System and method to associate a private user identity with a public user identity
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/16
H04L-029/06
H04L-029/08
H04L-029/12
출원번호
US-0720012
(2015-05-22)
등록번호
US-9294467
(2016-03-22)
발명자
/ 주소
Wang, Xin
Chen, Lee
Chiong, John
출원인 / 주소
A10 Networks, Inc.
대리인 / 주소
Carr & Ferrell LLP
인용정보
피인용 횟수 :
5인용 특허 :
47
초록▼
The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. An application session record is created for the appli
The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. An application session record is created for the application session, and includes the user's public user identity used to access the public application, the user's private user identity used to access the network, a host identity, and an application session time, To determine the private user identity for the application session, the security gateway sends a query with the host identity and the application session time. These are compared with the host identity and access session time in an access session record, if they match, then the private user identity in the access session record is returned, and it is stored as the private user identity in the application session record.
대표청구항▼
1. A communications system comprising: at least one network connection communicatively coupled to a secure network; anda processor communicatively coupled to the at least one network connection, the processor executing instructions to perform a method, the method including: conveying an application
1. A communications system comprising: at least one network connection communicatively coupled to a secure network; anda processor communicatively coupled to the at least one network connection, the processor executing instructions to perform a method, the method including: conveying an application session between a first host and an application server, the first host communicating with the application server using an application session, the application server provisioning an application;ascertaining a first host identity associated with the first host, a first user identity associated with the application session, and an application session time associated with the application session;receiving a second host identity associated with a second host, a second user identity associated with an access session, and an access session time associated with the application session, the second host communicating with the secure network using the access session, the access session time including a starting time and an ending time associated with the access session;comparing the application session time and the access session time;matching the first host identity with the second host identity, in response to the application session time being between the starting time and the ending time;associating the first user identity and the second user identity using the matching; andstoring the association. 2. The communications system of claim 1 wherein the application server is outside of the secure network. 3. The communications system of claim 1 wherein the application session is an authenticated access session and the access session is an authenticated access session. 4. The communications system of claim 1 wherein the application includes at least one of File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP), Post Office Protocol (POP), and instant messaging (IM) protocol. 5. The communications system of claim 1 wherein the application session time includes at least one of a starting time associated with the application session and a time stamp associated with the application session. 6. The communications system of claim 1 wherein the second user identity includes at least one of a name of a user, an Internet service subscription identity, and a network login. 7. The communications system of claim 1 wherein the first host identity and the second host identity each include at least one of a respective Internet Protocol (IP) address and a Media Access Control (MAC) address. 8. The communications system of claim 1 wherein the storing further includes storing at least one of the first user identity, the second user identity associated with the first user identity, the first host identity, and the application session time. 9. The communications system of claim 1 wherein the processor further obtains user information associated with the second user identity, the user information including at least one of contact information, location information, and departmental information. 10. The communications system of claim 1 wherein the processor further generates a report including the association. 11. A processor-implemented method comprising: conveying an application session between a first host and an application server, the first host communicating with the application server using an application session, the application server provisioning an application;ascertaining a first host identity associated with the first host, a first user identity associated with the application session, and an application session time associated with the application session;receiving a second host identity associated with a second host, a second user identity associated with an access session, and an access session time associated with the application session, the second host communicating with the secure network using the access session, the access session time including a starting time and an ending time associated with the access session;comparing the application session time and the access session time;matching the first host identity with the second host identity, in response to the application session time being between the starting time and the ending time;associating the first user identity and the second user identity using the matching; andstoring the association. 12. The method of claim 11 wherein the application server is outside of the secure network. 13. The method of claim 11 wherein the application session is an authenticated access session and the access session is an authenticated access session. 14. The method of claim 11 wherein the application includes at least one of File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP), Post Office Protocol (POP), and instant messaging (IM) protocol. 15. The method of claim 11 wherein the application session time includes at least one of a starting time associated with the application session and a time stamp associated with the application session. 16. The method of claim 11 wherein the second user identity includes at least one of a name of a user, an Internet service subscription identity, and a network login. 17. The method of claim 11 wherein the first host identity and the second host identity each include at least one of a respective Internet Protocol (IP) address and a Media Access Control (MAC) address. 18. The method of claim 11 wherein the storing further includes storing at least one of the first user identity, the second user identity associated with the first user identity, the first host identity, and the application session time. 19. The method of claim 11 further comprising obtaining user information associated with the second user identity, the user information including at least one of contact information, location information, and departmental information. 20. The method of claim 11 further comprising generating a report including the association. 21. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method, the method comprising: conveying an application session between a first host and an application server, the first host communicating with the application server using an application session, the application server provisioning an application;ascertaining a first host identity associated with the first host, a first user identity associated with the application session, and an application session time associated with the application session;receiving a second host identity associated with a second host, a second user identity associated with an access session, and an access session time associated with the application session, the second host communicating with the secure network using the access session, the access session time including a starting time and an ending time associated with the access session;comparing the application session time and the access session time;matching the first host identity with the second host identity, in response to the application session time being between the starting time and the ending time;associating the first user identity and the second user identity using the matching; andstoring the association.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (47)
Chen, Lee; Chiong, John; Kwan, Phillip, Access record gateway.
Bohannon, Philip L.; Jakobsson, Bjorn Markus; Monrose, Fabian; Reiter, Michael Kendrick; Wetzel, Susanne Gudrun, Generation of repeatable cryptographic key based on varying parameters.
MacDoran Peter F. ; Mathews Michael B. ; Ziel Fred A. ; Gold Kenn L. ; Anderson Steven M. ; Coffey Mark A. ; Denning Dorothy E., Method and apparatus for authenticating the location of remote users of networked computing systems.
Peden, II, Jeffrey J.; Gray, Matthew K.; Parker, Coleman P., Method and apparatus for controlling wireless network access privileges based on wireless client location.
Papierniak, Karen A.; Thaisz, James E.; Chiang, Luo-Jen; Diwekar, Anjali M., Method and apparatus for forming user sessions and presenting internet data according to the user sessions.
Tomko George J.,CAX ; Stoianov Alexei,CAX, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq.
Qin, Xiangping; Shao, Huai-Rong; Singh, Harkirat; Ngo, Chiu, System and method for wireless communication network having proximity control based on authorization token.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.