Patents Assigned to Trusted Network Technologies, Inc.
  • Patent number: 7386889
    Abstract: A method, system and program for preventing intrusion in a communications network. A source node initiates a request for network services, such as session establishment, database access, or application access. Known network resources and authorized user information is stored in a database at a network portal along with access policy rules that are device and user dependent. Identification of the source node is required before the source node can construct a transformed packet header that is included with a synchronization packet before transmission to a destination node. An appliance or firewall in the communications network receives and authenticates the synchronization packet before releasing the packet to its, intended destination. The authentication process includes verification of the access policy associated with the source node. Once received at the destination node, the transformed packet header is reformed by extracting a key index value.
    Type: Grant
    Filed: November 18, 2002
    Date of Patent: June 10, 2008
    Assignee: Trusted Network Technologies, Inc.
    Inventor: A. David Shay
  • Publication number: 20060149848
    Abstract: The disclosed system, apparatuses, and method can be used to relate network event data generated by different devices in a computer network in order to provide a user with a comprehensive view or report of network activity occurring on a computer network, including the computer, user, network address, and resource involved. This comprehensive view of network activity can be used to prove compliance with applicable policy, law and/or regulation restricting access to a resource such as confidential business information and/or personal information required to be protected. In addition, the comprehensive view of network activity can be used to discover vulnerabilities in the computer network, to monitor ongoing network activity, and to enforce applicable security policy, law and/or regulation to prevent access to a network resource.
    Type: Application
    Filed: December 19, 2005
    Publication date: July 6, 2006
    Applicant: Trusted Network Technologies, Inc.
    Inventor: A. Shay
  • Publication number: 20040098619
    Abstract: A method, system and program for preventing intrusion in a communications network. A source node initiates a request for network services, such as session establishment, database access, or application access. Known network resources and authorized user information is stored in a database at a network portal along with access policy rules that are device and user dependent. Identification of the source node is required before the source node can construct a transformed packet header that is included with a synchronization packet before transmission to a destination node. An appliance or firewall in the communications network receives and authenticates the synchronization packet before releasing the packet to its intended destination. The authentication process includes verification of the access policy associated with the source node. Once received at the destination node, the transformed packet header is reformed by extracting a key index value.
    Type: Application
    Filed: August 13, 2003
    Publication date: May 20, 2004
    Applicant: Trusted Network Technologies, Inc.
    Inventor: A. David Shay
  • Publication number: 20040098620
    Abstract: Methods, systems and computer-readable data storage media for authentication and/or access authorization in a communications network. A source node initiates a request for network services, such as session establishment, database access, or application access. Known network resources, authorized user, and/or source information are stored in a database at a network portal along with access policy rules that can be device and/or user dependent. A source node can construct a packet header including a user identifier indicating the user originating the request, and/or a source identifier indicating the hardware from which the request is originated. At least one of these identifiers are included with a synchronization packet for transmission to a destination node. An appliance or firewall in the communications network receives, authenticates, and determines whether resource access is authorized before releasing the packet to its intended destination.
    Type: Application
    Filed: August 19, 2003
    Publication date: May 20, 2004
    Applicant: Trusted Network Technologies, Inc.
    Inventor: A. David Shay