Firewall Patents (Class 726/11)
  • Publication number: 20150058966
    Abstract: This disclosure provides example details for apparatuses and methods that manage virtual firewalls in a wireless communication network that includes a Core Network, CN, and an associated Radio Access Network, RAN. The virtual firewalls process traffic for respective wireless devices supported by the network. For example, the virtual firewall associated with a given wireless device is maintained in the RAN at the RAN node supporting the device, and is migrated from that RAN node in response to detecting a handover event involving the device. Advantageously, migration may be “horizontal,” where the associated virtual firewall is moved between nodes in the RAN, or may be “vertical,” where the associated virtual firewall is moved from the RAN to the CN.
    Type: Application
    Filed: August 23, 2013
    Publication date: February 26, 2015
    Applicant: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Makan Pourzandi, Zhongwen Zhu
  • Publication number: 20150058967
    Abstract: A series of NAT connection rules are revised in a dynamic manner such that a pool of ports is available to connect a plurality of remote users to local virtual compute resources over one or more public IP addresses. Once a connection is established, an entry is made in a firewall state table, associating IP addresses, ports and protocol types, such that the firewall state table allows uninterrupted use of the established connection. After an entry has been made in the state table, or the routing rule has timed out, the port associated with the original NAT routing rule is removed and the same port can be re-used to establish another connection without disrupting active connections. A connection between a virtual compute resource and a local compute resource can be associated with multiple ports and multiple protocol types.
    Type: Application
    Filed: August 23, 2013
    Publication date: February 26, 2015
    Inventors: Kenneth N. Ringdahl, Robert Hatch, Daniel B. Allan
  • Patent number: 8966625
    Abstract: In some embodiments, identification of malware sites using unknown URL sites and newly registered DNS addresses includes performing a heuristic analysis for information associated with a network site; and assigning a score based on the heuristic analysis, in which the score indicates whether the network site is potentially malicious. In some embodiments, the system includes a security appliance that is in communication with the Internet. In some embodiments, the network site is associated with a network domain and/or a network uniform resource locator (URL). In some embodiments, performing a heuristic analysis for information associated with a network site further includes determining if a network site has recently been registered. In some embodiments, performing a heuristic analysis for information associated with a network site further includes determining if a network site is associated with recently changed DNS information.
    Type: Grant
    Filed: May 24, 2011
    Date of Patent: February 24, 2015
    Assignee: Palo Alto Networks, Inc.
    Inventors: Nir Zuk, Renzo Lazzarato, Huagang Xie
  • Patent number: 8966606
    Abstract: Disclosed are a DLP security system and an operating method thereof. An operating method of a data loss prevention (DLP) apparatus, comprising: converting, into packets, Ethernet signals received from a fail over device that are transmitted and received between an external network and internal network; analyzing the packets to classify the packets into first packets required to be precisely judged and second packets not required to be precisely judged; distributing and allocating a judgment job about the first packet to at least one in-line instance according to a predetermined reference; and allocating the judgment job distributed to the in-line instance in which a fail occurs to the in-line instance which is normally operated when it is verified whether there is an in-line instance which is normally operated in the case where the fail occurs in the at least one in-line instance.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: February 24, 2015
    Assignee: Somansa Co., Ltd
    Inventors: Sang Seok Lee, Tae Wan Kim, Il Hoon Choi
  • Patent number: 8966607
    Abstract: A method is provided for filtering unwanted packets in a communication system. The communication system includes a first network, a wireless network and at least one wireless communication device. An instruction to add an entry to a blocked list is received from a specific wireless device. The entry includes blocking criteria. A first packet is received from the first network. The first packet is destined for the specific wireless communication device. If the first packet exhibits the blocking criteria included in the blocked list, the first packet is discarded before it can be distributed by the wireless network.
    Type: Grant
    Filed: July 15, 2009
    Date of Patent: February 24, 2015
    Assignee: Rockstar Consortium US LP
    Inventors: Martin Sauter, Ed Illidge, Wayne Wei Ding
  • Patent number: 8966594
    Abstract: A first application that is hosted by a first machine receives a login request from a user. The first application requests authentication verification from a second application that is hosted by a second machine. The first application authenticates the user if the user was authenticated by the second application, wherein the user can be authenticated by both the first application and the second application after having provided authentication credentials to one of the first application or the second application.
    Type: Grant
    Filed: February 4, 2008
    Date of Patent: February 24, 2015
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8966610
    Abstract: A data control system prevents non-point of sale devices (135, 155) from sending data over an external network (160) via a secure connection reserved for point of sale devices (125, 145), but allows non-point of sale devices (135, 155) to send data over the external network (160) other than via the secure connection. The secure connection is, for example, a virtual private network connection. The data control system may allow the data from non-point of sale devices (135, 155) to be sent only if it is not destined for a restricted destination. The restricted destination may be, for example, a payment host (170) or secure host (180) on the external network (160).
    Type: Grant
    Filed: November 5, 2008
    Date of Patent: February 24, 2015
    Assignee: Apriva, LLC
    Inventor: Paul D. Coppinger
  • Patent number: 8959612
    Abstract: A secure interconnection system between two public networks comprises at least one first router, a first firewall, a second router, a second firewall and a blade server, and a first virtual local area network containing the data streams exchanged between a first communications facility and a second communications facility, a second virtual local area network containing the management and maintenance streams of said system which are exchanged between a supervision center and the blade server and a third virtual local area network containing the authentication streams for said first communications facility which are exchanged between the said second firewall and said blade server, said virtual local area networks being designed so as to exhibit an empty intersection.
    Type: Grant
    Filed: May 20, 2011
    Date of Patent: February 17, 2015
    Assignee: Thales
    Inventors: Suzanne DeBaille, Stéphane Touyet
  • Publication number: 20150047009
    Abstract: A management terminal belonging to a first network periodically receives a registration request of information of a communication terminal belonging to a second network from a gateway device belonging to the second network. A control device belonging to the first network receives a communication request that a communication path be secured between the management terminal and the communication terminal from the management terminal. The control device includes the communication request in a latest response to a registration request received from the gateway device periodically and transmits the communication request to the gateway device. The gateway device permits an access to the communication terminal from the management terminal via a tunnel formed in response to the communication request.
    Type: Application
    Filed: March 21, 2014
    Publication date: February 12, 2015
    Applicant: FUJITSU LIMITED
    Inventors: TOMOYUKI SONE, Kazumine Matoba
  • Publication number: 20150047008
    Abstract: According to one aspect, embodiments of the invention provide a system for restricting access to a network, the system comprising a monitoring module configured to be coupled to a plurality of network access points and to monitor transmissions to the network via a plurality of network security appliances, and a blocking module, wherein the monitoring module is further configured to identify a potential bad actor based on a transmission from the potential bad actor to the network via a first one of the plurality of network access points and a first one of the plurality of network security appliances and provide information related to the potential bad actor to the blocking module, and wherein the blocking module is configured to confirm that the potential bad actor should be blocked and in response, to automatically configure each network security appliance to block the potential bad actor from accessing the network.
    Type: Application
    Filed: August 12, 2013
    Publication date: February 12, 2015
    Inventors: Glen Thomas Undernehr, Charles Allen Courtright
  • Publication number: 20150047010
    Abstract: To provide a path control system, a control device and a path control method that can achieve reduction of the load on a gateway device, there are included a communication device, a communication device, a security device that provides a security feature to data transmitted and received between the communication device and the communication device, and a path control device that selects one of a first path through the security device and a second path not through the security device as a communication path of the data based on a path information table where an attribute of the data and a communication path between the communication device and the communication device are associated.
    Type: Application
    Filed: February 1, 2013
    Publication date: February 12, 2015
    Inventors: Yoshiya Kizu, Kenichi Kashima
  • Patent number: 8955093
    Abstract: A network system includes a security device and a network access device. The network access device is to receive a packet from a source node destined to a destination node, and to examine a data structure maintained by the network access device to determine whether the data structure stores a data member having a predetermined value, the data member indicating whether the packet should undergo security processing. If the data member matches the predetermined value, the packet is transmitted to a security device associated with the network access device to allow the security device to perform content inspection, and in response to a response received from the security device, the packet is routed to the destination node dependent upon the response. The packet is routed to the destination node without forwarding the packet to the security device.
    Type: Grant
    Filed: April 10, 2013
    Date of Patent: February 10, 2015
    Assignee: Varmour Networks, Inc.
    Inventors: Choung-Yaw Michael Shieh, Meng Xu, Yi Sun, Jia-Jyi Roger Lian
  • Patent number: 8954583
    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.
    Type: Grant
    Filed: January 20, 2014
    Date of Patent: February 10, 2015
    Assignee: Shape Security, Inc.
    Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
  • Patent number: 8955092
    Abstract: A computer-implemented method for eliminating redundant security analyses on network data packets may include (1) intercepting, at a networking device, at least one network data packet destined for a target computing device, (2) identifying a security system installed on the target computing device, (3) determining that the security system installed on the target computing device does not satisfy a predefined security standard, and then (4) performing a security analysis that satisfies the predefined security standard on the network data packet at the networking device based at least in part on determining that the security system installed on the target computing device does not satisfy the predefined security standard. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: February 10, 2015
    Assignee: Symantec Corporation
    Inventor: Shaun Cooley
  • Patent number: 8955091
    Abstract: A system includes an enterprise network including an internal management system communicatively coupled thereon, the enterprise network includes security and the internal management system is disposed behind the security; a cloud system external to the enterprise network and communicatively coupled to the enterprise network, at least one user associated with the enterprise network is configured to communicate through the cloud system for cloud-based services, and the cloud system is configured to log data associated with the at least one user for the cloud-based services; and an external service bridge located in the enterprise network behind the security, the external service bridge is configured to securely communicate with the cloud system to receive the log data and to communicate with the internal management system to provide the log data thereto.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: February 10, 2015
    Assignee: Zscaler, Inc.
    Inventors: Kailash Kailash, Chakkaravarthy Periyasamy Balaiah, Sushil Pangeni, Amit Sinha, Samuel John Crank, Manoj Apte, Sridhar Narasimhan
  • Patent number: 8955097
    Abstract: A firewall cluster comprises three or more firewall processing nodes, which report primary node status based on the reporting node's membership in a preexisting cluster. A controller uses the reported status to assign a primary node in the distributed firewall cluster. Reported primary node status includes reported primary node eligibility if the node is a member of a preexisting cluster, reported primary node status comprising reporting primary node ineligibility if the node is not a member of a preexisting cluster, reported primary node status if the node is a primary node in a preexisting cluster, and reported primary node eligibility in a node that has timed out.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: February 10, 2015
    Assignee: McAfee, Inc.
    Inventors: David Andrew Bright, Michael James Silbersack, Aaron Christopher Bucher
  • Patent number: 8955088
    Abstract: An apparatus comprising a policy enforcement point (PEP) configured to enforce firewall policies in a network, and a policy decision point (PDP) coupled to the PEP and configured to manage the PEP based on at least one firewall policy option received from at least one node. Also disclosed is a network component comprising at least one processor configured to implement a method comprising receiving a request from a node regarding a firewall policy entry, authenticating the node, processing the request to manage a firewall using a firewall control protocol, and sending a reply to the node regarding processing the request. Also disclosed is a method comprising signaling a PDP to establish a session associated with a source address and a requested protocol, and receiving an indication when the session is allowed.
    Type: Grant
    Filed: November 6, 2008
    Date of Patent: February 10, 2015
    Assignee: Futurewei Technologies, Inc.
    Inventors: Hesham Soliman, Gregory Ian Daley
  • Patent number: 8955089
    Abstract: A user equipment (UE) and method is provided having one or more components configured to receive a non-session initiation protocol (SIP) notification from a SIP entity and in response to send a ping request to the SIP entity, the one or more components further configured to receive a SIP request from the SIP entity. A network component and method is also provided that include one or more components configured to send a non-session initiation protocol (SIP) notification to a user equipment (UE) and to receive a ping request from the UE and further to send a SIP request to the UE.
    Type: Grant
    Filed: December 8, 2010
    Date of Patent: February 10, 2015
    Assignee: BlackBerry Limited
    Inventor: Alexander Shatsky
  • Patent number: 8955090
    Abstract: A SIP firewall defends an IMS network against SIP registration-based DoS/DDoS attacks by issuing fake authentication challenges when suspiciously high registration traffic is present. The fake authentication challenges include a predictive nonce that is to be used in the challenge response, thus forcing users to be state-aware and to issue the SIP registration requests from valid IP address in order to successfully respond to the fake authentication challenges. Upon confirming an association between the challenge response and the fake authentication challenges, the firewall opens a registration window to a protected node of the core network. In such manner, the firewall opens a registration window to (unauthenticated) legitimate users while stopping DDoS mode of registrations (or at least making them extremely difficult and costly) without impacting or involving the protected node.
    Type: Grant
    Filed: January 10, 2011
    Date of Patent: February 10, 2015
    Assignee: Alcatel Lucent
    Inventors: Thierry C. Bessis, Ashwin V. Rana
  • Publication number: 20150040206
    Abstract: Processes for identifying and recovering a lost transient storage device are provided. In some processes, information regarding the owner of the device is obtained. The device ownership information may be stored on a remote service with which the device is registered and/or may be stored on the device itself. In one process, the remote service provides the device with customized device-executable code when the device is registered. The device may also contain information regarding trusted systems. The process includes obtaining status information indicating whether a device is lost when the device is connected to a host system. In some processes, the status is determined by a remote service. In other processes, the status is determined by the device. If the device is lost then a device recovery plan is executed. Portions of a device recovery plan may be executed on the remote service, the host system, and/or the device.
    Type: Application
    Filed: October 15, 2014
    Publication date: February 5, 2015
    Inventors: Janet Schneider, Emily Wilson, Vladimir Sadovsky, Robin Alexander
  • Patent number: 8949968
    Abstract: An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise virtual private network (VPN) connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. Once installed on the cellular mobile device, the multi-service client integrates with an operating system of the device to provide a single entry point for user authentication for secure enterprise connectivity, endpoint security services including endpoint compliance with respect to anti-virus and spyware software, and comprehensive integrity checks.
    Type: Grant
    Filed: February 23, 2012
    Date of Patent: February 3, 2015
    Assignee: Pulse Secure, LLC
    Inventors: Vikki Yin Wei, Subramanian Iyer, Richard Campagna, James Wood
  • Patent number: 8949966
    Abstract: A method and a system for securing access to data stored in a remote content server (41), and corresponding to personal multimedia data of a user (A) for example, which data is accessible by another user (B) from a terminal (2) by means of an electronic address. In order to avoid direct and extended access by the user (B) to the data of a user (A), the system also includes an application server (5) for creating an electronic masking address having a determined validity period and for sending to an inverse proxy server (6) said electronic masking address assigned to the electronic address of the remote content server (41). In this way, the terminal (2) of the user (B) temporarily accesses data stored in the remote content server (41) via the inverse proxy server (6) by means of the electronic masking address.
    Type: Grant
    Filed: October 25, 2006
    Date of Patent: February 3, 2015
    Assignee: Orange
    Inventors: Philippe Lottin, Claudine Le Mercier, Jean-François Rey
  • Patent number: 8949965
    Abstract: Services in a network device are added through providing virtual environments. Virtualization allows services based on other platforms or architectures to be run with minimum modification and in a secure manner. Connecting services to the host through a stateful firewall allows dynamic integration, and passes only traffic of interest to the service. Virtualization allows services written for different instruction architectures to be supported. Multiple virtualized environments each supporting a service may be run.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: February 3, 2015
    Assignee: Aruba Networks, Inc.
    Inventors: John Taylor, Randy Chou, Pradeep Iyer, Dave Logan
  • Patent number: 8949952
    Abstract: A system includes a multi-stack subscriber, a gateway, and a web portal. The web portal determines whether the subscriber is authenticated to access the Internet using a first Internet Protocol by receiving logon information from the subscriber. The subscriber requests to access the Internet using a second Internet Protocol. The gateway and/or the web portal determine whether the subscriber is authenticated to access the Internet using the second Internet Protocol without sending a second logon to the subscriber.
    Type: Grant
    Filed: April 25, 2012
    Date of Patent: February 3, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Wojciech Dec, Piyush Agarwal, Jean-Philippe Champagne
  • Patent number: 8949418
    Abstract: An illustrative embodiment of a method for firewall rule use counting receives log messages comprising one or more log data sets from each firewall rule in a particular network whose counts are to be tracked in a log collector, generates a network trie for each reference database in a set of databases and a device source trie and a device destination trie for each firewall device in a plurality of devices of the particular network, a source port and protocol list and a destination port and protocol list for each respective device, a unique object for each log data set received; a mapping database comprising an entry for each log data set received associated with the unique object; and feeds each entry in the mapping database through a topology model to also generate a reference to a unique firewall rule on a respective device in the plurality of devices.
    Type: Grant
    Filed: December 11, 2012
    Date of Patent: February 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Rory F. Bray, Cezar P. Grzelak, Jason D. Keirstead
  • Publication number: 20150033319
    Abstract: The present invention is directed to a secure communication network that enables multi-point to multi-point proxy communication over the network. The network employs a smart server that establishes a secure communication link with each of a plurality of smart client devices deployed on local client networks. Each smart client device is in communication with a plurality of agent devices. A plurality of remote devices can access the smart server directly and communicate with an agent device via the secure communication link between the smart server and one of the smart client devices.
    Type: Application
    Filed: July 11, 2014
    Publication date: January 29, 2015
    Applicant: KE2 THERM SOLUTIONS, INC.
    Inventors: STEVE ROBERTS, CETIN SERT
  • Publication number: 20150033305
    Abstract: The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes.
    Type: Application
    Filed: September 13, 2014
    Publication date: January 29, 2015
    Inventors: Victor Henry SHEAR, Peter Robert WILLIAMS, Jaisook RHO, Timothy St. John REDMOND
  • Publication number: 20150033320
    Abstract: Various examples provide a safety protection method, a firewall, a terminal device and a computer-readable storage medium. According to the method, a firewall injects a code module including a first function capable of modifying package safety information corresponding to an illegal application into a target process, and triggers the first function to modify the package safety information corresponding to the illegal application to make the illegal application fail to perform an operation due to the modified package safety information.
    Type: Application
    Filed: October 14, 2014
    Publication date: January 29, 2015
    Inventor: Jiahui Liang
  • Patent number: 8943575
    Abstract: A method and system for managing access to resources on a secured network is disclosed. The method includes reading packet information in respective packets of a packet communication received at a security node and applying one of the plurality of access rules. The method also includes determining whether the security node is to block the respective packets and/or the packet communication from reaching a resource on the secured network based on the applied access rule. If the security node is to block the respective packets and/or the packet communication, it is determined whether the applied access rule is a simulated access rule. Responsive to the applied access rule being a simulated access rule, the respective packets and/or the packet communication are passed towards the resource on the secured network and a log event is generated that indicates the security node blocked the respective packets and/or the packet communication.
    Type: Grant
    Filed: April 29, 2009
    Date of Patent: January 27, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Srinivas Kumar, Vijayashree S. Bettadapura
  • Patent number: 8943577
    Abstract: A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a server side session, receives a data packet, assigns a central processing unit core from a plurality of central processing unit cores in a multi-core processor of the security gateway to process the data packet, processes the data packet according to security policies, and sends the processed data packet. The proxy network address is selected such that a same central processing unit core is assigned to process data packets from the server side session and the host side session. By assigning central processing unit cores in this manner, higher capable security gateways are provided.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: January 27, 2015
    Assignee: A10 Networks, Inc.
    Inventors: Lee Chen, Ronald Wai Lun Szeto
  • Patent number: 8943304
    Abstract: Systems and methods are described for using a client agent operating in a virtual private network environment to intercept HTTP communications. Methods include: intercepting at the network layer, by a client agent executing on a client, an HTTP request from an application executing on the client; modifying the HTTP request; and transmitting, via a transport layer connection, the modified HTTP request to a server. Additional methods may comprise adding, removing, or modifying at least one cookie in the HTTP request. Still other methods may comprise modifying at least one name-value pair contained in the HTTP request. Corresponding systems are also described.
    Type: Grant
    Filed: August 3, 2006
    Date of Patent: January 27, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Junxiao He, Charu Venkatraman, Ajay Soni
  • Publication number: 20150026792
    Abstract: A system for providing a secure video display using a one-way data link. An input interface for receives a video stream signal. The one-way data link has an input node coupled to receive the input video stream signal and an output node. A processing system is coupled to the output node of the one-way data link and is configured to run a predetermined operating system. In an embodiment, a video display software program operates within the predetermined operating system to process the video stream signal received from the output node of the one-way data link and to provide an output signal for viewing on a display coupled to the processing system. Optionally, the video display program operates within a virtual operating system running within the predetermined operating system. In other embodiments, the video display program may process a video stream signal containing a plurality of different video programs.
    Type: Application
    Filed: October 9, 2014
    Publication date: January 22, 2015
    Inventors: Ronald Mraz, Jeffrey Menoher, Andrew Holmes
  • Patent number: 8938788
    Abstract: Method and computer storage media for sharing resources between a plurality of computing devices associated with a common non-enterprise network. A common set of credentials is stored on at least two or more of a plurality of computing devices that reside behind a routing device and are associated through a common non-enterprise network. Upon storing the common set of credentials, each of the two or more of a plurality of computing devices create a local account that contains, at least, the common set of credentials. The common set of credentials allow for the sharing, among the two or more of the plurality of computing devices, of resource that reside on or are associated with the computing devices.
    Type: Grant
    Filed: July 9, 2013
    Date of Patent: January 20, 2015
    Assignee: Microsoft Corporation
    Inventors: Brian L. McNeil, Michael G. Sheldon, Steve Seixeiro, Ramkumar Ramasubramanian, Jerry K. Koh, Anshul Rawat, Andrew V. Davidson, Daniel Oliver, Michael D. McCormack
  • Publication number: 20150020187
    Abstract: A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.
    Type: Application
    Filed: September 18, 2014
    Publication date: January 15, 2015
    Inventors: JOHN S. FLOWERS, RIDGELY C. EVERS
  • Publication number: 20150020186
    Abstract: A method, apparatus, and system are described for a central management system to configure remote devices. A device service manager server (DSM) may have an IP redirector module configured to cooperate with two or more device service controllers (DSCs) that are behind a firewall on a wide area network relative to a location of the DSM on the wide area network, where the DSM serves as a central management station for a distribution of configuration information to the DSCs, wherein an executable boot up file uploaded via a drive port in that DSC is scripted to gather configuration information for that DSC and network devices on the same network as that DSC and without a prompt by the DSM then sends an initial configuration file to the DSM which makes a master copy of the device configuration file in the DSM's registry for that DSC.
    Type: Application
    Filed: July 25, 2014
    Publication date: January 15, 2015
    Applicant: Lantronix, Inc.
    Inventors: Jonathan Peter Deutsch, Danny Te-An Sung
  • Patent number: 8935742
    Abstract: Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise network users and roaming users. The global SCM service integrates the security functionalities—such as anti-virus, spyware, and phishing protection, firewall, intrusion detection, centralized management, and the like—that are typically provided by enterprise network SCM appliance hardware or servers into a cloud-based service that users reach via Internet-based points-of-presence (“POPs”). The POPs are configured with forward proxy servers, and in some implementations, caching and network acceleration components, and coupled to hubs which provide configuration management and identity management services such as active directory services.
    Type: Grant
    Filed: August 18, 2008
    Date of Patent: January 13, 2015
    Assignee: Microsoft Corporation
    Inventors: Nir Nice, Oleg Ananiev, John Wohlfert, Amit Finkelstein, Alik Teplitsky
  • Patent number: 8935772
    Abstract: A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from unauthorized third parties. A first router directs all connection requests to one or more secure web servers, which may utilize a load balancer to efficiently distribute the session connection load among a high number of authorized client users. On the network side of the web servers, a second router directs all connection requests to a dispatcher server, which routes application server calls to a proxy server for the application requested. A plurality of data security protocols are also employed. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system.
    Type: Grant
    Filed: October 10, 2012
    Date of Patent: January 13, 2015
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Carol Y. Devine, Gerald A. Shifrin, Richard W. Shoulberg
  • Patent number: 8931077
    Abstract: A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is implemented on a first computer and is connected to at least some of the devices in the network. The security subsystem is configured to monitor activities of the at least some devices on the network and detect attacks on the at least some devices. The master system is implemented on a second computer which is different from the first computer. The master system monitors the integrity of the security subsystem and registers information pertaining to attacks detected by the security subsystem. The secure link is connected between the security subsystem and the master system. The master system monitors the integrity of the security subsystem and receives the information pertaining to the attacks through the secure link.
    Type: Grant
    Filed: August 10, 2012
    Date of Patent: January 6, 2015
    Assignee: Solutionary, Inc.
    Inventors: Michael Hrabik, Jeffrey J. Guilfoyle, Edward “Mac” Beaver
  • Patent number: 8931073
    Abstract: Packets are routed from at least one internet protocol (IP) address in accordance with border gateway protocol (BGP); while carrying out the routing in accordance with the border gateway protocol (BGP), at least one border gateway protocol (BGP) attribute associated with the at least one internet protocol (IP) address is noted. A firewall policy is applied to the packets from the at least one internet protocol (IP) address based on the at least one border gateway protocol (BGP) attribute associated with the at least one internet protocol (IP) address. Techniques may be implemented, for example, on a router or on a separate firewall device coupled to a router.
    Type: Grant
    Filed: September 20, 2011
    Date of Patent: January 6, 2015
    Assignee: Time Warner Cable Enterprises LLC
    Inventors: Shan Huang, Michael S. Kelsen, Ron da Silva
  • Patent number: 8925065
    Abstract: A computerized system and method for processing network content in accordance with at least one content processing rule. In accordance with the inventive method, the network content is received at a first interface. The inventive system identifies a transmission protocol information of the received network content and uses the identified transmission protocol information to intercept at least a portion of the received network content formatted in accordance with a transmission protocol. The intercepted portion of the network content is redirected to a proxy, which buffers the redirected portion of network content. The buffered network content is scanned in accordance with a scanning criterion and processed in accordance with the at least one content processing rule based on the result of the scanning. The processed portion of network content may be forwarded using the second interface.
    Type: Grant
    Filed: June 17, 2013
    Date of Patent: December 30, 2014
    Assignee: Fortinet, Inc.
    Inventor: Andrew Krywaniuk
  • Patent number: 8925064
    Abstract: A computer comprising: a first virtual machine (VM1) that is minimally configured to host a first firewall, a first network address translator (NAT), and a network interface card (NIC) which is operatively connected a low domain wide area network (WAN); a first virtual switch (VSW1) operatively coupled to the VM1; a second virtual machine (VM2) operatively coupled to the VSW1, wherein the VM2 is configured to process all low domain information; a third virtual machine (VM3) operatively coupled to the VSW1, wherein the VM3 is minimally configured to host a second firewall and a second NAT; a second virtual switch (VSW2) operatively coupled to the VM3; and a fourth virtual machine (VM4) operatively coupled to the VSW2, wherein the VM4 is configured to process all high domain information, such that the computer can operate in both high and low security levels and connect to the WAN with a single NIC.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: December 30, 2014
    Assignee: The United States of America as represented by the Secretary of the Navy
    Inventor: William Dennis Bressler
  • Patent number: 8925063
    Abstract: A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described.
    Type: Grant
    Filed: February 14, 2011
    Date of Patent: December 30, 2014
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Gaston S. Ormazabal, Edward P. Harvey, Jr., James E. Sylvester
  • Patent number: 8925066
    Abstract: A processing device receives an unauthenticated provisioning request from a hardware, wherein the processing device is in a first network zone that is accessible to the hardware resource. The processing device determines whether the hardware resource satisfies one or more provisioning criteria. Responsive to determining that the hardware resource satisfies the one or more provisioning criteria, the processing device forwards the provisioning request to a server residing behind a firewall in a second network zone that is inaccessible to the hardware resource, receives provisioning data from the server by the provisioning proxy, and forwards the provisioning data to the hardware resource.
    Type: Grant
    Filed: November 15, 2012
    Date of Patent: December 30, 2014
    Assignee: Red Hat Israel, Ltd.
    Inventors: Amos Benari, Ohad Levy
  • Publication number: 20140380454
    Abstract: Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to produce a white-list rendering of the data which presents the non-executable elements of the data and, potentially, outputs of the executable elements of the data without the executable elements that could be used to carry a security threat. Some embodiments provide control over which nodes of the DOM tree are included in producing the white-list rendering. Specifically, a configuration file is specified to white-list various nodes from the DOM tree and the white-list rendering is produced by including the DOM tree nodes that are specified in the white-list of the configuration file while excluding those nodes that are not in the white-list. Some embodiments provide a hybrid firewall that executes a set of black-list rules over white-listed nodes of the DOM tree.
    Type: Application
    Filed: November 15, 2013
    Publication date: December 25, 2014
    Applicant: Edgecast Networks, Inc.
    Inventors: Jayson G. Sakata, Jacqueline Mak, Alexander A. Kazerani
  • Publication number: 20140380455
    Abstract: A first agent process is provided in a first computing environment. The first agent process is in communication with a first application. A second agent process is provided in a second computing environment, and the second agent process is in communication with a second application. Both the second agent process and first application run behind a firewall. The first agent process and second agent process communicate with each other across the firewall to have tasks performed by the second application on behalf of the first application.
    Type: Application
    Filed: December 6, 2013
    Publication date: December 25, 2014
    Applicant: TimeTrade Systems, Inc.
    Inventors: Brian Kelly, Kevin Esler
  • Publication number: 20140380456
    Abstract: The present invention includes an integrated data traffic monitoring system monitoring data traffic received from a communication network and destined for a protected network. The monitoring system includes a security appliance and one or more security and monitoring technologies such as hardware and open source and proprietary software products. The security appliance and the security and monitoring technologies may be implemented as separate and distinct modules or combined into a single security appliance. The security and monitoring technologies monitor network data traffic on, or directed to, the protected network. The monitoring system collects data from each of the technologies into an event database and, based on the data, automatically generates rules directing one or more of the technologies to prevent subsequent communications traffic from specific sources from entering the protected network.
    Type: Application
    Filed: September 8, 2014
    Publication date: December 25, 2014
    Inventors: Robert James Demopoulos, David James Fladebo
  • Patent number: 8918889
    Abstract: An information processing apparatus for determining whether or not to transmit a predetermined content to a reception apparatus connected to a network, in accordance with a response time taken to respond to a predetermined command, including: reception means receiving a response to a command; measuring means measuring the response time to the command; authentication means authenticating the reception apparatus; generation means generating authentication data to be inserted into the command; transmission means transmitting the command including predetermined one of the authentication data; storage means storing the authentication data contained in the command and the response data contained in the response; request means requesting the reception apparatus for transmission of the authentication data and the response data; and determination means determining whether the authentication data and the response data transmitted from the reception apparatus, and determining transmission permission/inhibition of a cont
    Type: Grant
    Filed: May 31, 2005
    Date of Patent: December 23, 2014
    Assignee: Sony Corporation
    Inventor: Hisato Shima
  • Patent number: 8918857
    Abstract: A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a server side session, receives a data packet, assigns a central processing unit core from a plurality of central processing unit cores in a multi-core processor of the security gateway to process the data packet, processes the data packet according to security policies, and sends the processed data packet. The proxy network address is selected such that a same central processing unit core is assigned to process data packets from the server side session and the host side session. By assigning central processing unit cores in this manner, higher capable security gateways are provided.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: December 23, 2014
    Assignee: A10 Networks, Inc.
    Inventors: Lee Chen, Ronald Wai Lun Szeto
  • Publication number: 20140373125
    Abstract: A method, device and system for network security protection comprise: according to a received scan task, a network security device performs a security bug scan of the scan task appointed web site, and when a scan result is obtained, transmits the scan result to a network application firewall, so that the network application firewall can configure a individuality security strategy for the web site according to the received scan result. The problem that it can not he implemented complete individuality security configuration of the web site can be solved in this way.
    Type: Application
    Filed: December 11, 2012
    Publication date: December 18, 2014
    Inventors: Mingfeng Huang, Bo Qin, Huaigu Ou, Zhiming Song, Congyu Li, Rong Zhou
  • Patent number: 8914857
    Abstract: Exemplary embodiments of the present disclosure are directed to performing an operation in a computing environment that is prohibited by a security application governing the computing environment. Exemplary embodiments can generate a security bypass environment in a computing environment governed by the security application to provide a bypass to the security application. In exemplary embodiments, a request to perform the operation can be received via the security bypass environment and the operation can be performed through the security bypass environment in response to satisfaction of access control criteria specified for the security bypass environment so that the performance of the operation bypasses the security application.
    Type: Grant
    Filed: November 21, 2012
    Date of Patent: December 16, 2014
    Assignee: Wal-Mart Stores, Inc.
    Inventor: Walter N. Scaife