Method of enforcing a policy on a computer network

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S152000, C713S150000, C713S153000

Reexamination Certificate

active

06941465

ABSTRACT:
A policy server program evaluates one or more policy statements based on the group or groups to which a user belongs as well as other conditions. Each policy statement expresses an implementation of the access policy of the network, and is associated with a profile. The profile contains one or more actions that are to be applied to the user. The policy server program determines the identity of the group or groups to which the user belongs by referencing one or more group attributes contained in a user object which is located in a directory on the network. The user object and its group parameters are established when the user is added to the directory, while a policy statement for a group can be created at any time.

REFERENCES:
patent: 6041347 (2000-03-01), Harsham et al.
patent: 6070244 (2000-05-01), Orchier et al.
patent: 6163536 (2000-12-01), Dunn et al.
patent: 6182142 (2001-01-01), Win et al.
patent: 6192361 (2001-02-01), Huang
patent: 6339830 (2002-01-01), See et al.
patent: 6470453 (2002-10-01), Vilhuber
patent: 6493749 (2002-12-01), Paxhia et al.
Aboba, Bernard. “Lightweight Directory Access Protocol (v3): Dynamic Attributes for the Remote Access Dialin User Service (RADIUS)” (Nov. 19, 1997). Accessed at http:/
utibara.udea.edu.co/pub/draft-abaoba-dynradius-01.txt on Jan. 21, 2000.
“Virtual Motion: Advanced Communication Technologies.” World Wide Web pages available at www.virtualmotion.com. Accessed on Feb. 4, 1999.
C. Rigney et al.; Remote Authentication Dial in User Service (RADIUS); Apr. 1997; pp. 1-65.
Deborah Estrin et al.; Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description; Dec. 1988; 41 pp.; WRL Research Report 88/5; Western Research Laboratory, Palo Alto, California.
David L. Wasley; Authenticating Aperiodic Connections to the Campus Network; Jun. 1996; 9 pp; Regents of the University of California.
Howard Weiss; Verdix security system; Sep. 4, 1999; 5 pp.
Jeff Hayes; 802.1 Minutes (Jun. 2, 1999); Jun. 7, 1999; 5 pp.
Andrew Smith; DRAFT Minutes of IEEE 802.1 Montreal meeting; Jul. 19, 1999; 8 pp.
Mick Seaman; Advance notice of proposed 802.1 PAR : Port based network access control; Jun. 8, 1999; 5 pp.
Norm Finn, VLAN Truck Protocol; Mar. 9, 1999; 11 pp.
Cisco IOS Lock and Key Security; 1996; 6 pp.; Cisco Systems, Inc.
CableLabs, press release; Cable Industry agrees on key elements of digital systems specifications; Oct. 3, 1996; 3 pp:.
Daniel Farmer et al.; The Cops Security Checker System, Purdue University Technical Reports CDS-TR-993; Jan. 22, 1994 (orginally appearing in the proceedings of the Summer Usenix Conference, 1990, Anaheim CA); 14 pp.
Frederick M. Avolio; A Network Perimeter With Secure External Access; Jan. 25, 1994: 11 pp.; Trusted Information Systems, Incorporated, Glenwood, MD.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of enforcing a policy on a computer network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of enforcing a policy on a computer network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of enforcing a policy on a computer network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3426398

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.