Patents Assigned to Trusted Network Technologies, Inc.
  • Publication number: 20080276297
    Abstract: A method and system for monitoring UDP communications and for preventing unauthorized UDP communications within a computer network. A method for managing access to a resource comprises assigning a unique user identifier to each authorized user, upon initiation of a UDP communication initialed by a specific authorized user for access to a specific resource, appending the unique user identifier of the specific authorized user to each UDP packet of the UDP communication, intercepting the plurality of UDP packets within the computer network, extracting the unique user identifier from each UDP packet to identify the specific authorized user associated with the respective UDP packet, and allowing each respective UDP packet to reach the specific resource as a function of the unique user identifier extracted from the respective UDP packet.
    Type: Application
    Filed: June 9, 2008
    Publication date: November 6, 2008
    Applicant: TRUSTED NETWORK TECHNOLOGIES, INC.
    Inventor: A. David SHAY
  • Patent number: 7386889
    Abstract: A method, system and program for preventing intrusion in a communications network. A source node initiates a request for network services, such as session establishment, database access, or application access. Known network resources and authorized user information is stored in a database at a network portal along with access policy rules that are device and user dependent. Identification of the source node is required before the source node can construct a transformed packet header that is included with a synchronization packet before transmission to a destination node. An appliance or firewall in the communications network receives and authenticates the synchronization packet before releasing the packet to its, intended destination. The authentication process includes verification of the access policy associated with the source node. Once received at the destination node, the transformed packet header is reformed by extracting a key index value.
    Type: Grant
    Filed: November 18, 2002
    Date of Patent: June 10, 2008
    Assignee: Trusted Network Technologies, Inc.
    Inventor: A. David Shay
  • Publication number: 20060149848
    Abstract: The disclosed system, apparatuses, and method can be used to relate network event data generated by different devices in a computer network in order to provide a user with a comprehensive view or report of network activity occurring on a computer network, including the computer, user, network address, and resource involved. This comprehensive view of network activity can be used to prove compliance with applicable policy, law and/or regulation restricting access to a resource such as confidential business information and/or personal information required to be protected. In addition, the comprehensive view of network activity can be used to discover vulnerabilities in the computer network, to monitor ongoing network activity, and to enforce applicable security policy, law and/or regulation to prevent access to a network resource.
    Type: Application
    Filed: December 19, 2005
    Publication date: July 6, 2006
    Applicant: Trusted Network Technologies, Inc.
    Inventor: A. Shay
  • Publication number: 20060098649
    Abstract: An embodiment of a system of the invention includes a request node, an enforcement node, and a resource node. A request node generates a packet requesting access to a resource, includes its security realm identifier in the packet header, and transmits the same to the enforcement node via a network such as the Internet. The enforcement node receives the packet and applies the security policy of the resource node based on whether or not the request node is in the same security realm as the resource node. Related apparatuses, methods, and computer-readable media are also disclosed and claimed.
    Type: Application
    Filed: November 9, 2005
    Publication date: May 11, 2006
    Applicant: TRUSTED NETWORK TECHNOLOGIES, INC.
    Inventor: A. SHAY
  • Publication number: 20040098619
    Abstract: A method, system and program for preventing intrusion in a communications network. A source node initiates a request for network services, such as session establishment, database access, or application access. Known network resources and authorized user information is stored in a database at a network portal along with access policy rules that are device and user dependent. Identification of the source node is required before the source node can construct a transformed packet header that is included with a synchronization packet before transmission to a destination node. An appliance or firewall in the communications network receives and authenticates the synchronization packet before releasing the packet to its intended destination. The authentication process includes verification of the access policy associated with the source node. Once received at the destination node, the transformed packet header is reformed by extracting a key index value.
    Type: Application
    Filed: August 13, 2003
    Publication date: May 20, 2004
    Applicant: Trusted Network Technologies, Inc.
    Inventor: A. David Shay
  • Publication number: 20040098620
    Abstract: Methods, systems and computer-readable data storage media for authentication and/or access authorization in a communications network. A source node initiates a request for network services, such as session establishment, database access, or application access. Known network resources, authorized user, and/or source information are stored in a database at a network portal along with access policy rules that can be device and/or user dependent. A source node can construct a packet header including a user identifier indicating the user originating the request, and/or a source identifier indicating the hardware from which the request is originated. At least one of these identifiers are included with a synchronization packet for transmission to a destination node. An appliance or firewall in the communications network receives, authenticates, and determines whether resource access is authorized before releasing the packet to its intended destination.
    Type: Application
    Filed: August 19, 2003
    Publication date: May 20, 2004
    Applicant: Trusted Network Technologies, Inc.
    Inventor: A. David Shay