17847117. USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL simplified abstract (Microsoft Technology Licensing, LLC)
Contents
- 1 USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Original Abstract Submitted
USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL
Organization Name
Microsoft Technology Licensing, LLC
Inventor(s)
Or Moran of Rishon LeZion (IL)
Vladimir Perelman of Rishon LeZion (IL)
Meital Ben David of Tel Aviv (IL)
USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL - A simplified explanation of the abstract
This abstract first appeared for US patent application 17847117 titled 'USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL
Simplified Explanation
The patent application describes techniques for enforcing a security policy on a network connection using a requestor identity in a shared-access communication protocol.
- The techniques involve receiving a request to create a network connection to a network resource.
- The request is associated with a requestor identity, which identifies the entity making the request.
- The network connection is also associated with the requestor identity.
- A determination is made whether the requesting entity is authorized to access the network resource based on a permission indicated by the security policy.
- If the permission indicates authorization, the network connection to the network resource is created.
Potential Applications
- Network security systems
- Access control systems
- Shared-access communication protocols
Problems Solved
- Enforcing security policies on network connections
- Authorizing access to network resources
- Managing shared-access communication protocols
Benefits
- Improved network security
- Efficient access control mechanisms
- Enhanced management of shared-access communication protocols
Original Abstract Submitted
Techniques are described herein that are capable of using a requestor identity to enforce a security policy on a network connection that conforms to a shared-access communication protocol. A request to create the network connection to a network resource is received. The network connection is associated with the requestor identity, which identifies a requesting entity associated with the request, by associating the request with the requestor identity and further by associating the network connection with the request. A determination is made whether the requesting entity is authorized to access the network resource based at least in part on a permission that is indicated by the security policy. Based at least in part on the permission indicating that the requesting entity is authorized to access the network resource, the network connection to the network resource is created.