An access control technique to limit access to information content such as available on the Internet. The technique is implemented within a network device such as a proxy server, router, switch, firewall, bridge or other network gateway. The access control process analyzes data in each request from the clients and determines if the request should be forwarded for processing by a server to which it is destined. access control may be determined by comparing client source information against a database of uniform resource locators (URLs), IP addresses, or other resource identification data specifying the data requested by the client. The invention therefore provides access control not based only upon content, but rather, based primarily upon the identity of the computers or users making the requests. The technique further avoids the problems of the prior art which categories or filters the content of only web pages based solely upon objectionable words. This is because a category database is used by the network device to control access and is created via a process involving human editors who assist in the creation and maintenance of the category database.
|
1. A hardware network device for controlling access by clients on a private network to a data file data files stored at servers in a public network, the hardware network device being interconnected between the private network and the public networks network, the hardware network device comprising:
a first interface receiving a request from a client one of the clients on the private network to access a data file one of the data files stored at servers on in the public network;
an access control processor coupled to the first interface, the access control processor analyzing data in the request from the client one of the clients and determining if the request should be forwarded to the public network for processing by a server, of the servers in the public network, to which it the request is destined, the determination being made by cross referencing resource identifier information in the request with access control data in at least one access control database, the access control data containing categorized resource identifier information, the categorized resource identifier information specifying a content subject matter category to which the data file one of the data files is assigned, and the categorized resource identifier information associated with each data file so categorized being assigned by prior locating of each data file, storing data file information comprising a uniform resource locator for each data file in a first database, reading the data file information for each data file from the first database, human interpretation of the content in the each data file, and then, as a result of such human interpretation, determining a subject matter category to which the each data file is to be assigned, the data file stored at the servers on the public network and storing said data file information and said subject matter category in the access control database;
a second interface coupled between the first interface and the public network and coupled to the access control processor, the second interface forwarding the requests request from the first interface to the servers on in the public network if the access control processor determines the request should be forwarded to the public network for processing by a the server to which it the request is destined; and
means for permitting a network administrator of the public network to control the operation of the hardware network device.
18. A method executing on a first client computer connected to a public network and on an access controller connected to a private network, the method being for controlling access by clients of a the private network to data files stored on servers connected in a the public network, the method comprising the steps of:
at a the first client computer connected to the public network, using the first client computer to:
searching search for uncategorized data files being stored on servers connected in the public network, the uncategorized data files being available on demand;
store data file information comprising at least a uniform resource locator (URL) for each of the uncategorized data files in at least one initial database;
retrieve one or more selected data files from the initial database, at a time after the step of using the first client computer to store data file information in the at least one initial database;
presenting present a view of each selected data file in human readable form on the first client computer connected to the public network;
permitting permit a human being to review the contents of each selected data file so presented;
determining a associate, with each selected data file, a determined content rating for each selected data file in response to presenting the contents of the selected data file to a human being, the content rating being determined as a result of the human being assigning the selected data file to at least one content subject matter category; and
storing store a uniform resource locator (URL) of each selected data file together with the associated content subject matter categories category in a category-destination database;
at an access controller connected to the private network, using the access controller to:
downloading download the category-destination database;
receiving receive requests from second client computers connected to the private network, the requests from the second client computers indicating requested data files stored on the servers of connected in the public network;
analyzing analyze the data in each request from a client computer of the second client computers against the data from the category-destination database; and
determining determine whether to forward the request from the client computer of the second client computers to a server of the servers connected in the public network for processing, the determination being made based upon the content rating of the requested data file.
2. The hardware network device of
3. The hardware network device of
4. The hardware network device of
5. The hardware network device of
6. The hardware network device of
7. The hardware network device of
8. The hardware network device of
9. The hardware network device of
the request includes a source designation and the resource identifier information of the request specifies a destination of the request;
the categorized resource identifier information in the access control data is categorized by associating predetermined destinations to specific categories of content; and
the access control processor determines if the client one of the clients making the request is associated with a category of content which contains a predetermined destination having a portion that is equal to the destination specified in the resource identifier information of the request.
10. The hardware network device of
11. The hardware network device of
12. The hardware network device of
13. The hardware network device of
14. The hardware network device of
the request includes a source designation and the resource identifier information of the request specifies a destination of the request and the at least one access control database includes a group-source database and the access control processor, in determining if the request should be forwarded to the public network, matches the source designation of the request to the group-source database to determine the group of the client one of the clients making the request.
15. The hardware network device of
the at least one access control database further includes a group-category database and the access control processor, in determining if the request should be forwarded to the public network, matches the group of the client one of the clients making the request to at least one category to determine which categories of content may be accessed by that group.
16. The hardware network device of
at least one access control database further includes a category-destination database and the access control processor, in determining if the request should be forwarded to the public network, attempts to match the destination specified in the resource identifier information to at least one resource identifier destination listed within categories in the category-destination database, and if a match is made, the access control processor denies access to the server to which the request is destined.
17. The hardware network device of
19. The method of
examining examine a source of the request against a group-source database to determine a group associated with the client making the request;
examining examine the group associated with the client making the request against a group-category database to determine the content ratings that the group may access;
obtaining obtain URL information from the request; and
determining determine if the URL information has been assigned a content rating that the group may access, and if so, allowing using the access controller to allow the request, and if not, denying using the access controller to deny the request.
20. The method of
23. The method of
24. The method of
25. The method of
26. The method of
27. The method of
0. 28. A hardware network device according to
the first interface, the access control processor, the second interface, and the means for permitting the network administrator of the private network to control the operation of the hardware network device.
0. 29. A hardware network device according to
the request includes a source designation and the resource identifier information of the request specifies a destination of the request and the at least one access control database includes a group-source database and the access control processor, in determining if the request should be forwarded to the public network, matches the source designation of the request to the group-source database to determine the group of the one of the clients making the request.
0. 30. A hardware network device according to
the at least one access control database further includes a group-category database and the access control processor, in determining if the request should be forwarded to the public network, matches the group of the one of the clients making the request to at least one category to determine which categories of content may be accessed by that group.
0. 31. A hardware network device according to
0. 32. A hardware network device according to
0. 33. A method according to
if the data file information located in the using the first client computer to search for uncategorized data files is not already stored in either the queue database, the uncategorized database, or the category-destination database, then using the first client computer to store the data file information in the queue database.
0. 34. A method according to
using the first client computer to obtain further information for the data file information located in the using the first client computer to search for uncategorized data files, the further information including information other than the URL, and using the first client computer to store that information in the uncategorized database.
|
In step 209, if either the IP address, the URL or any segment of the URL matches to any restricted destination information (i.e., columns 2, 3 or 4 of Table 3) for any of the categories obtained in step 205, then step 210 is executed which denies access to the requested web page, data, service or content requested in the packet received rom the client at the network device 100. In other words, step 210 does not forward the packet on to the content server indicated in the destination field 303 of the packet if the client in the specific group was requesting a page or data or a service that existed in the category database 208 for one of the categories that was active for that group. Quite simply, the client was trying to access a restricted web site or URL or IP address or service and step 209 detects this information in one of the active categories in database 208 and step 209 can deny access.
In step 209 does detect an attempt at restricted access to a service, web site, data or other restricted content, step 214 is executed which uses the source address in field 302 of the packet 300 to send a return notification of denial to the user at the client computer requesting the restricted data. Step 215 may also be executed which logs the illegal attempted request to a log file.
However, if step 209 determines that neither the IP address, the URL, or any URL segments matched any of the restricted data for any of the active categories obtained in step 205, then step 211 allows the request to be forwarded to the content server through network device 100. In other words, the request was for legitimate non-restricted web pages, services, or data provided by a server on WAN 45. Once the request is received by the server to which it was destined, the server begins to return the requested data in the form of a web page, a file transfer, a news group, or other data.
Step 212 then begins to receive the web page or other content data packets and step 213, which may be optional, can filter the incoming data in the returned data packets for objectionable data, such as profanity occurring in the text of web pages or news groups or other objectionable content as may be defined. That is, content filtering may also be incorporated into the invention as data is returned from the servers. This is beneficial and overcomes the problems of the prior art content filtering systems since in this invention, the content filtering can be centralized at the network device 100, rather that administering many separate clients that each contain their own content filtering database.
In this manner, the present invention provides a robust data access filtering system that provides access control based on users, categories and times of use and not purely on content of data being accessed. This is beneficial since content filtering alone often overlooks objectionable material such as pornographic images, which contain no words to content filter upon.
Moreover, the present invention is centralized to offer ease of administration and configuration and is very flexible since times of day for restricted access may also be specified, if desired. By having a category database 208 that may be maintained offsite, by a third party for example, the invention allows the administrator to only have to worry about initial group/source configurations, and not worry about database maintenance. New client computers that suddenly appear or get installed on LAN 40, that are not yet listed in the group/source database, can be assigned a default group that has highly restricted access associated to it in this invention. In this manner, the invention can handle future LAN 40 client expansion without having to further configure the new clients for access control.
While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Those skilled in the art will recognize or be able to ascertain using no more than routine experimentation, many equivalents to the specific embodiments of the invention described specifically herein. Such equivalents are intended to be encompassed in the scope of the claims.
Patent | Priority | Assignee | Title |
10044715, | Dec 21 2012 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | Method and apparatus for presence based resource management |
10382595, | Jan 29 2014 | SMART SECURITY SYSTEMS LLC | Systems and methods for protecting communications |
10637839, | May 24 2012 | SMART SECURITY SYSTEMS LLC | Systems and methods for protecting communications between nodes |
10681142, | Jan 09 2014 | Comcast Cable Communications, LLC | Network filter |
10778659, | May 24 2012 | SMART SECURITY SYSTEMS LLC | System and method for protecting communications |
10783439, | May 08 2015 | FlowJo, LLC | Plugin interface and framework for integrating a remote server with sample data analysis software |
11457487, | Apr 01 2016 | Comcast Cable Communications, LLC | Methods and systems for connecting to a wireless network |
11489837, | Jan 09 2014 | Comcast Cable Communications, LLC | Network filter |
8015174, | Feb 28 2007 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System and method of controlling access to the internet |
8020206, | Jul 10 2006 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System and method of analyzing web content |
8024471, | Sep 09 2004 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System, method and apparatus for use in monitoring or controlling internet access |
8135831, | Sep 09 2004 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System, method and apparatus for use in monitoring or controlling internet access |
8214486, | Jul 13 2007 | FRONT PORCH, INC | Method and apparatus for internet traffic monitoring by third parties using monitoring implements |
8244817, | May 18 2007 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | Method and apparatus for electronic mail filtering |
8250081, | Jan 22 2007 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | Resource access filtering system and database structure for use therewith |
8510431, | Jul 13 2007 | FRONT PORCH, INC | Method and apparatus for internet traffic monitoring by third parties using monitoring implements transmitted via piggybacking HTTP transactions |
8615800, | Jul 10 2006 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System and method for analyzing web content |
8799388, | May 18 2007 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | Method and apparatus for electronic mail filtering |
8881277, | Jan 09 2007 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | Method and systems for collecting addresses for remotely accessible information sources |
8904557, | Feb 15 2012 | SAP SE | Solution for continuous control and protection of enterprise data based on authorization projection |
8978140, | Jul 10 2006 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System and method of analyzing web content |
9003524, | Jul 10 2006 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System and method for analyzing web content |
9117054, | Dec 21 2012 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | Method and aparatus for presence based resource management |
9130972, | May 26 2009 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | Systems and methods for efficient detection of fingerprinted data and information |
9325676, | May 24 2012 | TOLA, KENNETH; SMART SECURITY SYSTEMS LLC | Systems and methods for protecting communications between nodes |
9336408, | Feb 15 2012 | SAP SE | Solution for continuous control and protection of enterprise data based on authorization projection |
9348927, | May 07 2012 | TOLA, KENNETH; SMART SECURITY SYSTEMS LLC | Systems and methods for detecting, identifying and categorizing intermediate nodes |
9369438, | May 20 2011 | BAE SYSTEMS PLC | Supervised data transfer |
9378282, | Jun 30 2008 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System and method for dynamic and real-time categorization of webpages |
9473439, | May 13 2008 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | Method and apparatus for electronic mail filtering |
9654495, | Dec 01 2006 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System and method of analyzing web addresses |
9680866, | Jul 10 2006 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System and method for analyzing web content |
9692762, | May 26 2009 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | Systems and methods for efficient detection of fingerprinted data and information |
9723018, | Jul 10 2006 | FORCEPOINT FEDERAL HOLDINGS LLC; Forcepoint LLC | System and method of analyzing web content |
9992180, | May 24 2012 | SMART SECURITY SYSTEMS LLC | Systems and methods for protecting communications between nodes |
Patent | Priority | Assignee | Title |
5678041, | Jun 06 1995 | Cooper Union for the Advancement of Science and Art | System and method for restricting user access rights on the internet based on rating information stored in a relational database |
5696898, | Jun 06 1995 | THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT | System and method for database access control |
5706507, | Jul 05 1995 | ACTIVISION PUBLISHING, INC | System and method for controlling access to data located on a content server |
5708780, | Jun 07 1995 | Soverain IP, LLC | Internet server access control and monitoring systems |
5710883, | Mar 10 1995 | IBM Corporation | Hypertext document transport mechanism for firewall-compatible distributed world-wide web publishing |
5835712, | May 03 1996 | Open Invention Network, LLC | Client-server system using embedded hypertext tags for application and database development |
5889958, | Dec 20 1996 | ASCEND COMMUNICATIONS, INC | Network access control system and process |
5933600, | Dec 10 1996 | International Business Machines Corporation | Increased control for reduced delay in internet data transfers based on limitations established in a server system |
5933827, | Sep 25 1996 | International Business Machines Corporation | System for identifying new web pages of interest to a user |
5941947, | Aug 18 1995 | Rovi Technologies Corporation | System and method for controlling access to data entities in a computer network |
5950195, | Sep 18 1996 | McAfee, LLC | Generalized security policy management system and method |
5953732, | Dec 20 1994 | Sun Microsystems, Inc. | Hypertext information retrieval using profiles and topics |
5983176, | Apr 30 1997 | INSOLVENCY SERVICES GROUP, INC ; Procter & Gamble Company, The | Evaluation of media content in media files |
5991810, | Aug 01 1997 | RPX Corporation | User name authentication for gateway clients accessing a proxy cache server |
6078924, | Jan 30 1998 | EOEXCHANGE, INC | Method and apparatus for performing data collection, interpretation and analysis, in an information platform |
6088717, | Feb 29 1996 | OneName Corporation | Computer-based communication system and method using metadata defining a control-structure |
6154775, | Sep 12 1997 | PALO ALTO NETWORKS, INC | Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Oct 14 2004 | Content Advisor, Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Dec 24 2012 | REM: Maintenance Fee Reminder Mailed. |
May 13 2013 | M2553: Payment of Maintenance Fee, 12th Yr, Small Entity. |
May 13 2013 | M2556: 11.5 yr surcharge- late pmt w/in 6 mo, Small Entity. |
Date | Maintenance Schedule |
Mar 23 2013 | 4 years fee payment window open |
Sep 23 2013 | 6 months grace period start (w surcharge) |
Mar 23 2014 | patent expiry (for year 4) |
Mar 23 2016 | 2 years to revive unintentionally abandoned end. (for year 4) |
Mar 23 2017 | 8 years fee payment window open |
Sep 23 2017 | 6 months grace period start (w surcharge) |
Mar 23 2018 | patent expiry (for year 8) |
Mar 23 2020 | 2 years to revive unintentionally abandoned end. (for year 8) |
Mar 23 2021 | 12 years fee payment window open |
Sep 23 2021 | 6 months grace period start (w surcharge) |
Mar 23 2022 | patent expiry (for year 12) |
Mar 23 2024 | 2 years to revive unintentionally abandoned end. (for year 12) |