Claims
- 1. A method for managing communication protocol in a network, comprising:
intercepting messages they flow into and out of the network; inspecting a message protocol associated with an intercepted message to determine if the message protocol matches a message protocol template; and when a match occurs, applying a policy enforcement rule associated with the message protocol template that overrides aspects of the message protocol associated with the intercepted message.
- 2. The method of claim 1, wherein applying the policy enforcement rule comprises forcing the intercepted message to use a defined communication connection when flowing into or out of the network.
- 3. The method of claim 2, wherein the defined communication connection is a defined port on a gateway associated with the network.
- 4. The method of claim 1, wherein applying the policy enforcement rule comprises terminating a communication connection associated with the intercepted message.
- 5. The method of claim 1, wherein applying the policy enforcement rule comprises resetting a communication connection associated with the intercepted message.
- 6. The method of claim 1, wherein applying the policy enforcement rule comprises recording information associated with the intercepted message.
- 7. The method of claim 1, wherein applying the policy enforcement rule comprises creating a log comprising information associate with the intercepted message and any related messages.
- 8. The method of claim 1, wherein the message protocol template is associated with instant messaging messages.
- 9. The method of claim 1, wherein the message protocol template is associated with peer-to-peer messages.
- 10. The method of claim 1, wherein the message protocol template is associated with file sharing messages.
- 11. A protocol enforcer, comprising:
a message protocol template; and a network interface configured to interface the protocol enforcer with a network, the protocol enforcer configured to intercept a message via the network interface, inspect a message protocol associated with the intercepted message to determine if the message protocol matches the message protocol template, and when a match occurs, apply a policy enforcement rule associated with the message protocol template that overrides aspects of the message protocol associated with the intercepted message.
- 12. The protocol enforcer of claim 11, wherein applying the policy enforcement rule comprises forcing the intercepted message to use a defined communication connection when flowing into or out of the network.
- 13. The protocol enforcer of claim 12, wherein the defined communication connection is a defined port on a gateway associated with the network.
- 14. The protocol enforcer of claim 11, wherein applying the policy enforcement rule comprises terminating a communication connection associated with the intercepted message.
- 15. The protocol enforcer of claim 11, wherein applying the policy enforcement rule comprises resetting a communication connection associated with the intercepted message.
- 16. The protocol enforcer of claim 11, wherein applying the policy enforcement rule comprises recording information associated with the intercepted message.
- 17. The protocol enforcer of claim 11, wherein applying the policy enforcement rule comprises creating a log comprising information associate with the intercepted message and any related messages.
- 18. The protocol enforcer of claim 11, wherein the message protocol template is associated with instant messaging messages.
- 19. The protocol enforcer of claim 11, wherein the message protocol template is associated with peer-to-peer messages.
- 20. The protocol enforcer of claim 11, wherein the message protocol template is associated with file sharing messages.
- 21. A protocol management system, comprising:
a client device configured to send and receive messages over a network; and a protocol enforcer, the protocol enforcer comprising:
a message protocol template, and a network interface configured to interface the protocol enforcer with the network, the protocol enforcer configured to intercept a message sent by the client device via the network interface, inspect a message protocol associated with the intercepted message to determine if the message protocol matches the message protocol template, and when a match occurs, apply a policy enforcement rule associated with the message protocol template that overrides aspects of the message protocol associated with the intercepted message.
- 22. The protocol management system of claim 21, wherein applying the policy enforcement rule comprises forcing the intercepted message to use a defined communication connection when flowing into or out of the network.
- 23. The protocol management system of claim 22, wherein the defined communication connection is a defined port on a gateway associated with the network.
- 24. The protocol management system of claim 21, wherein applying the policy enforcement rule comprises terminating a communication connection associated with the intercepted message.
- 25. The protocol management system of claim 21, wherein applying the policy enforcement rule comprises resetting a communication connection associated with the intercepted message.
- 26. The protocol management system of claim 21, wherein applying the policy enforcement rule comprises recording information associated with the intercepted message.
- 27. The protocol management system of claim 21, further comprising a storage medium, and wherein applying the policy enforcement rule comprises creating a log comprising information associate with the intercepted message and any related messages and storing the log in the storage medium.
- 28. The protocol management system of claim 21, wherein the message protocol template is associated with instant messaging messages.
- 29. The protocol management system of claim 21, wherein the message protocol template is associated with peer-to-peer messages.
- 30. The protocol management system of claim 21, wherein the message protocol template is associated with file sharing messages.
RELATED APPLICATIONS INFORMATION
[0001] This application claims priority under 35 USC §119 to U.S. Provisional Application Ser. No. 60/387,761, entitled “PROXY ENFORCER FOR ROGUE PROTOCOL MESSAGES,” filed on Jun. 10, 2002 and to U.S. U.S. Provisional Application Ser. No. 60/445,648, entitled “DETECTION AND REPORTING OF USER PRESENCE,” filed on Feb. 7, 2003, which are both incorporated herein by reference as though set forth in full. This application also claims priority as a continuation-in-part under 35 U.S.C. §120 to U.S. patent application Ser. No. 10/167,228, entitled “EXTENDIBLE GATEWAY FOR PROTECTION AGAINST ROGUE PROTOCOLS,” filed on Jun. 10, 2002, which is incorporated herein by reference as though set in full.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60387761 |
Jun 2002 |
US |
|
60445648 |
Feb 2003 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10167228 |
Jun 2002 |
US |
Child |
10459111 |
Jun 2003 |
US |