Method of enforcing a policy on a computer network

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000

Reexamination Certificate

active

07636935

ABSTRACT:
A policy server program evaluates one or more policy statements based on the group or groups to which a user belongs as well as other conditions. Each policy statement expresses an implementation of the access policy of the network, and is associated with a profile. The profile contains one or more actions that are to be applied to the user. The policy server program determines the identity of the group or groups to which the user belongs by referencing one or more group attributes contained in a user object which is located in a directory on the network. The user object and its group parameters are established when the user is added to the directory, while a policy statement for a group can be created at any time.

REFERENCES:
patent: 5572711 (1996-11-01), Hirsch et al.
patent: 6041347 (2000-03-01), Harsham et al.
patent: 6163536 (2000-12-01), Dunn et al.
patent: 6339830 (2002-01-01), See et al.
patent: 6470453 (2002-10-01), Vilhuber
Bernard Aboba, “Lightweight Directory Access Protocol (v3): Schema for the Remote Access Dialin User Service (Radius)”, Feb. 5, 1998, 23 pp.
Bernard Aboba, “Lightweight Directory Access Protocol (v3): Schema for the Remote Access Dialin User Service (Radius)”, Nov. 19, 1997, 22 pp.
C. Rigney, et al., “Remote Authentication Dial in User Service (Radius)”, Apr. 1997, pp. 1-65.
Deborah Estrin et al., “Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description”, Dec. 1988, 41 pp, WRL Research Report 88/5, Western Research Laboratory, Palo Alto, California.
David L. Wasley, “Authenticating Aperiodic Connections to the Campus Network”, Jun. 1996, 9 pages, Regents of the University of California.
Howard Weiss, “Verdix Security System”, Sep. 9, 1999, 5 pages.
Jeff Hayes, “802.1 Minutes”, (Jun. 2, 1999), Jun. 7, 1999, 5 pages.
Andrew Smith, “Draft Minutes of IEEE 802.1 Montreal meeting”, Jul. 19, 1999, 8pages.
Mick Seaman, “Advance notice of proposed 802.1 PAR: Port based network access control”, Jun. 8, 1999, 5 pages.
Norm Finn, “VLAN Trunk Protocol”, Mar. 9, 1999, 11 pages.
“Cisco IOS Lock and Key Security”, 1996, 6 pages, Cisco Systems, Inc.
CableLabs, press release; “Cable Industry Agrees On Key Elements of Digital Systems Specifications;”,Oct. 3, 1996, 3 pages.
Daniel Farmer, et al., “The Cops Security Checker System”, Purdue University Technical Report CDS-TR-993, Jan. 22, 1994 (originally appearing in the proceedings of the Summer Usenix Conference, 1990, Anaheim CA:, 14 pages.
Frederick M. Avolio, “A Network Perimeter With Secure External Access”, Jan. 25, 1994, 11 pages, Trusted Information Systems, Incorporated, Clenwood, MD.
Bernard Aboba, “Lightweight Directory Access Protocol (v3): Dynamic Attributes for the Remote Access Dialin User Service (Radius)”, accessed at http:/
utibara.udea.edu.co/pub/draft-abaoba-dynradius-01.txt on Jan. 21, 2000, Nov. 19, 1997.
“Virtual Motion: Advanced Communication Technologies”, World Wide Web pages available at www.virtualmotion.com, accessed on Feb. 4, 1999.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of enforcing a policy on a computer network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of enforcing a policy on a computer network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of enforcing a policy on a computer network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4089145

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.