Claims
- 1. A method for managing communication protocol in a network comprising:
receiving a message that uses a message protocol: determining whether protocol rule should be applied to the message based on the protocol associated with the message; when it is determined that a protocol adaptation rule should be applied to the message, then applying the appropriate protocol rule.
- 2. The method of claim 1, further comprising, when it is determined that a protocol rule should not be applied to the message, then implementing the protocol associated with the message.
- 3. The method of claim 1, wherein the policy rule is based on the source of the received message.
- 4. The method of claim 1, wherein the policy rule is based on the intended destination of the received message.
- 5. The method of claim 1, wherein the policy rule is based on information included in the received message.
- 6. The method of claim 1, wherein the policy rule is based on when the received message is sent or intended to be received.
- 7. The method of claim 1, wherein the policy rule is based on the size of the received message.
- 8. The method of claim 1, wherein the policy rule is based on whether the received message includes an attachment.
- 9. The method of claim 1, wherein the policy rule is based on whether the received message includes a virus.
- 10. The method of claim 1, further comprising recording information associated with the received message.
- 11. The method of claim 1, further comprising creating a log comprising information associate with the received message and any related messages.
- 12. The method of claim 11, further comprising encrypting the log.
- 13. The method of claim 11, further comprising restricting access to the log.
- 14. The method of claim 11, further comprising generating a report form the information stored in the log.
- 15. The method of claim 1, wherein the received message comprises a specific screen name associated with a source within the network, and wherein the method further comprises:
determining a unique user name for the source; associating the screen name with the unique user name; and storing the association between the screen name and the unique user name.
- 16. The method of claim 15, further comprising determining if a session associated with the received message is still in progress before applying the policy rule.
- 17. The method of claim 15, wherein the received massage is associated with a network address, and wherein determining a unique user name comprises identifying the source using the network address.
- 18. The method of claim 17, wherein determining a unique user name further comprises determining a global user identification associated with the source.
- 19. The method of claim 18, wherein determining a global user identification comprises interrogating a registry associated with the source.
- 20. The method of claim 15, further comprising determining if the screen name has previously been associated with a unique user name, and if so, then applying a policy enforcement rule to the message based on the unique user name.
- 21. The method of claim 1, further comprising:
receiving the message; inspecting the message protocol associated with the message to determine if the message protocol matches a message protocol template; and when a match occurs, applying a policy enforcement rule associated with the message protocol template that overrides aspects of the message protocol associated with the intercepted message.
- 22. The method of claim 21, wherein applying the policy enforcement rule comprises forcing the intercepted message to use a defined communication connection when flowing into or out of the network.
- 23. The method of claim 22, wherein the defined communication connection is a defined port on a gateway associated with the network.
- 24. The method of claim 21, wherein applying the policy enforcement rule comprises terminating a communication connection associated with the intercepted message.
- 25. The method of claim 21, wherein applying the policy enforcement rule comprises resetting a communication connection associated with the intercepted message.
- 26. The method of claim 21, wherein applying the policy enforcement rule comprises recording information associated with the intercepted message.
- 27. The method of claim 21, wherein applying the policy enforcement rule comprises creating a log comprising information associate with the intercepted message and any related messages.
- 28. The method of claim 21, wherein the message protocol template is associated with instant messaging messages.
- 29. The method of claim 21, wherein the message protocol template is associated with peer-to-peer messages.
- 30. The method of claim 21, wherein the message protocol template is associated with file sharing messages.
- 31. A protocol message gateway, comprising:
a network interface configured to interface the protocol message gateway with a network; a policy enforcer configured to apply a policy rule; and a gateway manager coupled the network interface, the gateway manager configured to receive a message comprising a message protocol, determine whether a policy rule should be applied to the message based on the protocol associated with the message, and when it is determined that a policy rule should be applied to the message, then forwarding the message to the policy enforcer.
- 32. The protocol message gateway of claim 31, further comprising a protocol adapter configure to implement message protocols, and wherein the gateway manger is configured to forward the message to the protocol adapter when it is determined that a policy rule should not be applied to the message.
- 33. The protocol message gateway of claim 31, wherein the policy rule is based on the source of the received message.
- 34. The protocol message gateway of claim 31, wherein the policy rule is based on the intended destination of the received message.
- 35. The protocol message gateway of claim 31, wherein the policy rule is based on information included in the received message.
- 36. The protocol message gateway of claim 31, wherein the policy rule is based on when the received message is sent or intended to be received.
- 37. The protocol message gateway of claim 31, wherein the policy rule is based on the size of the received message.
- 38. The protocol message gateway of claim 31, wherein the policy rule is based on whether the received message includes an attachment.
- 39. The protocol message gateway of claim 31, wherein the policy rule is based on whether the received message includes a virus.
- 40. The protocol message gateway of claim 31, further comprising a logging module configured to record information associated with the received message.
- 41. The protocol message gateway of claim 40, wherein the logging module is further configured to create a log comprising information associate with the received message and any related messages.
- 42. The protocol message gateway of claim 41, wherein the logging module is further configured to encrypt the log.
- 43. The protocol message gateway of claim 42, wherein the logging module is further configured to restrict access to the log.
- 44. The protocol message gateway of claim 42, wherein the logging module is further configured to generate a report from the information stored in the log.
- 45. The protocol message gateway of claim 1, further comprising an authentication module, and wherein the received message comprises a specific screen name associated with a source within the network, the authentication module configured to:
determine a unique user name for the source; associate the screen name with the unique user name; and store the association between the screen name and the unique user name.
- 46. The protocol message gateway of claim 45, wherein the received massage is associated with a network address, and wherein determining a unique user name comprises identifying the source using the network address.
- 47. The protocol message gateway of claim 46, wherein determining a unique user name further comprises determining a global user identification associated with the source.
- 48. The protocol message gateway of claim 47, wherein determining a global user identification comprises interrogating a registry associated with the source.
- 49. The protocol message gateway of claim 45, wherein the authentication module is further configured to determine if the screen name has previously been associated with a unique user name.
- 50. The protocol message gateway of claim 31, further comprising a policy enforcer configured to intercept a message being communicated over the network, inspect the message protocol associated with the message to determine if the message protocol matches a message protocol template, and when a match occurs, apply a policy enforcement rule associated with the message protocol template that overrides aspects of the message protocol associated with the intercepted message.
- 51. The protocol message gateway of claim 50, wherein applying the policy enforcement rule comprises forcing the intercepted message to use a defined communication connection when flowing into or out of the network.
- 52. The protocol message gateway of claim 51, wherein the defined communication connection is a defined port on a gateway associated with the network.
- 53. The protocol message gateway of claim 50, wherein applying the policy enforcement rule comprises terminating a communication connection associated with the intercepted message.
- 54. The protocol message gateway of claim 21, wherein applying the policy enforcement rule comprises resetting a communication connection associated with the intercepted message.
RELATED APPLICATIONS INFORMATION
[0001] This application claims priority under 35 USC §119 to U.S. Provisional Application Ser. No. 60/387,761, entitled “PROXY ENFORCER FOR ROGUE PROTOCOL MESSAGES,” filed on Jun. 10, 2002 and to U.S. Provisional Application Ser. No. 60/445,648, entitled “DETECTION AND REPORTING OF USER PRESENCE,” filed on Feb. 7, 2003, which are both incorporated herein by reference as though set forth in full. This application also claims priority as a continuation-in-part under 35 U.S.C. §120 to U.S. patent application Ser. No. 10/167,228, entitled “EXTENDIBLE GATEWAYS FOR PROTECTION AGAINST ROGUE PROTOCOLS,” filed on Jun. 10, 2002, which is incorporated herein by reference as though set in full.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60387761 |
Jun 2002 |
US |
|
60445648 |
Feb 2003 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10167228 |
Jun 2002 |
US |
Child |
10459408 |
Jun 2003 |
US |