Patents Assigned to Applied Identity
  • Patent number: 7644434
    Abstract: A method of providing access to an authenticated user, and restricting access to an unauthorized user, of a computer system, is provided. The method includes determining whether a user is authenticated to access at least one resource included in the computer system. The method also includes establishing a session and a session identifier such that the user has access to the at least one resource if the user is authenticated to access the at least one resource. The method also includes changing the session identifier each time the user completes an interaction with the computer system during the session.
    Type: Grant
    Filed: April 25, 2003
    Date of Patent: January 5, 2010
    Assignee: Applied Identity, Inc.
    Inventors: Dennis Vance Pollutro, Andrew Almquist
  • Publication number: 20090276204
    Abstract: A method and system for managing access to resources on a secured network is disclosed. The method includes reading packet information in respective packets of a packet communication received at a security node and applying one of the plurality of access rules. The method also includes determining whether the security node is to block the respective packets and/or the packet communication from reaching a resource on the secured network based on the applied access rule. If the security node is to block the respective packets and/or the packet communication, it is determined whether the applied access rule is a simulated access rule. Responsive to the applied access rule being a simulated access rule, the respective packets and/or the packet communication are passed towards the resource on the secured network and a log event is generated that indicates the security node blocked the respective packets and/or the packet communication.
    Type: Application
    Filed: April 29, 2009
    Publication date: November 5, 2009
    Applicant: Applied Identity
    Inventors: Srinivas Kumar, Vijayashree S. Bettadapura
  • Publication number: 20090241170
    Abstract: A method or system for managing packet flow is disclosed. The packets each include an inserted application identifier identifying a registered application. The method includes receiving packets destined for one or more resources, determining, by a packet processor, the inserted application identifier for each of the respective packets received and managing the packet flow of each received packet sent from a security node based at least in part on the inserted application identifier of the received packet.
    Type: Application
    Filed: March 18, 2009
    Publication date: September 24, 2009
    Applicant: Applied Identity
    Inventors: Srinivas Kumar, Vijayashree S. Bettadapura, Shadab Munam Shah
  • Publication number: 20090144818
    Abstract: A method of packet security management to ensure a secure connection from one network node to another. The method includes creating a security tag for each packet in a network session, selecting one of a number of possible tag locations within the packet, inserting the security tag at that location, transmitting the tagged packets from a sending node to the receiving node, authenticating the packets' security tags at the receiving node, and dropping non-authenticated packets. The method also includes determining best possible tag locations when sending a packet and locating a security tag when receiving a packet.
    Type: Application
    Filed: November 10, 2008
    Publication date: June 4, 2009
    Applicant: Applied Identity
    Inventors: Srinivas Kumar, Vijayashree S. Bettadapura
  • Publication number: 20090138939
    Abstract: A method of security gateway policy definition to quickly infer a new policy based on event data extracted and analyzed using business logic and workflow from a gateway event log or behavior log. The method includes reading the components of a log record, translating the components into acceptable policy attributes, creating a new policy based on those attributes, and presenting the new policy to a system administrator for editing and approval.
    Type: Application
    Filed: November 10, 2008
    Publication date: May 28, 2009
    Applicant: Applied Identity
    Inventors: Srinivas Kumar, Dean A. Weber
  • Publication number: 20090133110
    Abstract: Systems and methods are described for creating a globally unique identity for a user or user-container by performing an iterative join where each participating back-end data source. The systems and methods include an ID-Unify (IDU) that performs identity virtualization and creates or generates a globally unique identifier for a user in operational environments in which there is a pre-existing conflict caused by the existence of different identities for a user in different authentication data sources.
    Type: Application
    Filed: November 13, 2008
    Publication date: May 21, 2009
    Applicant: Applied Identity
    Inventors: Srinivas Kumar, Dean A. Weber, Virginia L. Roth, Shadab Munam Shah