17847117. USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Or Moran of Rishon LeZion (IL)

Vladimir Perelman of Rishon LeZion (IL)

Meital Ben David of Tel Aviv (IL)

USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL - A simplified explanation of the abstract

This abstract first appeared for US patent application 17847117 titled 'USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL

Simplified Explanation

The patent application describes techniques for enforcing a security policy on a network connection using a requestor identity in a shared-access communication protocol.

  • The techniques involve receiving a request to create a network connection to a network resource.
  • The request is associated with a requestor identity, which identifies the entity making the request.
  • The network connection is also associated with the requestor identity.
  • A determination is made whether the requesting entity is authorized to access the network resource based on a permission indicated by the security policy.
  • If the permission indicates authorization, the network connection to the network resource is created.

Potential Applications

  • Network security systems
  • Access control systems
  • Shared-access communication protocols

Problems Solved

  • Enforcing security policies on network connections
  • Authorizing access to network resources
  • Managing shared-access communication protocols

Benefits

  • Improved network security
  • Efficient access control mechanisms
  • Enhanced management of shared-access communication protocols


Original Abstract Submitted

Techniques are described herein that are capable of using a requestor identity to enforce a security policy on a network connection that conforms to a shared-access communication protocol. A request to create the network connection to a network resource is received. The network connection is associated with the requestor identity, which identifies a requesting entity associated with the request, by associating the request with the requestor identity and further by associating the network connection with the request. A determination is made whether the requesting entity is authorized to access the network resource based at least in part on a permission that is indicated by the security policy. Based at least in part on the permission indicating that the requesting entity is authorized to access the network resource, the network connection to the network resource is created.