Packet Filtering Patents (Class 726/13)
  • Patent number: 8863269
    Abstract: In a frontend system in which a plurality of relay devices is mixed, the performance of end to end can be improved and a network can be flexibly established every policy. Specifically, the L7 (layer 7) processing is unified by providing a Front-End Processor (FEP), which have both a firewall (FW) and a load balancer (LB) recognizing a protocol of the L7 (layer 7) level, near a switch of a gateway to an external network.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: October 14, 2014
    Assignee: NEC Corporation
    Inventor: Tsuyoshi Nakashima
  • Patent number: 8862803
    Abstract: An apparatus for mediating communication between a universal serial bus (USB) device and a host computing device is described. In an example, the apparatus includes a USB host interface configured to be connected to a downstream USB device, and a USB device interface configured to be connected to an upstream host computing device. The apparatus also includes a mediation module positioned between the USB host interface and the USB device interface and configured to determine whether the USB device is authorized to communicate with the host computing device.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: October 14, 2014
    Assignee: Architecture Technology Corporation
    Inventors: Judson Powers, Matthew P. Donovan, Frank N. Adelstein, Michael Kentley, Stephen K. Brueckner
  • Publication number: 20140304802
    Abstract: A logic device and method are provided for intercepting a data flow from a network source to a network destination. A data store holds a set of compliance rules and corresponding actions. A packet inspector is configured to inspect the intercepted data flow and identify from the data store a compliance rule associated with the inspected data flow. A packet filter is configured to, when the data flow is identified as being associated with a compliance rule, carry out an action with respect to the data flow corresponding to the compliance rule.
    Type: Application
    Filed: January 27, 2014
    Publication date: October 9, 2014
    Applicant: SOLARFLARE COMMUNICATIONS, INC.
    Inventors: Steve L. Pope, Derek Roberts, David J. Riddoch
  • Publication number: 20140304803
    Abstract: A logic device and method are provided for intercepting a data flow from a network source to a network destination. A data store holds a set of compliance rules and corresponding actions wherein at least one of the set of compliance rules is a temporary compliance rule valid for a predetermined period. A packet inspector is configured to inspect the intercepted data flow and identify from the data store a temporary compliance rule associated with the inspected data flow. A packet filter is configured to when the data flow is identified as being associated with the temporary compliance rule, carry out an action with respect to the data flow corresponding to the temporary compliance rule while the temporary compliance rule is valid.
    Type: Application
    Filed: April 8, 2014
    Publication date: October 9, 2014
    Applicant: SOLARFLARE COMMUNICATIONS, INC.
    Inventors: Steve L. Pope, Derek Roberts, David J. Riddoch
  • Patent number: 8856884
    Abstract: A method and apparatus for managing a transfer of data in a data network identifies data associated with a communication session between a first node and a second node in the data network. Further processing of the communication session occurs when a portion of the communication session meets a criterion and the communication session is permitted to continue when the portion of the communication session does not meet the criterion.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: October 7, 2014
    Assignee: Fortinet, Inc.
    Inventors: Stephen John Bevan, Michael Xie, Hongwei Li, Wenping Luo, Shaohong Wei
  • Patent number: 8856920
    Abstract: A system and method are provided for supporting storage and analysis by law enforcement agency premises equipment of intercepted network traffic. The system and method provide integrity of the intercepted network traffic stored in an archive in accordance with lawful intercept requirements by storing all of the intercepted traffic, both benign and malicious, in the archive in its original form. The system and method furthermore provide for security from any malicious data packets of the archive by separating the malicious packets from the benign packets and forwarding only the benign packets to analysis applications of the law enforcement agency premises equipment.
    Type: Grant
    Filed: September 18, 2006
    Date of Patent: October 7, 2014
    Assignee: Alcatel Lucent
    Inventors: Faud Ahmad Khan, Dmitri Vinokurov, Vinod Kumar Choyi
  • Patent number: 8856914
    Abstract: A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is described. The virtualization platform of the virtual server is enhanced with networking drivers that provide a “fast path” firewall function for pre-configured guest VMs that already have dedicated deep packet inspection security agents installed. A separate security VM is deployed to provide virtual security agents providing deep packet inspection for non pre-configured guest VMs. The network drivers are then configured to intercept the data traffic of these guest VMs and route it through their corresponding virtual security agents, thus providing a “slow-path” for intrusion detection and prevention.
    Type: Grant
    Filed: April 4, 2013
    Date of Patent: October 7, 2014
    Assignee: Trend Micro Incorporated
    Inventor: William Gerald McGee
  • Patent number: 8856926
    Abstract: The invention is directed to techniques for dynamic policy provisioning. A network security device may comprise a memory that stores a first policy that identifies a first set of patterns that correspond to a first set of network attacks and a second policy, and a control unit that applies the first policy to the network traffic to detect the first set of network attacks. The control unit, while applying the first policy, monitors parameters corresponding to one or more resources and dynamically determines whether to apply a second policy to the network traffic based on the parameters. The control unit, based on the dynamic determination, applies the second policy to the network traffic to detect a second set of network attacks and forwards the network traffic based on the application of the second policy. In this manner, the network security device may implement the dynamic policy provisioning techniques.
    Type: Grant
    Filed: May 20, 2009
    Date of Patent: October 7, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Krishna Narayanaswamy, Prashanth Arun
  • Patent number: 8856911
    Abstract: Recommending a security policy to a firewall, includes receiving a request from a firewall for a recommendation as to whether the firewall should allow or block a detected present communication for which the firewall does not have an existing security policy. Information about past blocked and allowed communications at other firewalls on a network is searched to identify past communications that are similar to the present communication. The identified past communications are assigned a respective positive or negative vote. A positive vote indicates a past communication was allowed and a negative vote indicates a past communication was not allowed. A positive recommendation is sent to the requesting firewall to allow the present communication if the positive votes outnumber the negative votes, and a negative recommendation is sent to the requesting firewall to block the present communication if the negative votes outnumber the positive votes.
    Type: Grant
    Filed: July 26, 2012
    Date of Patent: October 7, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Jeffrey Aaron
  • Patent number: 8856910
    Abstract: Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: October 7, 2014
    Assignee: Palo Alto Networks, Inc.
    Inventors: Shadi Rostami-Hesarsorkh, Michael Jacobsen
  • Patent number: 8856915
    Abstract: A negotiation unit, of a logical network control apparatus connected to a LAN, judges settings of processing to be performed on communication data by a network connection apparatus, from properties of an application to be used in communication, and decides parameters to be used for a VPN connection. The VPN connection is performed using the determined parameters.
    Type: Grant
    Filed: January 7, 2009
    Date of Patent: October 7, 2014
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kensuke Yasuma
  • Patent number: 8856913
    Abstract: A system and methods for mitigation slow HTTP, SSL/HTTPS, SMTP, and/or SIP attacks. A protection system monitors each TCP connection between a client and a server. The protection system monitors the header request time and minimum transfer rate for each client and TCP connection. If the client has not completed the data transfer in the minimum time or the data are not transferred at the minimum transfer rate, the protection system determines the connections are potentially a slow attack and resets the connections for the protected devices.
    Type: Grant
    Filed: January 23, 2012
    Date of Patent: October 7, 2014
    Assignee: Arbor Networks, Inc.
    Inventors: Kevin Russell Cline, Chester Kustarz, Christopher R. Hand, Lawrence Bruce Huston, III
  • Publication number: 20140298445
    Abstract: A method and an apparatus for filtering a uniform resource locator (URL). According to the method, a first category corresponding to a URL connection request can be found in a pre-stored category information table; when the first category conforms to a predetermined URL passing through policy, the URL connection request is allowed to pass through; the URL connection request is forwarded to a corresponding server; a second category corresponding to a URL is determined according to web page content returned by the server; if the second category conforms to the predetermined URL passing through policy, the web page content is sent to a client; if the second category does not conform to the predetermined URL passing through policy, the web page content is blocked. A category to which a URL belongs can be determined in real time, and implementing a function of accurate category filtration.
    Type: Application
    Filed: June 17, 2014
    Publication date: October 2, 2014
    Inventors: Wu Jiang, Zhihui Xue, Shiguang Li, Shiguang Wan
  • Patent number: 8848570
    Abstract: A system including a user interface circuit, a classifier, a counter, and an action circuit. The user interface circuit is configured to receive a user input establishing a rule, wherein the rule describes (i) a characteristic of an event, and (ii) an action to initiate in response to a predetermined threshold being met. The classifier is configured to identify, based on the characteristic described in the rule, events that have the characteristic in a network device. The counter is configured to count a number of the events that have the characteristic in the network device as identified by classifier. The action circuit is configured to initiate the action described in the rule in response to the number of the events meeting the predetermined threshold in the rule.
    Type: Grant
    Filed: November 6, 2012
    Date of Patent: September 30, 2014
    Assignee: Marvell International Ltd.
    Inventor: Michael Orr
  • Patent number: 8850592
    Abstract: The content of operations is identified and an alert is generated to an operation having a high risk of information leakage. An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.
    Type: Grant
    Filed: April 2, 2010
    Date of Patent: September 30, 2014
    Assignee: Hitachi, Ltd.
    Inventors: Makoto Kayashima, Shinichi Tsunoo, Hiroshi Nakagoe, Hiromi Isokawa, Norio Suzuki
  • Publication number: 20140289840
    Abstract: Methods and systems for an integrated solution to the rate based denial of service attacks targeting the Session Initiation Protocol are provided. According to one embodiment, header, state, rate and content anomalies are prevented and network policy enforcement is provided for session initiation protocol (SIP). A hardware-based apparatus helps identify SIP rate-thresholds through continuous and adaptive learning. The apparatus can determine SIP header and SIP state anomalies and drop packets containing those anomalies. SIP requests and responses are inspected for known malicious contents using a Content Inspection Engine. The apparatus integrates advantageous solutions to prevent anomalous packets and enables a policy based packet filter for SIP.
    Type: Application
    Filed: March 23, 2013
    Publication date: September 25, 2014
    Applicant: Fortinet, Inc.
    Inventors: Hemant Kumar Jain, Venkata Yallapragada, Bhavin Shah, Radhika Palepu
  • Patent number: 8844018
    Abstract: Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address.
    Type: Grant
    Filed: December 18, 2008
    Date of Patent: September 23, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Thusitha Jayawardena, Gustavo De Los Reyes, Gang Xu
  • Patent number: 8844016
    Abstract: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control.
    Type: Grant
    Filed: August 21, 2012
    Date of Patent: September 23, 2014
    Assignee: PortAuthority Technologies, Inc.
    Inventors: Ariel Peled, Ofir Carny, Lidror Troyansky, Oren Tirosh, Guy Roglit, Galit Gutman
  • Publication number: 20140283004
    Abstract: Aspects of this disclosure relate to filtering network data transfers. In some variations, multiple packets may be received. A determination may be made that a portion of the packets have packet header field values corresponding to a packet filtering rule. Responsive to such a determination, an operator specified by the packet filtering rule may be applied to the portion of packets having the packet header field values corresponding to the packet filtering rule. A further determination may be made that one or more of the portion of the packets have one or more application header field values corresponding to one or more application header field criteria specified by the operator. Responsive to such a determination, at least one packet transformation function specified by the operator may be applied to the one or more of the portion of the packets.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Applicant: CENTRIPETAL NETWORKS, INC.
    Inventor: Sean Moore
  • Patent number: 8839405
    Abstract: A physical layer device includes memory, a memory control module, and a physical layer module. The memory control module is configured to control access to the memory. The physical layer module is configured to store packets in the memory via the memory control module. The physical layer module includes an interface configured to receive the packets from a network device via a network and an interface bus. The interface bus includes at least one of a control module and a regular expression module. The at least one of the control module and the regular expression module is configured to inspect the packets to determine a security level of the packets. A network interface is configured to, based on the security level, provide the packets to a device separate from the physical layer device.
    Type: Grant
    Filed: August 10, 2012
    Date of Patent: September 16, 2014
    Assignee: Marvell World Trade Ltd.
    Inventors: Sehat Sutardja, Tsahi Daniel, Dimitry Melts
  • Patent number: 8839407
    Abstract: Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: September 16, 2014
    Assignee: Microsoft Corporation
    Inventors: David Abzarian, Salahuddin Khan, Eran Yariv, Gerardo Diaz Cuellar
  • Patent number: 8839440
    Abstract: Provided are an apparatus and method for forecasting the security threat level of a network. The apparatus includes: a security data collection unit for collecting traffic data and intrusion detection data transmitted from an external network to a managed network; a malicious code data collection unit for collecting malicious code data transmitted from a security enterprise network; a time series data transformation unit for transforming the data collected by the security data collection unit into time series data; a network traffic analysis unit for analyzing traffic distribution of the managed network using the data collected by the security data collection unit; and a security forecast engine for forecasting security data of the managed network using the time series data obtained by the time data transformation unit, the data analyzed by the network traffic analysis unit, and the data collected by the malicious code data collection unit.
    Type: Grant
    Filed: April 15, 2008
    Date of Patent: September 16, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: JooBeom Yun, Seung-Hyun Paek, InSung Park, Eun Young Lee, Ki Wook Sohn
  • Patent number: 8839424
    Abstract: A cross-site request forgeries (CSRF) protection system helps protect against cross-site request forgeries attacks. A CSRF protector is arranged to receive a signal from a service provider that notifies a browser running on a potential victim consumer machine to selectively permit and/or deny cross-site requests in accordance with a set of one or more security policies. The policies can be selected and applied on a domain name basis, IP address basis, trusted zone basis, and combinations thereof. The CSRF protector can also provide a context of the event that triggers a request that contains a cross-site request, where the context provides indicia of circumstances that indicate a likelihood of a cross-site request forgery is being attempted.
    Type: Grant
    Filed: November 15, 2012
    Date of Patent: September 16, 2014
    Inventor: Robert Hansen
  • Patent number: 8839406
    Abstract: An attack blocking control method uses an access control list (ACL). The method includes investigating the ACL if a packet is input, and checking whether or not the packet is registered in the ACL, comparing a current time count value with a blocking time of the packet if the packet is determined to be registered in the ACL. Further, the method includes increasing the number of blocking times of the packet by 1 if the current time count value is smaller than or equal to the blocking time. Further, the method includes automatically renewing the blocking time, and removing registration information for the packet from the ACL if the current time count value is greater than the blocking time.
    Type: Grant
    Filed: November 12, 2012
    Date of Patent: September 16, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventor: Dae Won Kim
  • Patent number: 8838668
    Abstract: In a system and method for performing message-based business processes among a plurality of applications, a gateway message is received at the gateway, the gateway message including a gateway message header and a payload, the gateway message header including a routing slip block providing a template of a complex transaction in which the gateway message is participating, the complex transaction comprising one or more simple transactions performed in a defined order. A copy of the received gateway message is persisted in a data store in the gateway. The gateway executes at least one simple transaction in accordance with the template in the routing slip in the received gateway message and persists a copy of the gateway message, after executing the at least one simple transaction, in the data store.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: September 16, 2014
    Assignee: Firestar Software, Inc.
    Inventors: Mark Eisner, Gabriel Oancea
  • Patent number: 8839427
    Abstract: A mitigation service may be used to mitigate a network attack in a network including a group of mitigation devices. Datagrams, intended for a customer that is subject of a network attack, may be received by at least one of the mitigation devices based on an anycast address associated with the mitigation devices. Each of the mitigation devices is addressable via the anycast address. The received datagrams may be processed to remove malicious datagrams and leave legitimate datagrams. The legitimate datagrams may be forwarded to the customer via a tunnel configured between an address associated with the customer and the anycast address associated with the mitigation devices.
    Type: Grant
    Filed: April 13, 2005
    Date of Patent: September 16, 2014
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Christopher Morrow, James Gill
  • Publication number: 20140259145
    Abstract: An apparatus discerns clients by the requests made to a web application server through a web application firewall, which injects client side code into the responses with a randomized challenge that needs a unique answer to be returned in the cookie. The client side code generates cookies, which identify a browser to the web application server, or the web application firewall in subsequent requests if made by a normally configured browser and a fail threshold is checked for subsequent requests originating from such a browser. Each browser is thus fingerprinted and if the expected answer failures exceed a threshold, the client is marked as suspicious and a subsequent Turing test is enforced to these suspicious clients, failing which, a subsequent defined action is taken.
    Type: Application
    Filed: July 31, 2013
    Publication date: September 11, 2014
    Inventors: Neeraj Khandelwal, Chandra Sekar Inguva Venkata, Anirudha Kamatgi, Chandradip Bhattacharya
  • Publication number: 20140259146
    Abstract: Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data packet, determining a single flow record associated with the packet and extracting flow instructions for two or more devices from the single flow record.
    Type: Application
    Filed: March 31, 2014
    Publication date: September 11, 2014
    Applicant: JUNIPER NETWORKS, INC.
    Inventor: Nir Zuk
  • Patent number: 8832818
    Abstract: A multi-tenant data center environment includes a dedicated domain having at least one dedicated server associated with a client and a cloud domain having at least one cloud server associated with the client. The cloud server may have a public interface to a public network and a private interface to a private network. In turn, a network device is coupled between the dedicated domain and the public network, and is further coupled to the cloud server via the private network. A controller of the data center may be used to determine presence of the cloud server, and configure the network device to allow certain traffic to pass directly to the dedicated domain, while preventing other traffic from this direct path, based on access controls of the network device.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: September 9, 2014
    Assignee: Rackspace US, Inc.
    Inventor: Christopher Kuehl
  • Patent number: 8832451
    Abstract: A source authentication method and apparatus according to the present invention are disclosed. The source authentication method is performed with respect to a transmission packet on a message transmission side, and includes generating a first hash value to which a first hash function is applied using a message to be included in a next packet and a key value, and generating the transmission packet including the first hash value, wherein the key value is one of at least one key value generated in advance by applying a second hash function. Meanwhile, according to the present invention, effective low-cost multicast authentication may be performed by reducing a variety of loads such as buffer management, key calculation costs, and the like.
    Type: Grant
    Filed: August 23, 2012
    Date of Patent: September 9, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Bo Heung Chung, Jeong Nyeo Kim
  • Patent number: 8832820
    Abstract: A method and associated systems for enhanced isolation and security hardening among multi-tenant workloads. An agent running on a processor of a networked computer system on which multicast and broadcast communications have been disabled captures an address-resolution query message from a querying tenant, converts the query message to a unicast message, and forwards the converted unicast query message to a switch. The switch forwards the converted unicast message to a redirection device and in response receives an address-resolution response message only after the redirection device verifies that the query and response messages comply with security policies. The switch forwards the address-resolution response to the querying tenant in conformance with security policies.
    Type: Grant
    Filed: June 25, 2012
    Date of Patent: September 9, 2014
    Assignee: International Business Machines Corporation
    Inventors: Saurabh Barjatiya, Kanaka P. Saripalli
  • Patent number: 8830997
    Abstract: A network device including a processor having an internet protocol (IP) address, and a processor port configured to communicate exclusively with the processor. The network device also includes a plurality of network ports configured to communicate with network nodes external to the network device. In addition, the network device includes a forwarding engine configured to selectively transfer packets (i) among the plurality of network ports, and (ii) between the processor port and the plurality of network ports; receive a broadcast packet from one of the plurality of network ports, the broadcast packet including a target IP address; and forward the broadcast packet to the processor, via the processor port, only when both (i) the broadcast packet is a control packet, and (ii) the target IP address of the broadcast packet matches the IP address of processor.
    Type: Grant
    Filed: November 1, 2010
    Date of Patent: September 9, 2014
    Assignees: Marvell International Ltd., Marvell Israel (M.I.S.L) Ltd.
    Inventors: Nafea Bishara, Tsahi Daniel, David Melman, Nir Arad
  • Patent number: 8832283
    Abstract: Methods and systems for using and providing trustworthy DNS resolutions are provided. A method for using trustworthy DNS resolutions may include obtaining a DNS resolution listing for a domain name and validating the listing's plausibility using a plausible range list. The method may also include selecting a DNS resolution from the DNS resolution listing based on a requested host associated with the domain name. The method may further include initiating a connection to the host using the selected DNS resolution. A method for providing trustworthy DNS resolutions may include obtaining a plurality of potential DNS resolutions for a domain name. The method may also include generating a DNS resolution listing for a domain name and providing the DNS resolution listing. A system may include a DNS resolution selection module and a connection module. Another system may include a DNS resolution inquiry module and a DNS resolution listing provision module.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: September 9, 2014
    Assignee: Google Inc.
    Inventors: James Roskind, Mike Belshe
  • Publication number: 20140250520
    Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of
    Type: Application
    Filed: May 15, 2014
    Publication date: September 4, 2014
    Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
  • Patent number: 8826451
    Abstract: In accordance with embodiments, there are provided methods and systems for providing communication authentication between cloud applications and on-premise applications. A method of embodiments includes receiving, from a cloud application at a cloud computing device, a first message at an application server of a server computing system, and parsing, at the application server, the first message to determine first identification information contained within the first message. The method further includes authenticating, at the application server, the first message by verifying the first identification information, and forwarding the first authenticated message to an on-premise application at a remote computing device.
    Type: Grant
    Filed: December 20, 2010
    Date of Patent: September 2, 2014
    Assignee: salesforce.com, inc.
    Inventor: Michael David Blubaugh
  • Patent number: 8826414
    Abstract: System-on-chip (SoC) and application-specific integrated circuit (ASIC)-based apparatus for detecting malicious code in portable terminal is provided.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: September 2, 2014
    Assignee: Samsung SDS Co., Ltd.
    Inventor: In Seon Yoo
  • Patent number: 8826413
    Abstract: Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID of the WID to specify whether traffic is allowed to or from the ESSID. For example, in one implementation of such a firewall rule, packets that are required to be sent out on all wired ports can be blocked from being flooded out on WLANs (e.g., the packet is allowed to pass only to the wired ports). A method and system are provided for preventing a malicious wireless client device (WCD) that is transmitting undesirable traffic from using RF resources by deauthenticating the malicious WCD to remove it from the WLAN and blacklisting it to prevent it from rejoining the WLAN for a time period. Method and systems are also provided for either “on-demand” and/or predicatively communicating state information regarding an existing firewall session.
    Type: Grant
    Filed: December 30, 2009
    Date of Patent: September 2, 2014
    Assignee: Motorla Solutions, Inc.
    Inventors: Rajesh Vijayakumar, Nicolas S. Dade, Jacob Thomas, Anurag Verma
  • Patent number: 8826425
    Abstract: A system and method for discovering security classifications of network areas includes representing actually allowed network flows and flows permitted by a security policy in a format that enables comparison. The actually allowed network flows and the security policy are provided in a networked computing environment including network areas, wherein each network area is a collection of one or more computing and network devices, and enterprise security policy defines security requirements for security classifications. An assignment of security classifications to network areas is determined by comparing the actually allowed network flows with the flows permitted by the security policy.
    Type: Grant
    Filed: December 1, 2009
    Date of Patent: September 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Birgit Monika Pfitzmann, Harigovind Venkatraj Ramasamy, Cheng-Lin Tsao
  • Patent number: 8819410
    Abstract: Methods and apparatuses for private electronic information exchange are described herein. In one embodiment, when electronic information is received to be delivered to a recipient, the electronic information is transmitted over an electronic network with a private routing address. The private routing address is routable within a private domain, which is a subset of the electronic network. Other methods and apparatuses are also described.
    Type: Grant
    Filed: September 7, 2012
    Date of Patent: August 26, 2014
    Assignee: Privato Security, LLC
    Inventor: George C. Sidman
  • Patent number: 8817784
    Abstract: Roughly described, incoming data packets are delivered by the NIC directly to at least two user level endpoints. In an aspect, only filters that cannot be ambiguous are created in the NIC. In another aspect, the NIC maintains a filter table supporting direct delivery of incoming unicast and multicast data packets to one user level endpoint. Additional requests to join the same multicast group cause replacement of the NIC filter with one in the kernel. In another aspect, a NIC has limited capacity to maintain multicast group memberships. In response to a new multicast filter request, the kernel establishes it in the NIC only if the NIC still has sufficient capacity; otherwise it is established in the kernel.
    Type: Grant
    Filed: January 10, 2012
    Date of Patent: August 26, 2014
    Assignee: Solarflare Communications, Inc.
    Inventors: David J. Riddoch, Martin W. Porter, Steven L. Pope
  • Patent number: 8819821
    Abstract: A low rate DoS attack detection algorithm is used, which relies on a characteristic of the low rate DoS attack in introducing high rate traffic for short periods, and then uses a proactive test based differentiation technique to filter the attack packets. The proactive test defends against DDoS attacks and low rate DoS attacks which tend to ignore the normal operation of network protocols, but it also differentiates legitimate traffic from low rate DoS attack traffic instigated by botnets. It leverages on the conformity of legitimate flows, which obey the network protocols. It also differentiates legitimate connections by checking their responses to the proactive tests which include puzzles for distinguishing botnets from human users.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: August 26, 2014
    Assignee: New Jersey Institute of Technology
    Inventors: Nirwan Ansari, Amey Bhaskar Shevtekar
  • Patent number: 8819794
    Abstract: Online and on-premise applications identify trusted authentication providers. The applications are configured with a list of trusted issuers of authentication credentials. When an application receives a request requiring authentication, the application returns a 401 response that includes the trusted issuer list. The requesting application compares the trusted issuer list from the 401 response to its own list of authentication providers. If there is a match between the two lists, then the requesting application creates a self-issued token for the authentication provider. The authentication provider uses the self-issued token to generate an authentication token for the requesting application. The requesting application may also directly create a token for a target partner application, without an authentication provider, if there is a direct trust between the two applications.
    Type: Grant
    Filed: January 19, 2012
    Date of Patent: August 26, 2014
    Assignee: Microsoft Corporation
    Inventors: Vadim Eydelman, Brian Kress, Matthias Leibmann, Moustafa Noureddine, Lei Yu, Haibo Luo
  • Patent number: 8819807
    Abstract: Provided are a traffic analysis apparatus and method. The traffic analysis apparatus includes an analysis unit and a policy application unit. The analysis unit determines whether a network packet between at least one client and a server is a packet of a pre-registered SAP session, and, when the network packet is not the packet of the pre-registered SAP session, the analysis unit determines whether the network packet is a packet of a new SAP session. The policy application unit determines whether the network packet includes predetermined monitoring information when the network packet is the packet of the pre-registered SAP session or new SAP session and, when the network packet includes the monitoring information, the policy application unit performs a response action conforming to a predetermined security policy.
    Type: Grant
    Filed: January 4, 2013
    Date of Patent: August 26, 2014
    Assignee: Somansa Co., Ltd
    Inventors: Seung Tae Paek, Yong Pil Hur, Tae Wan Kim, Sang Man Lee
  • Patent number: 8813216
    Abstract: A method and system for providing security to a Network Job Entry (NJE) network. A first NJE node and a third NJE node are connected by a second NJE node. The second NJE node conducts a security check of NJE packets traveling between the first and third NJE nodes. The security check performed by the second NJE node includes checking the userid of the person or job that sent the NJE packet, as well as the NJE data type. The NJE data type may be classified by the type of operation being performed, such as a batch job, sysout, command, message, as well as what application is being used. In one preferred embodiment, the security check includes checking the security level of the source of the data being transferred, such as a sensitive application. The security check can be based on the size of the data packet, such that excessively large data packets from a particular user are not permitted to be transmitted outside a secure NJE network.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: August 19, 2014
    Assignee: International Business Machines Corporation
    Inventors: William Joseph Bloemeke, Reid Anthony Cashion
  • Patent number: 8813113
    Abstract: A method for adding a conditional access system to a digital audio/video transmission system that delivers content from a source to a security device associated with an audio/video processing device by providing at the broadcast source a datastream having system information data including an unused identifier reserved for security data associated with the additional conditional access system.
    Type: Grant
    Filed: November 2, 2000
    Date of Patent: August 19, 2014
    Assignee: Thomson Licensing
    Inventors: David Jay Duffield, Jean-Louis Yves Diascorn, Ahmet Mursit Eskicioglu
  • Patent number: 8806605
    Abstract: A method may include determining one or more rules and communicating the one or more rules to a firewall, where the firewall receives a data unit and determines, based on the one or more rules, whether to forward the data unit to a destination address; receiving a redirection of a device from the firewall when the firewall determines not to forward the data unit to the destination address; receiving an indication that the firewall did not forward the data unit to the destination address; and determining a new rule to allow the firewall to forward the data unit to the destination address and communicating the new rule to the firewall; and redirecting the device to the destination address.
    Type: Grant
    Filed: January 11, 2008
    Date of Patent: August 12, 2014
    Assignee: Juniper Networks, Inc.
    Inventor: Roger A. Chickering
  • Patent number: 8806625
    Abstract: A computer-implemented method for performing security scans may include 1) generating a first hash of a first file, 2) performing a first security scan on the first file, 3) storing the first hash to indicate a result of the first security scan of the first file, 4) identifying a second file and generating a second hash of the second file, 5) determining that the second hash of the second file is equivalent to the first hash of the first file and, in response, determining that the result of the first security scan of the first file applies to the second file, 6) identifying a third file and determining that the third file is volatile, and 7) performing a second security scan on the third file instead of generating a third hash of the third file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 2, 2012
    Date of Patent: August 12, 2014
    Assignee: Symantec Corporation
    Inventor: Henry Berger
  • Patent number: 8806650
    Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.
    Type: Grant
    Filed: July 23, 2013
    Date of Patent: August 12, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
  • Patent number: 8806606
    Abstract: A cloud center infrastructure system may include a service aggregator connected directly to a provider network. The service aggregator may be configured to receive, via the provider network, a data unit from a customer device, associated with a customer; identify a first device, associated with a first traffic processing service, based on a sequence of traffic processing services associated with the customer; and send the data unit to the first device, wherein the first device is located in a cloud services center, and wherein the first device is connected to the service aggregator over a Layer 2 connection.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: August 12, 2014
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Syed A. Ahmad, Juzer T. Kopti
  • Patent number: 8804729
    Abstract: A method of detecting address spoofing includes receiving an ARP packet at a network device. The ARP packet includes a first address associated with a first network layer and a second address associated with a second network layer. The method also includes accessing a first memory searchable by the first address to obtain a memory reference and retrieving a third address associated with the second network layer from a second memory using the memory reference. The method further includes comparing the second address with the third address and detecting address spoofing if a match is not present between the second address and the third address.
    Type: Grant
    Filed: February 16, 2006
    Date of Patent: August 12, 2014
    Assignee: Marvell Israel (M.I.S.L.) Ltd.
    Inventors: David Melman, Tsahi Daniel