 100 packets per second, 10 thousand packets per day or 4 million packets per month. In some embodiments, network traffic policy 451 specifies a quality of service (QOS) mapped to user identity 424 for application session 182. For example, network traffic policy 451 indicates a change of Differentiated Services Code Point (DSCP) marking in the data packets 439 of application session 182. In some embodiments, network traffic policy 451 specifies a queuing delay, a queuing priority, a packet forwarding path, a link interface preference, a server load balancing preference, a packet routing policy, or other control to handle data packets 439 of application session 182.


In some embodiments, network traffic policy 451 includes a traffic shaping control. In one example, traffic shaping control specifies a TCP profile such as a change of window segment size, or a TCP window adjustment.


In some embodiments, network traffic policy 451 indicates session connection rate control based on user identity 424 specifying a rate or capacity such as 10 session connections per second, 35 concurrent sessions, 100 sessions during lunch hour, 500 sessions a day, 24 voice sessions a day, or 75 file transfer sessions an hour. In some embodiments, network traffic policy 451 may specify, when exceeding the rate or capacity, if application session 182 is denied or data packets 439 of application session 182 are dropped.


In some embodiments, network traffic policy 451 includes application session modification control mapped to user identity 424, specifying how data packets 439 of application session 182 are modified for the user with the user identity 424. In one example, application session modification control specifies security gateway 150 should perform network address translation (NAT) to application session 182 for user identity 424. In one example, security gateway 150 should perform port address translation (PAT) to application session 182 using a pre-determined port number for user identity 424. In another example, security gateway 150 should perform content substitution if application session 182 is an HTTP session and if a Universal Resource Locator (URL) in data packets 439 of application session 182 matches a pre-determined URL for user identity 424. In an example, security gateway 150 should perform filename substitution if application session 182 is a file transfer session and if a filename matching a pre-determined filename is found in data packets 439 of application session 182 for user identity 424. In another example, security gateway 150 should insert a cookie for user identity 424 if application session 182 is an HTTP session, with optionally data packets 439 matching a pre-determined POST or GET request of a URL.


Returning to FIG. 7, in some embodiments, document access policy 453 specifies if access to document 447 is allowed or denied. In some embodiments, document 447 includes a file, a business agreement, a contract, a spreadsheet, a presentation, a drawing, a textual document, a manual, a program, a piece of software program, a design, a product specification, a datasheet, a video file, an audio file, an email, a voice mail, a fax, a photocopy of a document, or any business document. In some embodiments, document 447 includes a URL leading to digital information such as database query result, a web page, a video, or a piece of music. In some embodiments, document 447 includes real time transfer or streaming of information such as video streaming, audio streaming, a web cast, a podcast, a video show, a teleconference session, or a phone call. In some embodiments, document access policy 453 includes document identity 443 and document user identity 444. Document identity 443 identifies document 447. Document user identity 444 identifies the user whose access to the document 447 is affected by the document access policy 453. In an embodiment, security gateway 150 compares user identity 424 with document user identity 444. In response to determining that the user identity 424 matches the document user identity 444, in some embodiments, security gateway 150 allows document 447 with document identity 443 to be accessed by user identity 424. In another embodiment, security gateway 150 denies access to document 447 with document identity 443. In denying access, the security gateway 150 may disconnect application session 182 or discard data packets 439. In some embodiments, security gateway 150 confirms that data packets 439 include document identity 443. In response to confirming that data packets 439 include document identity 443, security gateway 150 applies document access policy 453.


In some embodiments security policy 402 includes time 457 where security policy 402 is applicable within time 457. In some embodiments, time 457 indicates a beginning time such as 8 am, 4 pm, midnight. In an embodiment, time 457 indicates a time range such as 8 am to 10 am, 7 pm to 5 am, morning hours, lunch, rush hour, prime time. Security gateway 150 compares clock 359 with time 457 and determines if security policy 402 is applicable.


In some embodiments, security gateway 150 generates security message 472 when security gateway 150 determines if security policy 402 is applicable to application session 182 for user identity 424. In some embodiments, security gateway generates security message 472 when security gateway 150 applies security policy 402 to application session 182. In some embodiments, security report 475 includes security message 472. In one example, security message 472 includes security policy 402 and user identity 424. In one example, security message 472 includes the actions security gateway 150 applies to application session 182 using security policy 402.


The invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.


Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.


The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.


A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.


Input/output or I/O devices (including but not limited to keyboards, displays, point devices, etc.) can be coupled to the system either directly or through intervening I/O controllers.


Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.


Foregoing described embodiments of the invention are provided as illustrations and descriptions. They are not intended to limit the invention to precise form described. In particular, it is contemplated that functional implementation of invention described herein may be implemented equivalently in hardware, software, firmware, and/or other available functional components or building blocks, and that networks may be wired, wireless, or a combination of wired and wireless. Other variations and embodiments are possible in light of above teachings, and it is thus intended that the scope of invention not be limited by this Detailed Description, but rather by the Claims following.

Claims
  • 1. A method for applying a security policy to an application session, comprising: inspecting, by a security gateway, a data packet for an application session and storing a host identity and application session time in an application session record; determining, by the security gateway, from the data packet for the application session a user identity and storing the user identity in the application session record;determining, by the security gateway, a second user identity by matching an access session record of an access session accessed during the application session that comprises the second user identity, a second host identity, and an access session time, wherein the second host identity and the access session time match the host identity and the application session time of the application session record;storing the second user identity as a network user identity in the application session record;determining, by the security gateway, at least one security policy applicable to the application session based on a group identity; andapplying the at least one security policy to the application session, by the security gateway, if the network user identity is a member of the group identity.
  • 2. The method of claim 1, wherein the determining, by the security gateway, at least one security policy applicable to the application session further comprises determining that the at least one security policy is applicable for a time period.
  • 3. The method of claim 1, wherein the at least one security policy comprises a network traffic policy.
  • 4. The method of claim 3, wherein the network traffic policy comprises a bandwidth rate capacity for a network.
  • 5. The method of claim 3, wherein the network traffic policy comprises a quality of service mapped to the network user identity for the application session.
  • 6. The method of claim 3, wherein the network traffic policy comprises one or more of: a queuing delay, a queuing priority, a packet forwarding path, a link interface preference, a server load balancing preference, and a packet routing policy.
  • 7. The method of claim 3, wherein the network traffic policy comprises a traffic shaping control.
  • 8. The method of claim 7, wherein the traffic shaping control comprises a TCP profile.
  • 9. The method of claim 3, wherein the network traffic policy comprises an application session modification control based on the network user identity.
  • 10. A computer program product for applying a security policy to an application session, the computer program product comprising: a non-transitory computer readable storage medium having computer readable program code embodied thereon, the computer readable program code configured to: inspect, by a security gateway, a data packet for an application session and storing a host identity and application session time in an application session record;determine, by the security gateway, from the data packet for the application session a user identity and store the user identity in the application session record;determine, by the security gateway, a second user identity by matching an access session record of an access session accessed during the application session that comprises the second user identity, a second host identity, and an access session time, wherein the second host identity and the access session time match the host identity and the application session time of the application session record;store the second user identity as a network user identity in the application session record;determine, by the security gateway, at least one security policy applicable to the application session based on a group identity; andapply the at least one security policy to the application session, by the security gateway, if the network user identity is a member of the group identity.
  • 11. The computer program product of claim 10, wherein the computer readable program code configured to determine, by the security gateway, at least one security policy applicable to the application session is further configured to determine that the at least one security policy is applicable for a time period.
  • 12. The computer program product of claim 10, wherein the at least one security policy comprises a network traffic policy.
  • 13. The computer program product of claim 12, wherein the network traffic policy comprises a bandwidth rate capacity for a network.
  • 14. The computer program product of claim 12, wherein the network traffic policy comprises a quality of service mapped to the network user identity for the application session.
  • 15. The computer program product of claim 12, wherein the network traffic policy comprises one or more of: a queuing delay, a queuing priority, a packet forwarding path, a link interface preference, a server load balancing preference, and a packet routing policy.
  • 16. The computer program product of claim 12, wherein the network traffic policy comprises a traffic shaping control.
  • 17. The computer program product of claim 16, wherein the traffic shaping control comprises a TCP profile.
  • 18. The computer program product of claim 12, wherein the network traffic policy comprises an application session modification control based on the network user identity.
  • 19. A system, comprising: a corporate directory comprising at least one security policy; anda security gateway, wherein the security gateway: inspects a data packet for an application session and stores a host identity and application session time in an application session record;determines from the data packet for the application session a user identity and stores the user identity in the application session record;determines a second user identity by matching an access session record of an access session accessed during the application session that comprises the second user identity, a second host identity, and an access session time, wherein the second host identity and the access session time match the host identity and the application session time of the application session record;stores the second user identity as a network user identity in the application session record;determines at least one security policy applicable to the application session based on a group identity; andapplies the at least one security policy to the application session if the network user identity is a member of the group identity.
  • 20. The system of claim 19, wherein the determines at least one security policy applicable to the application session further comprises determines that the at least one security policy is applicable for a time period.
  • 21. The system of claim 19, wherein the at least one security policy comprises a network traffic policy.
  • 22. The system of claim 21, wherein the network traffic policy comprises a bandwidth rate capacity for a network.
  • 23. The system of claim 21, wherein the network traffic policy comprises a quality of service mapped to the network user identity for the application session.
  • 24. The system of claim 21, wherein the network traffic policy comprises one or more of: a queuing delay, a queuing priority, a packet forwarding path, a link interface preference, a server load balancing preference, and a packet routing policy.
  • 25. The system of claim 21, wherein the network traffic policy comprises a traffic shaping control.
  • 26. The system of claim 25, wherein the traffic shaping control comprises a TCP profile.
  • 27. The system of claim 21, wherein the network traffic policy comprises an application session modification control based on the network user identity.
CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation and claims the priority benefit of U.S. patent application Ser. No. 14/323,884, filed on Jul. 3, 2014, issued on Feb. 23, 2016, as U.S. Pat. No. 9,270,705; which in turn is a continuation of U.S. patent application Ser. No. 14/061,720, filed on Oct. 23, 2013, issued on Aug. 19, 2014, as U.S. Pat. No. 8,813,180; which in turn is a continuation of U.S. patent application Ser. No. 13/650,179, filed on Oct. 12, 2012, issued on Nov. 26, 2013, as U.S. Pat. No. 8,595,791; which in turn is a continuation of U.S. patent application Ser. No. 12/788,339, filed on May 27, 2010, issued on Nov. 13, 2012 as U.S. Pat. No. 8,312,507; which in turn is a continuation-in-part of U.S. patent application Ser. No. 12/771,491, filed on Apr. 30, 2010, issued on Jul. 12, 2011, as U.S. Pat. No. 7,979,585; which in turn is a continuation of U.S. patent application Ser. No. 11/582,613, filed on Oct. 17, 2006, issued on May 11, 2010, as U.S. Pat. No. 7,716,378. The disclosures of each of the above referenced applications are hereby incorporated by reference.

US Referenced Citations (495)
Number Name Date Kind
5218602 Grant et al. Jun 1993 A
5541994 Tomko et al. Jul 1996 A
5712912 Tomko et al. Jan 1998 A
5737420 Tomko et al. Apr 1998 A
5757916 MacDoran et al. May 1998 A
5774660 Brendel et al. Jun 1998 A
5832091 Tomko et al. Nov 1998 A
5935207 Logue et al. Aug 1999 A
5958053 Denker Sep 1999 A
5991408 Pearson et al. Nov 1999 A
5995981 Wikstrom Nov 1999 A
6003069 Cavill Dec 1999 A
6035398 Bjorn Mar 2000 A
6047268 Bartoli et al. Apr 2000 A
6131163 Wiegel Oct 2000 A
6167517 Gilchrist et al. Dec 2000 A
6182146 Graham-Cumming, Jr. Jan 2001 B1
6182221 Hsu et al. Jan 2001 B1
6219706 Fan et al. Apr 2001 B1
6219793 Li et al. Apr 2001 B1
6219794 Soutar et al. Apr 2001 B1
6259705 Takahashi et al. Jul 2001 B1
6310966 Dulude et al. Oct 2001 B1
6317834 Gennaro et al. Nov 2001 B1
6321338 Porras et al. Nov 2001 B1
6374300 Masters Apr 2002 B2
6459682 Ellesson et al. Oct 2002 B1
6490624 Sampson et al. Dec 2002 B1
6507912 Matyas, Jr. et al. Jan 2003 B1
6587866 Modi et al. Jul 2003 B1
6714931 Papierniak et al. Mar 2004 B1
6748084 Gau et al. Jun 2004 B1
6748414 Bournas Jun 2004 B1
6772334 Glawitsch Aug 2004 B1
6779017 Lamberton et al. Aug 2004 B1
6779033 Watson et al. Aug 2004 B1
6901145 Bohannon et al. May 2005 B1
6950651 Seligmann Sep 2005 B2
6952728 Alles et al. Oct 2005 B1
7010605 Dharmarajan Mar 2006 B1
7013482 Krumel Mar 2006 B1
7058718 Fontes et al. Jun 2006 B2
7069438 Balabine et al. Jun 2006 B2
7076555 Orman et al. Jul 2006 B1
7095852 Wack et al. Aug 2006 B2
7133916 Schunemann Nov 2006 B2
7143087 Fairweather Nov 2006 B2
7155514 Milford Dec 2006 B1
7181524 Lele Feb 2007 B1
7218722 Turner et al. May 2007 B1
7228359 Monteiro Jun 2007 B1
7234161 Maufer et al. Jun 2007 B1
7236457 Joe Jun 2007 B2
7237267 Rayes et al. Jun 2007 B2
7254133 Govindarajan et al. Aug 2007 B2
7269850 Govindarajan et al. Sep 2007 B2
7277963 Dolson et al. Oct 2007 B2
7301899 Goldstone Nov 2007 B2
7308499 Chavez Dec 2007 B2
7310686 Uysal Dec 2007 B2
7328267 Bashyam et al. Feb 2008 B1
7334232 Jacobs et al. Feb 2008 B2
7337241 Boucher et al. Feb 2008 B2
7343399 Hayball et al. Mar 2008 B2
7349970 Clement et al. Mar 2008 B2
7360237 Engle et al. Apr 2008 B2
7370353 Yang May 2008 B2
7376969 Njemanze et al. May 2008 B1
7391725 Huitema et al. Jun 2008 B2
7398317 Chen et al. Jul 2008 B2
7423977 Joshi Sep 2008 B1
7430755 Hughes et al. Sep 2008 B1
7463648 Eppstein et al. Dec 2008 B1
7467202 Savchuk Dec 2008 B2
7472190 Robinson Dec 2008 B2
7480934 Chan et al. Jan 2009 B2
7484089 Kogen et al. Jan 2009 B1
7492766 Cabeca et al. Feb 2009 B2
7506360 Wilkinson et al. Mar 2009 B1
7509369 Tormasov Mar 2009 B1
7512980 Copeland et al. Mar 2009 B2
7533409 Keane et al. May 2009 B2
7551574 Peden, II et al. Jun 2009 B1
7552126 Chen et al. Jun 2009 B2
7552323 Shay Jun 2009 B2
7584262 Wang et al. Sep 2009 B1
7584301 Joshi Sep 2009 B1
7590736 Hydrie et al. Sep 2009 B2
7613193 Swami et al. Nov 2009 B2
7613822 Joy et al. Nov 2009 B2
7613829 Alve Nov 2009 B2
7647635 Chen et al. Jan 2010 B2
7653633 Villella et al. Jan 2010 B2
7673072 Boucher et al. Mar 2010 B2
7675854 Chen et al. Mar 2010 B2
7703102 Eppstein et al. Apr 2010 B1
7707295 Szeto et al. Apr 2010 B1
7711790 Barrett et al. May 2010 B1
7716378 Chen et al. May 2010 B2
7747748 Allen Jun 2010 B2
7765328 Bryers et al. Jul 2010 B2
7792113 Foschiano et al. Sep 2010 B1
7804956 Chang et al. Sep 2010 B2
7808994 Vinokour et al. Oct 2010 B1
7826487 Mukerji et al. Nov 2010 B1
7881215 Daigle et al. Feb 2011 B1
7948952 Hurtta et al. May 2011 B2
7970934 Patel Jun 2011 B1
7979585 Chen et al. Jul 2011 B2
7983258 Ruben et al. Jul 2011 B1
7990847 Leroy et al. Aug 2011 B1
7991859 Miller et al. Aug 2011 B1
8019870 Eppstein et al. Sep 2011 B1
8032634 Eppstein et al. Oct 2011 B1
8090866 Bashyam et al. Jan 2012 B1
8104091 Qin et al. Jan 2012 B2
8122116 Matsunaga et al. Feb 2012 B2
8122152 Chittenden et al. Feb 2012 B2
8151322 Chen et al. Apr 2012 B2
8179809 Eppstein et al. May 2012 B1
8185651 Moran et al. May 2012 B2
8191106 Choyi May 2012 B2
8224971 Miller et al. Jul 2012 B1
8234650 Eppstein et al. Jul 2012 B1
8296434 Miller et al. Oct 2012 B1
8312507 Chen et al. Nov 2012 B2
8379515 Mukerji Feb 2013 B1
8423676 Chen et al. Apr 2013 B2
8499093 Grosser et al. Jul 2013 B2
8539075 Bali et al. Sep 2013 B2
8554929 Szeto et al. Oct 2013 B1
8560693 Wang et al. Oct 2013 B1
8584199 Chen et al. Nov 2013 B1
8595383 Chen et al. Nov 2013 B2
8595791 Chen et al. Nov 2013 B1
RE44701 Chen et al. Jan 2014 E
8675488 Sidebottom et al. Mar 2014 B1
8681610 Mukerji Mar 2014 B1
8750164 Casado et al. Jun 2014 B2
8782221 Han Jul 2014 B2
8782751 Chen et al. Jul 2014 B2
8813180 Chen et al. Aug 2014 B1
8826372 Chen et al. Sep 2014 B1
8868765 Chen et al. Oct 2014 B1
8879427 Krumel Nov 2014 B2
8885463 Medved et al. Nov 2014 B1
8897154 Jalan et al. Nov 2014 B2
8903986 Newstadt et al. Dec 2014 B1
8965957 Barros Feb 2015 B2
8977749 Han Mar 2015 B1
8990262 Chen et al. Mar 2015 B2
9060003 Wang et al. Jun 2015 B2
9076027 Miura et al. Jul 2015 B2
9094364 Jalan et al. Jul 2015 B2
9106561 Jalan et al. Aug 2015 B2
9122853 Thompson Sep 2015 B2
9154584 Han Oct 2015 B1
9215275 Kannan et al. Dec 2015 B2
9219751 Chen et al. Dec 2015 B1
9253152 Chen et al. Feb 2016 B1
9270705 Chen et al. Feb 2016 B1
9270774 Jalan et al. Feb 2016 B2
9294467 Wang et al. Mar 2016 B2
9338225 Jalan et al. May 2016 B2
9344421 Chen et al. May 2016 B1
9350744 Chen et al. May 2016 B2
9356910 Chen et al. May 2016 B2
9386088 Zheng et al. Jul 2016 B2
20010022558 Karr, Jr. et al. Sep 2001 A1
20010049741 Skene et al. Dec 2001 A1
20020032777 Kawata et al. Mar 2002 A1
20020078164 Reinschmidt Jun 2002 A1
20020091844 Craft et al. Jul 2002 A1
20020095587 Doyle et al. Jul 2002 A1
20020103916 Chen et al. Aug 2002 A1
20020133491 Sim et al. Sep 2002 A1
20020138618 Szabo Sep 2002 A1
20020143991 Chow et al. Oct 2002 A1
20020178259 Doyle et al. Nov 2002 A1
20020191575 Kalavade et al. Dec 2002 A1
20020194335 Maynard Dec 2002 A1
20020194350 Lu et al. Dec 2002 A1
20030009591 Hayball et al. Jan 2003 A1
20030014544 Pettey Jan 2003 A1
20030023711 Parmar et al. Jan 2003 A1
20030023873 Ben-Itzhak Jan 2003 A1
20030023874 Prokupets et al. Jan 2003 A1
20030035409 Wang et al. Feb 2003 A1
20030035420 Niu Feb 2003 A1
20030091028 Chang et al. May 2003 A1
20030101349 Wang May 2003 A1
20030105859 Garnett et al. Jun 2003 A1
20030131245 Linderman Jul 2003 A1
20030135625 Fontes et al. Jul 2003 A1
20030140232 De Lanauze Jul 2003 A1
20030140235 Immega et al. Jul 2003 A1
20030191989 O'Sullivan Oct 2003 A1
20030195962 Kikuchi et al. Oct 2003 A1
20030219121 van Someren Nov 2003 A1
20040015243 Mercredi et al. Jan 2004 A1
20040034784 Fedronic et al. Feb 2004 A1
20040049687 Orsini et al. Mar 2004 A1
20040059924 Soto et al. Mar 2004 A1
20040062246 Boucher et al. Apr 2004 A1
20040073703 Boucher et al. Apr 2004 A1
20040078419 Ferrari et al. Apr 2004 A1
20040078480 Boucher et al. Apr 2004 A1
20040081173 Feather Apr 2004 A1
20040111516 Cain Jun 2004 A1
20040128312 Shalabi et al. Jul 2004 A1
20040139057 Hirata et al. Jul 2004 A1
20040139108 Tang et al. Jul 2004 A1
20040141005 Banatwala et al. Jul 2004 A1
20040143599 Shalabi et al. Jul 2004 A1
20040153553 Chotkowski et al. Aug 2004 A1
20040167912 Tsui et al. Aug 2004 A1
20040187032 Gels et al. Sep 2004 A1
20040194114 Spiegel Sep 2004 A1
20040199616 Karhu Oct 2004 A1
20040199646 Susai et al. Oct 2004 A1
20040202182 Lund et al. Oct 2004 A1
20040210623 Hydrie et al. Oct 2004 A1
20040210663 Phillips et al. Oct 2004 A1
20040213158 Collett et al. Oct 2004 A1
20040224664 Guo Nov 2004 A1
20040242200 Maeoka et al. Dec 2004 A1
20040253956 Collins Dec 2004 A1
20040254919 Giuseppini Dec 2004 A1
20040260651 Chan et al. Dec 2004 A1
20050005207 Herneque Jan 2005 A1
20050009520 Herrero Jan 2005 A1
20050010930 Vaught Jan 2005 A1
20050018618 Mualem et al. Jan 2005 A1
20050021848 Jorgenson Jan 2005 A1
20050027862 Nguyen et al. Feb 2005 A1
20050036501 Chung et al. Feb 2005 A1
20050036511 Baratakke et al. Feb 2005 A1
20050044270 Grove et al. Feb 2005 A1
20050074013 Hershey et al. Apr 2005 A1
20050080890 Yang et al. Apr 2005 A1
20050086502 Rayes et al. Apr 2005 A1
20050089048 Chittenden et al. Apr 2005 A1
20050102400 Nakahara et al. May 2005 A1
20050108518 Pandya May 2005 A1
20050114186 Heinrich May 2005 A1
20050114321 DeStefano et al. May 2005 A1
20050125276 Rusu Jun 2005 A1
20050144480 Kim et al. Jun 2005 A1
20050163073 Heller et al. Jul 2005 A1
20050182969 Ginter et al. Aug 2005 A1
20050198335 Brown et al. Sep 2005 A1
20050204162 Rayes et al. Sep 2005 A1
20050213586 Cyganski et al. Sep 2005 A1
20050240989 Kim et al. Oct 2005 A1
20050249225 Singhal Nov 2005 A1
20050259586 Hafid et al. Nov 2005 A1
20050283609 Langford Dec 2005 A1
20060023721 Miyake et al. Feb 2006 A1
20060036610 Wang Feb 2006 A1
20060036733 Fujimoto et al. Feb 2006 A1
20060064478 Sirkin Mar 2006 A1
20060069687 Cui et al. Mar 2006 A1
20060069774 Chen et al. Mar 2006 A1
20060069804 Miyake et al. Mar 2006 A1
20060077926 Rune Apr 2006 A1
20060083372 Chang et al. Apr 2006 A1
20060092950 Arregoces et al. May 2006 A1
20060098645 Walkin May 2006 A1
20060112170 Sirkin May 2006 A1
20060140452 Raynor et al. Jun 2006 A1
20060165226 Ernst et al. Jul 2006 A1
20060168319 Trossen Jul 2006 A1
20060173977 Ho et al. Aug 2006 A1
20060187901 Cortes et al. Aug 2006 A1
20060190997 Mahajani et al. Aug 2006 A1
20060209789 Gupta et al. Sep 2006 A1
20060230129 Swami et al. Oct 2006 A1
20060233100 Luft et al. Oct 2006 A1
20060251057 Kwon et al. Nov 2006 A1
20060277303 Hegde et al. Dec 2006 A1
20060280121 Matoba Dec 2006 A1
20070011300 Hollebeek et al. Jan 2007 A1
20070019543 Wei et al. Jan 2007 A1
20070032247 Shaffer et al. Feb 2007 A1
20070067441 Pomerantz Mar 2007 A1
20070067838 Bajko Mar 2007 A1
20070086382 Narayanan et al. Apr 2007 A1
20070094396 Takano et al. Apr 2007 A1
20070118881 Mitchell et al. May 2007 A1
20070121560 Edge May 2007 A1
20070156919 Potti et al. Jul 2007 A1
20070165622 O'Rourke et al. Jul 2007 A1
20070179986 Adam Aug 2007 A1
20070180101 Chen et al. Aug 2007 A1
20070185998 Touitou et al. Aug 2007 A1
20070195792 Chen et al. Aug 2007 A1
20070206746 Andreasson et al. Sep 2007 A1
20070230337 Igarashi et al. Oct 2007 A1
20070245090 King et al. Oct 2007 A1
20070259673 Willars Nov 2007 A1
20070271598 Chen et al. Nov 2007 A1
20070282855 Chen et al. Dec 2007 A1
20070283141 Pollutro et al. Dec 2007 A1
20070283429 Chen et al. Dec 2007 A1
20070286077 Wu Dec 2007 A1
20070288247 Mackay Dec 2007 A1
20070294209 Strub Dec 2007 A1
20080002684 Kumazawa et al. Jan 2008 A1
20080031263 Ervin et al. Feb 2008 A1
20080080398 Yasuie et al. Apr 2008 A1
20080101396 Miyata May 2008 A1
20080104276 Lahoti et al. May 2008 A1
20080109452 Patterson May 2008 A1
20080109870 Sherlock May 2008 A1
20080109887 Chen et al. May 2008 A1
20080130898 Holtmanns et al. Jun 2008 A1
20080134332 Keohane et al. Jun 2008 A1
20080148357 Chen et al. Jun 2008 A1
20080162679 Maher et al. Jul 2008 A1
20080228781 Chen et al. Sep 2008 A1
20080229418 Chen et al. Sep 2008 A1
20080250099 Shen et al. Oct 2008 A1
20080263209 Pisharody et al. Oct 2008 A1
20080263626 Bainter et al. Oct 2008 A1
20080271130 Ramamoorthy Oct 2008 A1
20080282254 Blander et al. Nov 2008 A1
20080291911 Lee et al. Nov 2008 A1
20090037361 Prathaban et al. Feb 2009 A1
20090047952 Giaretta et al. Feb 2009 A1
20090049198 Blinn et al. Feb 2009 A1
20090070470 Bauman et al. Mar 2009 A1
20090077651 Poeluev Mar 2009 A1
20090092124 Singhal et al. Apr 2009 A1
20090106830 Maher Apr 2009 A1
20090138606 Moran et al. May 2009 A1
20090138945 Savchuk May 2009 A1
20090141634 Rothstein et al. Jun 2009 A1
20090164614 Christian et al. Jun 2009 A1
20090172093 Matsubara Jul 2009 A1
20090213763 Dunsmore et al. Aug 2009 A1
20090213858 Dolganow et al. Aug 2009 A1
20090222583 Josefsberg et al. Sep 2009 A1
20090227228 Hu et al. Sep 2009 A1
20090228547 Miyaoka et al. Sep 2009 A1
20090262741 Jungck et al. Oct 2009 A1
20090271472 Scheifler et al. Oct 2009 A1
20090292924 Johnson et al. Nov 2009 A1
20090313379 Rydnell et al. Dec 2009 A1
20100008229 Bi et al. Jan 2010 A1
20100023621 Ezolt et al. Jan 2010 A1
20100036952 Hazlewood et al. Feb 2010 A1
20100054139 Chun et al. Mar 2010 A1
20100061319 Aso et al. Mar 2010 A1
20100064008 Yan et al. Mar 2010 A1
20100082787 Kommula et al. Apr 2010 A1
20100083076 Ushiyama Apr 2010 A1
20100094985 Abu-Samaha et al. Apr 2010 A1
20100098417 Tse-Au Apr 2010 A1
20100106833 Banerjee et al. Apr 2010 A1
20100106854 Kim et al. Apr 2010 A1
20100128606 Patel et al. May 2010 A1
20100153544 Krassner et al. Jun 2010 A1
20100159955 Aerrabotu Jun 2010 A1
20100162378 Jayawardena et al. Jun 2010 A1
20100188975 Raleigh Jul 2010 A1
20100210265 Borzsei et al. Aug 2010 A1
20100217793 Preiss Aug 2010 A1
20100217819 Chen et al. Aug 2010 A1
20100223630 Degenkolb et al. Sep 2010 A1
20100228819 Wei Sep 2010 A1
20100235507 Szeto et al. Sep 2010 A1
20100235522 Chen et al. Sep 2010 A1
20100235880 Chen et al. Sep 2010 A1
20100238828 Russell Sep 2010 A1
20100265824 Chao et al. Oct 2010 A1
20100268814 Cross et al. Oct 2010 A1
20100293296 Hsu et al. Nov 2010 A1
20100312740 Clemm et al. Dec 2010 A1
20100318631 Shukla Dec 2010 A1
20100322252 Suganthi et al. Dec 2010 A1
20100330971 Selitser et al. Dec 2010 A1
20100333101 Pope et al. Dec 2010 A1
20110007652 Bai Jan 2011 A1
20110019550 Bryers et al. Jan 2011 A1
20110023071 Li et al. Jan 2011 A1
20110029599 Pulleyn et al. Feb 2011 A1
20110032941 Quach et al. Feb 2011 A1
20110040826 Chadzelek et al. Feb 2011 A1
20110047294 Singh et al. Feb 2011 A1
20110055913 Wong Mar 2011 A1
20110060831 Ishii et al. Mar 2011 A1
20110093522 Chen et al. Apr 2011 A1
20110099403 Miyata et al. Apr 2011 A1
20110110294 Valluri et al. May 2011 A1
20110145324 Reinart et al. Jun 2011 A1
20110153834 Bharrat Jun 2011 A1
20110178985 San Martin Arribas et al. Jul 2011 A1
20110185073 Jagadeeswaran et al. Jul 2011 A1
20110191773 Pavel et al. Aug 2011 A1
20110196971 Reguraman et al. Aug 2011 A1
20110239289 Wang et al. Sep 2011 A1
20110276695 Maldaner Nov 2011 A1
20110276982 Nakayama et al. Nov 2011 A1
20110289496 Steer Nov 2011 A1
20110292939 Subramaian et al. Dec 2011 A1
20110302256 Sureshehandra et al. Dec 2011 A1
20110307541 Walsh et al. Dec 2011 A1
20120008495 Shen et al. Jan 2012 A1
20120023231 Ueno Jan 2012 A1
20120026897 Guichard et al. Feb 2012 A1
20120030341 Jensen et al. Feb 2012 A1
20120066371 Patel et al. Mar 2012 A1
20120084419 Kannan et al. Apr 2012 A1
20120084460 McGinnity et al. Apr 2012 A1
20120106355 Ludwig May 2012 A1
20120117571 Davis et al. May 2012 A1
20120144014 Natham et al. Jun 2012 A1
20120144015 Jalan et al. Jun 2012 A1
20120151353 Joanny Jun 2012 A1
20120170548 Rajagopalan et al. Jul 2012 A1
20120173759 Agarwal et al. Jul 2012 A1
20120191839 Maynard Jul 2012 A1
20120204236 Chen et al. Aug 2012 A1
20120216266 Wang et al. Aug 2012 A1
20120239792 Banerjee et al. Sep 2012 A1
20120240185 Kapoor et al. Sep 2012 A1
20120290727 Tivig Nov 2012 A1
20120297046 Raja et al. Nov 2012 A1
20130036342 Deo et al. Feb 2013 A1
20130046876 Narayana et al. Feb 2013 A1
20130058335 Koponen et al. Mar 2013 A1
20130074177 Varadhan et al. Mar 2013 A1
20130083725 Mallya et al. Apr 2013 A1
20130100958 Jalan et al. Apr 2013 A1
20130124713 Feinberg et al. May 2013 A1
20130136139 Zheng et al. May 2013 A1
20130148500 Sonoda et al. Jun 2013 A1
20130166731 Yamanaka et al. Jun 2013 A1
20130166762 Jalan et al. Jun 2013 A1
20130173795 McPherson Jul 2013 A1
20130176854 Chisu et al. Jul 2013 A1
20130191486 Someya et al. Jul 2013 A1
20130198385 Han et al. Aug 2013 A1
20130250765 Ehsan et al. Sep 2013 A1
20130258846 Damola Oct 2013 A1
20130282791 Kruglick Oct 2013 A1
20140012972 Han Jan 2014 A1
20140059702 Wang et al. Feb 2014 A1
20140089500 Sankar et al. Mar 2014 A1
20140143149 Aissi May 2014 A1
20140164617 Jalan et al. Jun 2014 A1
20140169168 Jalan et al. Jun 2014 A1
20140207845 Han et al. Jul 2014 A1
20140229268 Clapp et al. Aug 2014 A1
20140258465 Li Sep 2014 A1
20140258536 Chiong Sep 2014 A1
20140269728 Jalan et al. Sep 2014 A1
20140286313 Fu et al. Sep 2014 A1
20140298091 Carlen et al. Oct 2014 A1
20140330982 Jalan et al. Nov 2014 A1
20140334485 Jain et al. Nov 2014 A1
20140347479 Givon Nov 2014 A1
20140359052 Joachimpillai et al. Dec 2014 A1
20140380424 Thompson Dec 2014 A1
20150012746 Kulkarni et al. Jan 2015 A1
20150039671 Jalan et al. Feb 2015 A1
20150085650 Cui et al. Mar 2015 A1
20150156223 Xu et al. Jun 2015 A1
20150215436 Kancherla Jul 2015 A1
20150237173 Virkki et al. Aug 2015 A1
20150281087 Jalan et al. Oct 2015 A1
20150281104 Golshan et al. Oct 2015 A1
20150296058 Jalan et al. Oct 2015 A1
20150312237 Wang et al. Oct 2015 A1
20150312268 Ray Oct 2015 A1
20150333988 Jalan et al. Nov 2015 A1
20150350048 Sampat et al. Dec 2015 A1
20150350379 Jalan et al. Dec 2015 A1
20150365410 Thompson Dec 2015 A1
20150381465 Narayanan et al. Dec 2015 A1
20160014052 Han Jan 2016 A1
20160014126 Jalan et al. Jan 2016 A1
20160036778 Chen et al. Feb 2016 A1
20160042014 Jalan et al. Feb 2016 A1
20160043901 Sankar et al. Feb 2016 A1
20160044095 Sankar et al. Feb 2016 A1
20160050233 Chen et al. Feb 2016 A1
20160088074 Kannan et al. Mar 2016 A1
20160105395 Chen et al. Apr 2016 A1
20160105446 Chen et al. Apr 2016 A1
20160139910 Ramanathan et al. May 2016 A1
20160156708 Jalan et al. Jun 2016 A1
20160173579 Jalan et al. Jun 2016 A1
20160182456 Wang et al. Jun 2016 A1
20160261642 Chen et al. Sep 2016 A1
Foreign Referenced Citations (108)
Number Date Country
1372662 Oct 2002 CN
1449618 Oct 2003 CN
1529460 Sep 2004 CN
1575582 Feb 2005 CN
1714545 Dec 2005 CN
1725702 Jan 2006 CN
101004740 Jul 2007 CN
101094225 Dec 2007 CN
101163336 Apr 2008 CN
101169785 Apr 2008 CN
101189598 May 2008 CN
101247349 Aug 2008 CN
101261644 Sep 2008 CN
101361037 Feb 2009 CN
101375253 Feb 2009 CN
102098316 Jun 2011 CN
101361037 Jul 2011 CN
102123156 Jul 2011 CN
101375253 Sep 2011 CN
102546590 Jul 2012 CN
102571742 Jul 2012 CN
102577252 Jul 2012 CN
102918801 Feb 2013 CN
103533018 Jan 2014 CN
103944954 Jul 2014 CN
104040990 Sep 2014 CN
104067569 Sep 2014 CN
104106241 Oct 2014 CN
102123156 Nov 2014 CN
104137491 Nov 2014 CN
104796396 Jul 2015 CN
102098316 Sep 2015 CN
102577252 Mar 2016 CN
102918801 May 2016 CN
1209876 May 2002 EP
1770915 Apr 2007 EP
1885096 Feb 2008 EP
02296313 Mar 2011 EP
2577910 Apr 2013 EP
2622795 Aug 2013 EP
2647174 Oct 2013 EP
2760170 Jul 2014 EP
2772026 Sep 2014 EP
2901308 Aug 2015 EP
2760170 Dec 2015 EP
1182560 Nov 2013 HK
1183569 Dec 2013 HK
1183996 Jan 2014 HK
1189438 Jun 2014 HK
1198565 May 2015 HK
1198848 Jun 2015 HK
1199153 Jun 2015 HK
1199779 Jul 2015 HK
1200617 Aug 2015 HK
3764CHENP2014 Sep 2015 IN
H09097233 Apr 1997 JP
1999096128 Apr 1999 JP
H11338836 Dec 1999 JP
2000276432 Oct 2000 JP
2000307634 Nov 2000 JP
2001051859 Feb 2001 JP
2001298449 Oct 2001 JP
2002091936 Mar 2002 JP
2003141068 May 2003 JP
2003186776 Jul 2003 JP
2005141441 Jun 2005 JP
2006332825 Dec 2006 JP
2008040718 Feb 2008 JP
2013528330 Jul 2013 JP
2014143686 Aug 2014 JP
2015507380 Mar 2015 JP
5855663 Dec 2015 JP
5946189 Jun 2016 JP
100830413 May 2008 KR
1020130096624 Aug 2013 KR
101576585 Dec 2015 KR
101632187 Jun 2016 KR
I175810 Apr 2003 TW
I249314 Feb 2006 TW
WO0113228 Feb 2001 WO
WO0114990 Mar 2001 WO
WO0145349 Jun 2001 WO
WO0221788 Mar 2002 WO
WO03103237 Dec 2003 WO
WO2004084085 Sep 2004 WO
WO2006098033 Sep 2006 WO
WO2008053954 May 2008 WO
WO2008067013 Jun 2008 WO
WO2008070248 Jun 2008 WO
WO2008078593 Jul 2008 WO
WO2011049770 Apr 2011 WO
WO2011079381 Jul 2011 WO
WO2011149796 Dec 2011 WO
WO2012050747 Apr 2012 WO
WO2012075237 Jun 2012 WO
WO2013070391 May 2013 WO
WO2013081952 Jun 2013 WO
WO2013096019 Jun 2013 WO
WO2013112492 Aug 2013 WO
WO2014031046 Feb 2014 WO
WO2014052099 Apr 2014 WO
WO2014088741 Jun 2014 WO
WO2014093829 Jun 2014 WO
WO2014138483 Sep 2014 WO
WO2014144837 Sep 2014 WO
WO2014179753 Nov 2014 WO
WO2014209660 Dec 2014 WO
WO2015153020 Oct 2015 WO
Non-Patent Literature Citations (24)
Entry
Cardellini et al., “Dynamic Load Balancing on Web-server Systems”, IEEE Internet Computing, vol. 3, No. 3, pp. 28-39, May-Jun. 1999.
Spatscheck et al., “Optimizing TCP Forwarder Performance”, IEEE/ACM Transactions on Networking, vol. 8, No. 2, Apr. 2000.
Kjaer et al. “Resource allocation and disturbance rejection in web servers using SLAs and virtualized servers”, IEEE Transactions on Network and Service Management, IEEE, US, vol. 6, No. 4, Dec. 1, 2009.
Sharifian et al. “An approximation-based load-balancing algorithm with admission control for cluster web servers with lynamic workloads”, The Journal of Supercomputing, Kluwer Academic Publishers, BO, vol. 53, No. 3, Jul. 3, 2009.
Goldszmidt et al. NetDispatcher: A TCP Connection Router, IBM Research Report RC 20853, May 19, 1997.
Koike et al., “Transport Middleware for Network-Based Control,” IEICE Technical Report, Jun. 22, 2000, vol. 100, No. 53, pp. 13-18.
Yamamoto et al., “Performance Evaluation of Window Size in Proxy-based TCP for Multi-hop Wireless Networks,” IPSJ SIG Technical Reports, May 15, 2008, vol. 2008, No. 44, pp. 109-114.
Abe et al., “Adaptive Split Connection Schemes in Advanced Relay Nodes,” IEICE Technical Report, Feb. 22, 2010, vol. 109, No. 438, pp. 25-30.
“How to Create a Rule in Outlook 2003” CreateaRule-Outlook2003.doc 031405 mad.
Eychenne, Herve, “WFLOGS,” Dec. 15, 2002, URL: <http://web.archive.org/web/20021205151706/http://www.wallfire.org/wflogs/wflogs.8.html>.
Microsoft Corporation, “To Filter events in an event log,” Jul. 2, 2004, URL: <http://web.archive.org/web/20040702070538/http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/nt—filteringevents—how—ev.mspx>.
The Cable Guy, “Configuring the Routing and Remote Access Service in Windows 2000,” Microsoft TechNet, Jul. 22, 2004, URL: <http://web.archive.org/web/20040722111534/http://www.microsoft.com/technet/community/columns/cableguy/cg0601.mspx>.
Monrose et al., “Cryptographic Key Generation from Voice,” Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 202-213, May 2001.
Shamir, “How to share a secret,” Communications of the ACM, vol. 22, No. 11, pp. 612-613, Nov. 1979.
Jermyn et al., “The Design and Analysis of Graphical Passwords,” 8th USENIX Security Symposium ; Aug. 1999; 15 pp.
Soutar et al., “Biometric Encryption™,” Bioscrypt Inc., 1999, pp. 1-28.
Duda et al., “Pattern Classification,” Second Edition; 2001; pp. 117-121.
Zhang et al.; “Personal Authentication Based on Generalized Symmetric Max Minimal Distance in Subspace;” 2003; IEEE; pp. 245-248.
Okada et al.; “An Optimal Orthonormal System for Discriminant Analysis”; 1985; Pattern Recognition, vol. 18, No. 2; pp. 139-144.
Chang et al.; “Biometrics-Based Cryptographic Key Generation;” In Multimedia and Expo, Jun. 2004. ICME'04. 2004 IEEE International Conference on (vol. 3, pp. 2203-2206). IEEE.
Zhang et al.; “Optimal Thresholding for Key Generation Based on Biometrics;” In Image Processing, Oct. 2004. ICIP'04. 2004 International Conference on (vol. 5, pp. 3451-3454). IEEE.
Marandon, Alex, “How to Build a Web Widget (Using jQuery),” Jun. 2010, URL: <https://web.archive.org/web/20100623004301/http://alexmarandon.com/articles/web—widget—jquery/>.
Gite, Vivek, “Linux Tune Network Stack (Buffers Size) to Increase Networking Performance,” accessed Apr. 13, 2016 at URL: <<http://www.cyberciti.biz/faq/linux-tcp-tuning/>>, Jul. 8, 2009, 24 pages.
“tcp—TCP Protocol”, Linux Programmer's Manual, accessed Apr. 13, 2016 at URL: <<https://www.freebsd.org/cgi/man.cgi?query=tcp&apropos=0&sektion=7&manpath=SuSE+Linux%2Fi386+11.0&format=asci>>, Nov. 25, 2007, 11 pages.
Related Publications (1)
Number Date Country
20160119382 A1 Apr 2016 US
Continuations (5)
Number Date Country
Parent 14323884 Jul 2014 US
Child 14987076 US
Parent 14061720 Oct 2013 US
Child 14323884 US
Parent 13650179 Oct 2012 US
Child 14061720 US
Parent 12788339 May 2010 US
Child 13650179 US
Parent 11582613 Oct 2006 US
Child 12771491 US
Continuation in Parts (1)
Number Date Country
Parent 12771491 Apr 2010 US
Child 12788339 US