Claims
- 1. A method for managing communication traffic in a network, comprising:
intercepting a message intended for an external server configured to redirect the message to an intended destination; determining if the destination is within the network; and when it is determined that the destination is within the network, redirecting the message to the destination bypassing the external server.
- 2. The method of claim 1, wherein the received message comprises a screen name, and wherein the method further comprises determining a unique user name for the source, associating the screen name with the unique user name, and storing the association between the screen name and the unique user name.
- 3. The method of claim 2, further comprising selecting a policy rule for handling the received message based on the unique user name and applying the policy rule to the message.
- 4. The method of claim 3, wherein the policy rule is based on the source of the received message.
- 5. The method of claim 3, wherein the policy rule is based on the intended destination of the received message.
- 6. The method of claim 3, wherein the policy rule is based on information included in the received message.
- 7. The method of claim 3, wherein the policy rule is based on when the received message is sent or intended to be received.
- 8. The method of claim 3, wherein the policy rule is based on the size of the received message.
- 9. The method of claim 3, wherein the policy rule is based on whether the received message includes an attachment.
- 10. The method of claim 3, wherein the policy rule is based on whether the received message includes a virus.
- 11. The method of claim 3, further comprising determining if a session associated with the received message is still in progress before applying the policy rule.
- 12. The method of claim 1, further comprising recording information associated with the received message.
- 13. The method of claim 1, further comprising creating a log comprising information associate with the received message and any related messages.
- 14. The method of claim 2, wherein the received massage is associated with a network address, and wherein determining a unique user name comprises identifying the source using the network address.
- 15. The method of claim 14, wherein determining a unique user name further comprises determining a global user identification associated with the source.
- 16. The method of claim 15, determining a global user identification comprises interrogating a registry associated with the source.
- 17. The method of claim 2, further comprising determining if the screen name has previously been associated with a unique user name, and if so, then applying a policy rule to the message based on the unique user name
- 18. The method of claim 1, wherein determining if the destination is within the network comprises:
determining a screen name associated with the destination from the message; and determining if the destination screen name is associated with a unique user name used by the network.
- 19. The method of claim 18, wherein determining if the destination is within the network further comprises attempting to associate the destination screen name with a unique user name used by the network, when it is determined that the destination screen name is not already associated with a unique user name.
- 20. The method of claim 19, wherein attempting to associate the destination screen name with a unique user name, comprises:
determining a unique user name for the destination; associating the destination screen name with the unique destination user name; and storing the association between the destination screen name and the unique destination user name.
- 21. The method of claim 20, further comprising selecting a policy rule for handling the received message based on the unique destination user name and applying the policy rule to the message.
RELATED APPLICATIONS INFORMATION
[0001] This application claims priority under 35 USC §119 to U.S. Provisional Application Ser. No. 60/387,761, entitled “PROXY ENFORCER FOR ROGUE PROTOCOL MESSAGES,” filed on Jun. 10, 2002 and to U.S. U.S. Provisional Application Ser. No. 60/445,648, entitled “DETECTION AND REPORTING OF USER PRESENCE,” filed on Feb. 7, 2003, which are both incorporated herein by reference as though set forth in full. This application also claims priority as a continuation-in-part under 35 U.S.C §120 to U.S. patent application Ser. No. 10/167,228, entitled “EXTENDIBLE GATEWAY FOR PROTECTION AGAINST ROGUE PROTOCOLS,” filed on Jun. 10, 2002, which is incorporated herein by reference as though set in full.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60387761 |
Jun 2002 |
US |
|
60445648 |
Feb 2003 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10167228 |
Jun 2002 |
US |
Child |
10459725 |
Jun 2003 |
US |