System and method of monitoring and controlling application files
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/30
H04L-012/26
G06F-011/34
G06F-021/50
G06F-021/55
G06F-021/57
H04L-029/06
출원번호
US-0172803
(2014-02-04)
등록번호
US-9253060
(2016-02-02)
발명자
/ 주소
Kester, Harold M.
Dimm, John Ross
Anderson, Mark Richard
Papa, Joseph
출원인 / 주소
Websense, Inc.
대리인 / 주소
Knobbe Martens Olson & Bear LLP
인용정보
피인용 횟수 :
2인용 특허 :
106
초록▼
A system and method for updating, monitoring, and controlling applications on a workstation. The workstation includes a workstation management module configured to detect the launch or request to access a network by an application. A workstation application server receives data associated with the a
A system and method for updating, monitoring, and controlling applications on a workstation. The workstation includes a workstation management module configured to detect the launch or request to access a network by an application. A workstation application server receives data associated with the application from the workstation. The application server module can determine one or more policies or categories to associate with the application by referencing an application inventory database. Once the application server module has the category or policy, it forwards a hash/policy table to the workstation management module. Upon receipt of the hash/policy table, the workstation management module applies the policy that is associated with the application to control network access by the application.
대표청구항▼
1. A system, including one or more processors, for collecting network access data for use in updating a monitoring system which controls programs accessing a network, comprising: a workstation management module configured to detect a program on a workstation accessing a network, determine whether th
1. A system, including one or more processors, for collecting network access data for use in updating a monitoring system which controls programs accessing a network, comprising: a workstation management module configured to detect a program on a workstation accessing a network, determine whether the program is in a network access database, send program data associated with the program to an application server module if the program is not in the network access database, and apply one or more policies that are associated with the program, wherein the network access database includes a protocol that is associated with the program; andthe application server module being configured to receive the program data from the workstation management module if the program was not in the network access database, determine whether the program is operating in a predetermined manner based at least in part on analyzing past network activity involving the same or relevant programs and text strings associated with the program, if the program is not operating in the predetermined manner, then send the program data to an application database factory, if the program is operating in the predetermined manner, then provide the one or more policies associated with the program to the workstation management module. 2. The system of claim 1, wherein the application database factory is configured to receive the program data from the application server module if the program is not operating in the predetermined manner, determine whether the program was previously analyzed by the application database factory, if the program was not previously analyzed, then determine one or more policies to associate with the program and provide the one or more policies to the application server module, if the program was previously analyzed, then provide the one or more policies that were previously associated with the program data to the application server module. 3. The system of claim 1, wherein the protocol is a transport protocol. 4. The system of claim 3, wherein the transport protocol is transmission control protocol (TCP). 5. The system of claim 3, wherein the transport protocol is user database protocol (UDP). 6. The system of claim 1, wherein the network access database comprises hash values. 7. The system of claim 1, wherein the network access database comprises one or more categories and one or more policies associated with the program. 8. The system of claim 1, wherein the workstation management module comprises an application digest generator configured to determine the program data to associate with the program. 9. The system of claim 1, wherein the program data includes a source IP address. 10. The system of claim 1, wherein the program data includes a destination IP address. 11. The system of claim 1, wherein the one or more policies include allowing the program to access the network based on the one or more policies associated with the user. 12. The system of claim 1, wherein the one or more policies include not allowing the program to access the network based on the one or more policies associated with the user. 13. The system of claim 1 further comprising a classification user interface configured to provide an interface for a network administrator to select the one or more policies that are associated with the program. 14. The system of claim 1 further comprising an upload/download manager module configured to send the program data to the application database factory and to receive the one or more policies from the application database factory. 15. A system, including one or more processors, for collecting network access data for use in updating a monitoring system which controls a program on a computer from accessing a network based at least in part on information collected from another computer over the network, the system comprising: a first workstation management module configured to detect a program on a first workstation accessing a network, determine whether the program is in a first network access database, send program data associated with the program to an application server module if the program is not in the first network access database, and apply one or more policies that are associated with the program;the application server module being configured to receive the program data from the first workstation management module if the program was not in the first network access database, determine whether the program is operating in a predetermined manner based at least in part on analyzing past network activity involving the same or relevant programs and text strings associated with the program, if the program is not operating in the predetermined manner, then send the program data to an application database factory, if the program is operating in the predetermined manner, then provide the one or more policies associated with the program to at least a second workstation; anda second workstation management module being configured to receive the one or more policies from the application server module and update a second network access database resident on the second workstation. 16. The system of claim 15, wherein the application server module is further configured to associate one or more indicators with the program. 17. The system of claim 16, wherein the one or more indicators includes a category flag. 18. The system of claim 16, wherein the application server module uses the one or more indicators to screen the program prior to sending the program data to the application database factory. 19. A system, including one or more processors, for collecting network access data for use in updating a monitoring system which controls programs accessing a network, comprising: a workstation management module configured to detect a program on a workstation accessing a network, determine whether the program is in a network access database, send program data associated with the program to an application server module if the program is not in the network access database, and apply one or more policies that are associated with the program, wherein the network access database includes a protocol that is associated with the program;the application server module being configured to receive the program data from the workstation management module if the program was not in the network access database, analyze past network activity involving the same or relevant programs and text strings associated with the program to determine whether the program is operating in a predetermined manner and to associate one or more indicators with the program, if the program is not operating in the predetermined manner, then send the program data to an application database factory, if the program is operating in the predetermined manner, then provide the one or more policies associated with the program to the workstation management module. 20. The system of claim 19, wherein the one or more indicators includes a category flag.
Brandt Marcia Lynn ; Brown Kenneth Edgar ; Dykes Pernell James ; Lindberg Erik Duane ; Olson Diane Elaine ; Selden Jeffrey Edward ; Snyder Devon Daniel ; Walts James Orrin, Computer apparatus and method for providing a common user interface for software applications accessed via the world-wid.
Alcorn Allan E. (Portola Valley CA) Barnett Michael (Santa Clara CA) Giacalone ; Jr. Louis D. (Palo Alto CA) Levinthal Adam E. (Redwood City CA), Electronic casino gaming apparatus with improved play capacity, authentication and security.
Shieh Johnny Meng-Han ; Maddalozzo ; Jr. John ; McBrearty Gerald Francis, Filtered utilization of internet data transfers to reduce delay and increase user control.
Rousseau Francis John,GBX ; Godfrey David,GBX ; Bonell John Louis,GBX, Ignition exciter for a gas turbine engine and method of igniting a gas turbine engine.
Benantar Messaoud ; Blakley ; III George Robert ; Nadalin Anthony Joseph, Information handling system, method, and article of manufacture for efficient object security processing by grouping obj.
Radia Sanjay R. ; Lim Swee Boon ; Tsirigotis Panagiotis ; Wong Thomas K. ; Goedman Robert J. ; Patrick Michael W., Method and apparatus for dynamic packet filter assignment.
Poliquin Lynn R. (Goffstown NH) Arrowsmith Russell (Merrimack NH) Lewis Lundy (Mason NH) Tracy William (Chelmsford MA), Method and apparatus for policy-based alarm notification in a distributed network management environment.
Baugher Mark J. (Austin TX) Chang Philip Y. (Austin TX) Morris Gregory L. (Round Rock TX) Stephens Alan P. (Austin TX), Method and apparatus for reserving system resources to assure quality of service.
Hao Ming C. (Los Altos Hills CA) Obermarck Ronald L. (Redwood City CA) Trivett Gene E. (Portola Valley CA) Trivett Lynn (Portola Valley CA), Method for controlling the peer-to-peer processing of a distributed application across a synchronous request/response in.
Adams James S. ; Moore Donald W. ; Huntington James C. ; Holland Richard C., Method for controlling the presentation of displays in a multi-window computer environment.
Theimer Marvin M. (Mountain View CA) Spreitzer Michael J. (Tracy CA) Weiser Mark D. (Palo Alto CA) Goldstein Richard J. (San Francisco CA) Elrod Scott A. (Redwood City CA) Swinehart Daniel C. (Palo A, Method for granting a user request having locational and contextual attributes consistent with user policies for devices.
Cox David E. ; Hayes ; Jr. Kent F. ; Kaminsky David L. ; Lindquist David B., Methods, systems and computer program products for management of configurable application programs on a network.
Theimer Marvin M. (Mountain View CA) Spreitzer Michael J. (Tracy CA) Weiser Mark D. (Palo Alto CA) Goldstein Richard J. (San Francisco CA) Terry Douglas B. (San Carlos CA) Schilit William N. (Palo Al, Selective delivery of electronic messages in a multiple computer system based on context and environment of a user.
Donald George Paul Waters GB; Jeremy Pavier GB; Graham David Turner GB; Richard Dewitt Cox ; Andrew Timothy Hunter ; Jeffrey Kevin Rand ; Nicolas Duncan Barker Smith GB, Service creation apparatus for a communications network.
Finney Michael S. ; Snider Michael L. ; Wright Randall S. ; Paynter James W. ; Bard Robin R., System and method for distributing electronic messages in accordance with rules.
Gryaznov,Dmitry O.; Peternev,Viatcheslav; Muttik,Igor, System and method for identifying a macro virus family using a macro virus definitions database.
Chess, David Michael; Kephart, Jeffrey Owen; Morar, John Frederick; Pring, Edward John; White, Steve Richard, System and method for managing files in a distributed system using filtering.
Chess, David Michael; Kephart, Jeffrey Owen; Morar, John Frederick; Pring, Edward John; White, Steve Richard, System and method for managing files in a distributed system using prioritization.
Bryant David M. (Cardiff CA) Corbeil Ryn C. (Bridgewater NJ) Malcolm Michael A. (Waterloo CA CAX) Thompson Donald R. (San Diego CA), System and method for name-lookup in a local area network data communication system.
Holden James M. ; Levin Stephen E. ; Nickel James O. ; Wrench Edwin H., System and method for providing multi-level security in computer devices utilized with non-secure networks.
Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for restricting user access rights on the internet based on rating information stored in a relational.
Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
Akiyoshi Takashi (Osaka JPX) Matsuse Tetsuo (Ikoma-gun JPX), System for automatically generating and saving control information in a server if requested by a client at system initia.
Schmidt Jonathan ; Donzis Lewis ; Donzis Henry ; Murphy John ; Baron Peter ; Savage Herb, System for controlling users access to a distributive network in accordance with constraints present in common access.
Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., System for on-line service in which gateway computer uses service map which includes loading condition of servers broad.
Kapoor, Harsh; Akerman, Moisey; Justus, Stephen D.; Ferguson, JC; Korsunsky, Yevgeny; Gallo, Paul S.; Lee, Charles Ching; Martin, Timothy M.; Fu, Chunsheng; Xu, Weidong, Systems and methods for processing data flows.
Horvitz, Eric J.; Kadie, Carl M.; Ozer, Stuart; Wong, Curtis G., Training, inference and user interface for guiding the caching of media content on local stores.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.