Abstract:
The present invention provides a system, method and computer program for implementing a firewall control system responsive to process interrogations are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a process rule exists for the associated program, where the process rule includes a condition to be satisfied for a process of the user computer system. Preferred embodiments may also include, in response to determining that a process rule does exist, determining a method for evaluating a status of the process and determining a current status of the process. Preferred embodiments may also include determining whether the process rule is satisfied based on the current status of the process and using the determined evaluation method. Preferred embodiments may also include, in response to determining whether the condition of the process rule is satisfied, performing one or more firewall actions.
Abstract:
A firewall control method includes receiving a data request at a firewall where the data request is associated with a program and determining whether a remote system condition exists for the associated program, where the remote system condition includes a condition to be satisfied based on information received from a particular remote system. Embodiments may also include, in response to determining that a remote system condition exists, determining whether the remote system condition is satisfied based on information received from the particular remote system. Embodiments may also include, in response to determining whether the remote system condition is satisfied, performing one or more firewall actions.
Abstract:
Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other serversare disclosed. Embodiments of amethod for authenticating a user to a servermay include rec eiving a request to authenticate the user to the server and determining whet her authenticating the user requires matching an authentication plan.If a pl an is required, the method may also include accessing a stored authenticatio n plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user s current authentication plan from an authenticat ion store where the plan has authorization records each having current infor mation relating to user access. Embodiments ofthe method may also include co mparing the stored authentication plan with the received current authenticat ion plan to determine whether they match and, in response to a match, authen ticating the user.
Abstract:
Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other serversare disclosed. Embodiments of amethod for authenticating a user to a servermay include receiving a request to authenticate the user to the server and determining whether authenticating the user requires matching an authentication plan.If a plan is required, the method may also include accessing a stored authentication plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user s current authentication plan from an authentication store where the plan has authorization records each having current information relating to user access. Embodiments ofthe method may also include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response to a match, authenticating the user.