User identity filtering method and firewall
A technology of user identity and user identity information, applied in a method based on user identity filtering and in the field of firewalls, can solve problems such as inability to analyze user information, unrealized user information extraction session control, and impact on overall system performance, so as to prevent malicious Effect of User Access to the Service
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] Neither packet filtering nor proxy service firewalls can identify users online, and cannot implement user-based security policies based on user information and behavior. However, with the wide application of service-oriented architecture, web2.0 and cloud services, it is necessary to The identity information of the corresponding application is used for access control and session management.
[0019] On the one hand, more communication uses fewer ports (such as 80 and 443 ports) and uses fewer protocols (such as HTTP and HTTPS) to transmit, and the packet filtering firewall based on IP and port combination detection is not suitable and not suitable. too effective.
[0020] On the other hand, the behaviors of users using the same application are quite different. For example, some users who use cloud services frequently access a certain service in a short period of time or occupy a large amount of bandwidth, or the historical behavior of this user is not good. Providers n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 