Packet Filtering Patents (Class 726/13)
-
Patent number: 8863269Abstract: In a frontend system in which a plurality of relay devices is mixed, the performance of end to end can be improved and a network can be flexibly established every policy. Specifically, the L7 (layer 7) processing is unified by providing a Front-End Processor (FEP), which have both a firewall (FW) and a load balancer (LB) recognizing a protocol of the L7 (layer 7) level, near a switch of a gateway to an external network.Type: GrantFiled: January 21, 2011Date of Patent: October 14, 2014Assignee: NEC CorporationInventor: Tsuyoshi Nakashima
-
Patent number: 8862803Abstract: An apparatus for mediating communication between a universal serial bus (USB) device and a host computing device is described. In an example, the apparatus includes a USB host interface configured to be connected to a downstream USB device, and a USB device interface configured to be connected to an upstream host computing device. The apparatus also includes a mediation module positioned between the USB host interface and the USB device interface and configured to determine whether the USB device is authorized to communicate with the host computing device.Type: GrantFiled: May 31, 2011Date of Patent: October 14, 2014Assignee: Architecture Technology CorporationInventors: Judson Powers, Matthew P. Donovan, Frank N. Adelstein, Michael Kentley, Stephen K. Brueckner
-
Publication number: 20140304802Abstract: A logic device and method are provided for intercepting a data flow from a network source to a network destination. A data store holds a set of compliance rules and corresponding actions. A packet inspector is configured to inspect the intercepted data flow and identify from the data store a compliance rule associated with the inspected data flow. A packet filter is configured to, when the data flow is identified as being associated with a compliance rule, carry out an action with respect to the data flow corresponding to the compliance rule.Type: ApplicationFiled: January 27, 2014Publication date: October 9, 2014Applicant: SOLARFLARE COMMUNICATIONS, INC.Inventors: Steve L. Pope, Derek Roberts, David J. Riddoch
-
Publication number: 20140304803Abstract: A logic device and method are provided for intercepting a data flow from a network source to a network destination. A data store holds a set of compliance rules and corresponding actions wherein at least one of the set of compliance rules is a temporary compliance rule valid for a predetermined period. A packet inspector is configured to inspect the intercepted data flow and identify from the data store a temporary compliance rule associated with the inspected data flow. A packet filter is configured to when the data flow is identified as being associated with the temporary compliance rule, carry out an action with respect to the data flow corresponding to the temporary compliance rule while the temporary compliance rule is valid.Type: ApplicationFiled: April 8, 2014Publication date: October 9, 2014Applicant: SOLARFLARE COMMUNICATIONS, INC.Inventors: Steve L. Pope, Derek Roberts, David J. Riddoch
-
Patent number: 8856884Abstract: A method and apparatus for managing a transfer of data in a data network identifies data associated with a communication session between a first node and a second node in the data network. Further processing of the communication session occurs when a portion of the communication session meets a criterion and the communication session is permitted to continue when the portion of the communication session does not meet the criterion.Type: GrantFiled: September 30, 2011Date of Patent: October 7, 2014Assignee: Fortinet, Inc.Inventors: Stephen John Bevan, Michael Xie, Hongwei Li, Wenping Luo, Shaohong Wei
-
Patent number: 8856920Abstract: A system and method are provided for supporting storage and analysis by law enforcement agency premises equipment of intercepted network traffic. The system and method provide integrity of the intercepted network traffic stored in an archive in accordance with lawful intercept requirements by storing all of the intercepted traffic, both benign and malicious, in the archive in its original form. The system and method furthermore provide for security from any malicious data packets of the archive by separating the malicious packets from the benign packets and forwarding only the benign packets to analysis applications of the law enforcement agency premises equipment.Type: GrantFiled: September 18, 2006Date of Patent: October 7, 2014Assignee: Alcatel LucentInventors: Faud Ahmad Khan, Dmitri Vinokurov, Vinod Kumar Choyi
-
Patent number: 8856914Abstract: A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is described. The virtualization platform of the virtual server is enhanced with networking drivers that provide a “fast path” firewall function for pre-configured guest VMs that already have dedicated deep packet inspection security agents installed. A separate security VM is deployed to provide virtual security agents providing deep packet inspection for non pre-configured guest VMs. The network drivers are then configured to intercept the data traffic of these guest VMs and route it through their corresponding virtual security agents, thus providing a “slow-path” for intrusion detection and prevention.Type: GrantFiled: April 4, 2013Date of Patent: October 7, 2014Assignee: Trend Micro IncorporatedInventor: William Gerald McGee
-
Patent number: 8856926Abstract: The invention is directed to techniques for dynamic policy provisioning. A network security device may comprise a memory that stores a first policy that identifies a first set of patterns that correspond to a first set of network attacks and a second policy, and a control unit that applies the first policy to the network traffic to detect the first set of network attacks. The control unit, while applying the first policy, monitors parameters corresponding to one or more resources and dynamically determines whether to apply a second policy to the network traffic based on the parameters. The control unit, based on the dynamic determination, applies the second policy to the network traffic to detect a second set of network attacks and forwards the network traffic based on the application of the second policy. In this manner, the network security device may implement the dynamic policy provisioning techniques.Type: GrantFiled: May 20, 2009Date of Patent: October 7, 2014Assignee: Juniper Networks, Inc.Inventors: Krishna Narayanaswamy, Prashanth Arun
-
Patent number: 8856911Abstract: Recommending a security policy to a firewall, includes receiving a request from a firewall for a recommendation as to whether the firewall should allow or block a detected present communication for which the firewall does not have an existing security policy. Information about past blocked and allowed communications at other firewalls on a network is searched to identify past communications that are similar to the present communication. The identified past communications are assigned a respective positive or negative vote. A positive vote indicates a past communication was allowed and a negative vote indicates a past communication was not allowed. A positive recommendation is sent to the requesting firewall to allow the present communication if the positive votes outnumber the negative votes, and a negative recommendation is sent to the requesting firewall to block the present communication if the negative votes outnumber the positive votes.Type: GrantFiled: July 26, 2012Date of Patent: October 7, 2014Assignee: AT&T Intellectual Property I, L.P.Inventor: Jeffrey Aaron
-
Patent number: 8856910Abstract: Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server.Type: GrantFiled: August 31, 2011Date of Patent: October 7, 2014Assignee: Palo Alto Networks, Inc.Inventors: Shadi Rostami-Hesarsorkh, Michael Jacobsen
-
Patent number: 8856915Abstract: A negotiation unit, of a logical network control apparatus connected to a LAN, judges settings of processing to be performed on communication data by a network connection apparatus, from properties of an application to be used in communication, and decides parameters to be used for a VPN connection. The VPN connection is performed using the determined parameters.Type: GrantFiled: January 7, 2009Date of Patent: October 7, 2014Assignee: Canon Kabushiki KaishaInventor: Kensuke Yasuma
-
Patent number: 8856913Abstract: A system and methods for mitigation slow HTTP, SSL/HTTPS, SMTP, and/or SIP attacks. A protection system monitors each TCP connection between a client and a server. The protection system monitors the header request time and minimum transfer rate for each client and TCP connection. If the client has not completed the data transfer in the minimum time or the data are not transferred at the minimum transfer rate, the protection system determines the connections are potentially a slow attack and resets the connections for the protected devices.Type: GrantFiled: January 23, 2012Date of Patent: October 7, 2014Assignee: Arbor Networks, Inc.Inventors: Kevin Russell Cline, Chester Kustarz, Christopher R. Hand, Lawrence Bruce Huston, III
-
Publication number: 20140298445Abstract: A method and an apparatus for filtering a uniform resource locator (URL). According to the method, a first category corresponding to a URL connection request can be found in a pre-stored category information table; when the first category conforms to a predetermined URL passing through policy, the URL connection request is allowed to pass through; the URL connection request is forwarded to a corresponding server; a second category corresponding to a URL is determined according to web page content returned by the server; if the second category conforms to the predetermined URL passing through policy, the web page content is sent to a client; if the second category does not conform to the predetermined URL passing through policy, the web page content is blocked. A category to which a URL belongs can be determined in real time, and implementing a function of accurate category filtration.Type: ApplicationFiled: June 17, 2014Publication date: October 2, 2014Inventors: Wu Jiang, Zhihui Xue, Shiguang Li, Shiguang Wan
-
Patent number: 8848570Abstract: A system including a user interface circuit, a classifier, a counter, and an action circuit. The user interface circuit is configured to receive a user input establishing a rule, wherein the rule describes (i) a characteristic of an event, and (ii) an action to initiate in response to a predetermined threshold being met. The classifier is configured to identify, based on the characteristic described in the rule, events that have the characteristic in a network device. The counter is configured to count a number of the events that have the characteristic in the network device as identified by classifier. The action circuit is configured to initiate the action described in the rule in response to the number of the events meeting the predetermined threshold in the rule.Type: GrantFiled: November 6, 2012Date of Patent: September 30, 2014Assignee: Marvell International Ltd.Inventor: Michael Orr
-
Patent number: 8850592Abstract: The content of operations is identified and an alert is generated to an operation having a high risk of information leakage. An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.Type: GrantFiled: April 2, 2010Date of Patent: September 30, 2014Assignee: Hitachi, Ltd.Inventors: Makoto Kayashima, Shinichi Tsunoo, Hiroshi Nakagoe, Hiromi Isokawa, Norio Suzuki
-
Publication number: 20140289840Abstract: Methods and systems for an integrated solution to the rate based denial of service attacks targeting the Session Initiation Protocol are provided. According to one embodiment, header, state, rate and content anomalies are prevented and network policy enforcement is provided for session initiation protocol (SIP). A hardware-based apparatus helps identify SIP rate-thresholds through continuous and adaptive learning. The apparatus can determine SIP header and SIP state anomalies and drop packets containing those anomalies. SIP requests and responses are inspected for known malicious contents using a Content Inspection Engine. The apparatus integrates advantageous solutions to prevent anomalous packets and enables a policy based packet filter for SIP.Type: ApplicationFiled: March 23, 2013Publication date: September 25, 2014Applicant: Fortinet, Inc.Inventors: Hemant Kumar Jain, Venkata Yallapragada, Bhavin Shah, Radhika Palepu
-
Patent number: 8844018Abstract: Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address.Type: GrantFiled: December 18, 2008Date of Patent: September 23, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Thusitha Jayawardena, Gustavo De Los Reyes, Gang Xu
-
Patent number: 8844016Abstract: A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control.Type: GrantFiled: August 21, 2012Date of Patent: September 23, 2014Assignee: PortAuthority Technologies, Inc.Inventors: Ariel Peled, Ofir Carny, Lidror Troyansky, Oren Tirosh, Guy Roglit, Galit Gutman
-
Publication number: 20140283004Abstract: Aspects of this disclosure relate to filtering network data transfers. In some variations, multiple packets may be received. A determination may be made that a portion of the packets have packet header field values corresponding to a packet filtering rule. Responsive to such a determination, an operator specified by the packet filtering rule may be applied to the portion of packets having the packet header field values corresponding to the packet filtering rule. A further determination may be made that one or more of the portion of the packets have one or more application header field values corresponding to one or more application header field criteria specified by the operator. Responsive to such a determination, at least one packet transformation function specified by the operator may be applied to the one or more of the portion of the packets.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: CENTRIPETAL NETWORKS, INC.Inventor: Sean Moore
-
Patent number: 8839405Abstract: A physical layer device includes memory, a memory control module, and a physical layer module. The memory control module is configured to control access to the memory. The physical layer module is configured to store packets in the memory via the memory control module. The physical layer module includes an interface configured to receive the packets from a network device via a network and an interface bus. The interface bus includes at least one of a control module and a regular expression module. The at least one of the control module and the regular expression module is configured to inspect the packets to determine a security level of the packets. A network interface is configured to, based on the security level, provide the packets to a device separate from the physical layer device.Type: GrantFiled: August 10, 2012Date of Patent: September 16, 2014Assignee: Marvell World Trade Ltd.Inventors: Sehat Sutardja, Tsahi Daniel, Dimitry Melts
-
Patent number: 8839407Abstract: Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.Type: GrantFiled: November 30, 2012Date of Patent: September 16, 2014Assignee: Microsoft CorporationInventors: David Abzarian, Salahuddin Khan, Eran Yariv, Gerardo Diaz Cuellar
-
Patent number: 8839440Abstract: Provided are an apparatus and method for forecasting the security threat level of a network. The apparatus includes: a security data collection unit for collecting traffic data and intrusion detection data transmitted from an external network to a managed network; a malicious code data collection unit for collecting malicious code data transmitted from a security enterprise network; a time series data transformation unit for transforming the data collected by the security data collection unit into time series data; a network traffic analysis unit for analyzing traffic distribution of the managed network using the data collected by the security data collection unit; and a security forecast engine for forecasting security data of the managed network using the time series data obtained by the time data transformation unit, the data analyzed by the network traffic analysis unit, and the data collected by the malicious code data collection unit.Type: GrantFiled: April 15, 2008Date of Patent: September 16, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: JooBeom Yun, Seung-Hyun Paek, InSung Park, Eun Young Lee, Ki Wook Sohn
-
Patent number: 8839424Abstract: A cross-site request forgeries (CSRF) protection system helps protect against cross-site request forgeries attacks. A CSRF protector is arranged to receive a signal from a service provider that notifies a browser running on a potential victim consumer machine to selectively permit and/or deny cross-site requests in accordance with a set of one or more security policies. The policies can be selected and applied on a domain name basis, IP address basis, trusted zone basis, and combinations thereof. The CSRF protector can also provide a context of the event that triggers a request that contains a cross-site request, where the context provides indicia of circumstances that indicate a likelihood of a cross-site request forgery is being attempted.Type: GrantFiled: November 15, 2012Date of Patent: September 16, 2014Inventor: Robert Hansen
-
Patent number: 8839406Abstract: An attack blocking control method uses an access control list (ACL). The method includes investigating the ACL if a packet is input, and checking whether or not the packet is registered in the ACL, comparing a current time count value with a blocking time of the packet if the packet is determined to be registered in the ACL. Further, the method includes increasing the number of blocking times of the packet by 1 if the current time count value is smaller than or equal to the blocking time. Further, the method includes automatically renewing the blocking time, and removing registration information for the packet from the ACL if the current time count value is greater than the blocking time.Type: GrantFiled: November 12, 2012Date of Patent: September 16, 2014Assignee: Electronics and Telecommunications Research InstituteInventor: Dae Won Kim
-
Patent number: 8838668Abstract: In a system and method for performing message-based business processes among a plurality of applications, a gateway message is received at the gateway, the gateway message including a gateway message header and a payload, the gateway message header including a routing slip block providing a template of a complex transaction in which the gateway message is participating, the complex transaction comprising one or more simple transactions performed in a defined order. A copy of the received gateway message is persisted in a data store in the gateway. The gateway executes at least one simple transaction in accordance with the template in the routing slip in the received gateway message and persists a copy of the gateway message, after executing the at least one simple transaction, in the data store.Type: GrantFiled: December 1, 2006Date of Patent: September 16, 2014Assignee: Firestar Software, Inc.Inventors: Mark Eisner, Gabriel Oancea
-
Patent number: 8839427Abstract: A mitigation service may be used to mitigate a network attack in a network including a group of mitigation devices. Datagrams, intended for a customer that is subject of a network attack, may be received by at least one of the mitigation devices based on an anycast address associated with the mitigation devices. Each of the mitigation devices is addressable via the anycast address. The received datagrams may be processed to remove malicious datagrams and leave legitimate datagrams. The legitimate datagrams may be forwarded to the customer via a tunnel configured between an address associated with the customer and the anycast address associated with the mitigation devices.Type: GrantFiled: April 13, 2005Date of Patent: September 16, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: Christopher Morrow, James Gill
-
Publication number: 20140259145Abstract: An apparatus discerns clients by the requests made to a web application server through a web application firewall, which injects client side code into the responses with a randomized challenge that needs a unique answer to be returned in the cookie. The client side code generates cookies, which identify a browser to the web application server, or the web application firewall in subsequent requests if made by a normally configured browser and a fail threshold is checked for subsequent requests originating from such a browser. Each browser is thus fingerprinted and if the expected answer failures exceed a threshold, the client is marked as suspicious and a subsequent Turing test is enforced to these suspicious clients, failing which, a subsequent defined action is taken.Type: ApplicationFiled: July 31, 2013Publication date: September 11, 2014Inventors: Neeraj Khandelwal, Chandra Sekar Inguva Venkata, Anirudha Kamatgi, Chandradip Bhattacharya
-
Publication number: 20140259146Abstract: Methods, computer program products and apparatus for processing data packets are described. Methods include receiving the data packet, examining the data packet, determining a single flow record associated with the packet and extracting flow instructions for two or more devices from the single flow record.Type: ApplicationFiled: March 31, 2014Publication date: September 11, 2014Applicant: JUNIPER NETWORKS, INC.Inventor: Nir Zuk
-
Patent number: 8832818Abstract: A multi-tenant data center environment includes a dedicated domain having at least one dedicated server associated with a client and a cloud domain having at least one cloud server associated with the client. The cloud server may have a public interface to a public network and a private interface to a private network. In turn, a network device is coupled between the dedicated domain and the public network, and is further coupled to the cloud server via the private network. A controller of the data center may be used to determine presence of the cloud server, and configure the network device to allow certain traffic to pass directly to the dedicated domain, while preventing other traffic from this direct path, based on access controls of the network device.Type: GrantFiled: February 28, 2011Date of Patent: September 9, 2014Assignee: Rackspace US, Inc.Inventor: Christopher Kuehl
-
Patent number: 8832451Abstract: A source authentication method and apparatus according to the present invention are disclosed. The source authentication method is performed with respect to a transmission packet on a message transmission side, and includes generating a first hash value to which a first hash function is applied using a message to be included in a next packet and a key value, and generating the transmission packet including the first hash value, wherein the key value is one of at least one key value generated in advance by applying a second hash function. Meanwhile, according to the present invention, effective low-cost multicast authentication may be performed by reducing a variety of loads such as buffer management, key calculation costs, and the like.Type: GrantFiled: August 23, 2012Date of Patent: September 9, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Bo Heung Chung, Jeong Nyeo Kim
-
Patent number: 8832820Abstract: A method and associated systems for enhanced isolation and security hardening among multi-tenant workloads. An agent running on a processor of a networked computer system on which multicast and broadcast communications have been disabled captures an address-resolution query message from a querying tenant, converts the query message to a unicast message, and forwards the converted unicast query message to a switch. The switch forwards the converted unicast message to a redirection device and in response receives an address-resolution response message only after the redirection device verifies that the query and response messages comply with security policies. The switch forwards the address-resolution response to the querying tenant in conformance with security policies.Type: GrantFiled: June 25, 2012Date of Patent: September 9, 2014Assignee: International Business Machines CorporationInventors: Saurabh Barjatiya, Kanaka P. Saripalli
-
Patent number: 8830997Abstract: A network device including a processor having an internet protocol (IP) address, and a processor port configured to communicate exclusively with the processor. The network device also includes a plurality of network ports configured to communicate with network nodes external to the network device. In addition, the network device includes a forwarding engine configured to selectively transfer packets (i) among the plurality of network ports, and (ii) between the processor port and the plurality of network ports; receive a broadcast packet from one of the plurality of network ports, the broadcast packet including a target IP address; and forward the broadcast packet to the processor, via the processor port, only when both (i) the broadcast packet is a control packet, and (ii) the target IP address of the broadcast packet matches the IP address of processor.Type: GrantFiled: November 1, 2010Date of Patent: September 9, 2014Assignees: Marvell International Ltd., Marvell Israel (M.I.S.L) Ltd.Inventors: Nafea Bishara, Tsahi Daniel, David Melman, Nir Arad
-
Patent number: 8832283Abstract: Methods and systems for using and providing trustworthy DNS resolutions are provided. A method for using trustworthy DNS resolutions may include obtaining a DNS resolution listing for a domain name and validating the listing's plausibility using a plausible range list. The method may also include selecting a DNS resolution from the DNS resolution listing based on a requested host associated with the domain name. The method may further include initiating a connection to the host using the selected DNS resolution. A method for providing trustworthy DNS resolutions may include obtaining a plurality of potential DNS resolutions for a domain name. The method may also include generating a DNS resolution listing for a domain name and providing the DNS resolution listing. A system may include a DNS resolution selection module and a connection module. Another system may include a DNS resolution inquiry module and a DNS resolution listing provision module.Type: GrantFiled: May 31, 2011Date of Patent: September 9, 2014Assignee: Google Inc.Inventors: James Roskind, Mike Belshe
-
Publication number: 20140250520Abstract: Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function ofType: ApplicationFiled: May 15, 2014Publication date: September 4, 2014Inventors: David D. Brandt, Brian A. Batke, Bryan L. Singer, Craig D. Anderson, Glenn B. Schulz, Michael A. Bush, John C. Wilkinson, JR., Ramdas M. Pai, Steven J. Scott
-
Patent number: 8826451Abstract: In accordance with embodiments, there are provided methods and systems for providing communication authentication between cloud applications and on-premise applications. A method of embodiments includes receiving, from a cloud application at a cloud computing device, a first message at an application server of a server computing system, and parsing, at the application server, the first message to determine first identification information contained within the first message. The method further includes authenticating, at the application server, the first message by verifying the first identification information, and forwarding the first authenticated message to an on-premise application at a remote computing device.Type: GrantFiled: December 20, 2010Date of Patent: September 2, 2014Assignee: salesforce.com, inc.Inventor: Michael David Blubaugh
-
Patent number: 8826414Abstract: System-on-chip (SoC) and application-specific integrated circuit (ASIC)-based apparatus for detecting malicious code in portable terminal is provided.Type: GrantFiled: March 26, 2010Date of Patent: September 2, 2014Assignee: Samsung SDS Co., Ltd.Inventor: In Seon Yoo
-
Patent number: 8826413Abstract: Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID of the WID to specify whether traffic is allowed to or from the ESSID. For example, in one implementation of such a firewall rule, packets that are required to be sent out on all wired ports can be blocked from being flooded out on WLANs (e.g., the packet is allowed to pass only to the wired ports). A method and system are provided for preventing a malicious wireless client device (WCD) that is transmitting undesirable traffic from using RF resources by deauthenticating the malicious WCD to remove it from the WLAN and blacklisting it to prevent it from rejoining the WLAN for a time period. Method and systems are also provided for either “on-demand” and/or predicatively communicating state information regarding an existing firewall session.Type: GrantFiled: December 30, 2009Date of Patent: September 2, 2014Assignee: Motorla Solutions, Inc.Inventors: Rajesh Vijayakumar, Nicolas S. Dade, Jacob Thomas, Anurag Verma
-
Patent number: 8826425Abstract: A system and method for discovering security classifications of network areas includes representing actually allowed network flows and flows permitted by a security policy in a format that enables comparison. The actually allowed network flows and the security policy are provided in a networked computing environment including network areas, wherein each network area is a collection of one or more computing and network devices, and enterprise security policy defines security requirements for security classifications. An assignment of security classifications to network areas is determined by comparing the actually allowed network flows with the flows permitted by the security policy.Type: GrantFiled: December 1, 2009Date of Patent: September 2, 2014Assignee: International Business Machines CorporationInventors: Birgit Monika Pfitzmann, Harigovind Venkatraj Ramasamy, Cheng-Lin Tsao
-
Patent number: 8819410Abstract: Methods and apparatuses for private electronic information exchange are described herein. In one embodiment, when electronic information is received to be delivered to a recipient, the electronic information is transmitted over an electronic network with a private routing address. The private routing address is routable within a private domain, which is a subset of the electronic network. Other methods and apparatuses are also described.Type: GrantFiled: September 7, 2012Date of Patent: August 26, 2014Assignee: Privato Security, LLCInventor: George C. Sidman
-
Patent number: 8817784Abstract: Roughly described, incoming data packets are delivered by the NIC directly to at least two user level endpoints. In an aspect, only filters that cannot be ambiguous are created in the NIC. In another aspect, the NIC maintains a filter table supporting direct delivery of incoming unicast and multicast data packets to one user level endpoint. Additional requests to join the same multicast group cause replacement of the NIC filter with one in the kernel. In another aspect, a NIC has limited capacity to maintain multicast group memberships. In response to a new multicast filter request, the kernel establishes it in the NIC only if the NIC still has sufficient capacity; otherwise it is established in the kernel.Type: GrantFiled: January 10, 2012Date of Patent: August 26, 2014Assignee: Solarflare Communications, Inc.Inventors: David J. Riddoch, Martin W. Porter, Steven L. Pope
-
Patent number: 8819821Abstract: A low rate DoS attack detection algorithm is used, which relies on a characteristic of the low rate DoS attack in introducing high rate traffic for short periods, and then uses a proactive test based differentiation technique to filter the attack packets. The proactive test defends against DDoS attacks and low rate DoS attacks which tend to ignore the normal operation of network protocols, but it also differentiates legitimate traffic from low rate DoS attack traffic instigated by botnets. It leverages on the conformity of legitimate flows, which obey the network protocols. It also differentiates legitimate connections by checking their responses to the proactive tests which include puzzles for distinguishing botnets from human users.Type: GrantFiled: December 28, 2012Date of Patent: August 26, 2014Assignee: New Jersey Institute of TechnologyInventors: Nirwan Ansari, Amey Bhaskar Shevtekar
-
Patent number: 8819794Abstract: Online and on-premise applications identify trusted authentication providers. The applications are configured with a list of trusted issuers of authentication credentials. When an application receives a request requiring authentication, the application returns a 401 response that includes the trusted issuer list. The requesting application compares the trusted issuer list from the 401 response to its own list of authentication providers. If there is a match between the two lists, then the requesting application creates a self-issued token for the authentication provider. The authentication provider uses the self-issued token to generate an authentication token for the requesting application. The requesting application may also directly create a token for a target partner application, without an authentication provider, if there is a direct trust between the two applications.Type: GrantFiled: January 19, 2012Date of Patent: August 26, 2014Assignee: Microsoft CorporationInventors: Vadim Eydelman, Brian Kress, Matthias Leibmann, Moustafa Noureddine, Lei Yu, Haibo Luo
-
Patent number: 8819807Abstract: Provided are a traffic analysis apparatus and method. The traffic analysis apparatus includes an analysis unit and a policy application unit. The analysis unit determines whether a network packet between at least one client and a server is a packet of a pre-registered SAP session, and, when the network packet is not the packet of the pre-registered SAP session, the analysis unit determines whether the network packet is a packet of a new SAP session. The policy application unit determines whether the network packet includes predetermined monitoring information when the network packet is the packet of the pre-registered SAP session or new SAP session and, when the network packet includes the monitoring information, the policy application unit performs a response action conforming to a predetermined security policy.Type: GrantFiled: January 4, 2013Date of Patent: August 26, 2014Assignee: Somansa Co., LtdInventors: Seung Tae Paek, Yong Pil Hur, Tae Wan Kim, Sang Man Lee
-
Patent number: 8813216Abstract: A method and system for providing security to a Network Job Entry (NJE) network. A first NJE node and a third NJE node are connected by a second NJE node. The second NJE node conducts a security check of NJE packets traveling between the first and third NJE nodes. The security check performed by the second NJE node includes checking the userid of the person or job that sent the NJE packet, as well as the NJE data type. The NJE data type may be classified by the type of operation being performed, such as a batch job, sysout, command, message, as well as what application is being used. In one preferred embodiment, the security check includes checking the security level of the source of the data being transferred, such as a sensitive application. The security check can be based on the size of the data packet, such that excessively large data packets from a particular user are not permitted to be transmitted outside a secure NJE network.Type: GrantFiled: December 16, 2004Date of Patent: August 19, 2014Assignee: International Business Machines CorporationInventors: William Joseph Bloemeke, Reid Anthony Cashion
-
Patent number: 8813113Abstract: A method for adding a conditional access system to a digital audio/video transmission system that delivers content from a source to a security device associated with an audio/video processing device by providing at the broadcast source a datastream having system information data including an unused identifier reserved for security data associated with the additional conditional access system.Type: GrantFiled: November 2, 2000Date of Patent: August 19, 2014Assignee: Thomson LicensingInventors: David Jay Duffield, Jean-Louis Yves Diascorn, Ahmet Mursit Eskicioglu
-
Patent number: 8806605Abstract: A method may include determining one or more rules and communicating the one or more rules to a firewall, where the firewall receives a data unit and determines, based on the one or more rules, whether to forward the data unit to a destination address; receiving a redirection of a device from the firewall when the firewall determines not to forward the data unit to the destination address; receiving an indication that the firewall did not forward the data unit to the destination address; and determining a new rule to allow the firewall to forward the data unit to the destination address and communicating the new rule to the firewall; and redirecting the device to the destination address.Type: GrantFiled: January 11, 2008Date of Patent: August 12, 2014Assignee: Juniper Networks, Inc.Inventor: Roger A. Chickering
-
Patent number: 8806625Abstract: A computer-implemented method for performing security scans may include 1) generating a first hash of a first file, 2) performing a first security scan on the first file, 3) storing the first hash to indicate a result of the first security scan of the first file, 4) identifying a second file and generating a second hash of the second file, 5) determining that the second hash of the second file is equivalent to the first hash of the first file and, in response, determining that the result of the first security scan of the first file applies to the second file, 6) identifying a third file and determining that the third file is volatile, and 7) performing a second security scan on the third file instead of generating a third hash of the third file. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: October 2, 2012Date of Patent: August 12, 2014Assignee: Symantec CorporationInventor: Henry Berger
-
Patent number: 8806650Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: GrantFiled: July 23, 2013Date of Patent: August 12, 2014Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
-
Patent number: 8806606Abstract: A cloud center infrastructure system may include a service aggregator connected directly to a provider network. The service aggregator may be configured to receive, via the provider network, a data unit from a customer device, associated with a customer; identify a first device, associated with a first traffic processing service, based on a sequence of traffic processing services associated with the customer; and send the data unit to the first device, wherein the first device is located in a cloud services center, and wherein the first device is connected to the service aggregator over a Layer 2 connection.Type: GrantFiled: February 28, 2012Date of Patent: August 12, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: Syed A. Ahmad, Juzer T. Kopti
-
Patent number: 8804729Abstract: A method of detecting address spoofing includes receiving an ARP packet at a network device. The ARP packet includes a first address associated with a first network layer and a second address associated with a second network layer. The method also includes accessing a first memory searchable by the first address to obtain a memory reference and retrieving a third address associated with the second network layer from a second memory using the memory reference. The method further includes comparing the second address with the third address and detecting address spoofing if a match is not present between the second address and the third address.Type: GrantFiled: February 16, 2006Date of Patent: August 12, 2014Assignee: Marvell Israel (M.I.S.L.) Ltd.Inventors: David Melman, Tsahi Daniel