Security Protocols Patents (Class 726/14)
-
Patent number: 8869242Abstract: The invention proposes a system for authenticating and authorizing network services comprising: a mobile device being adapted to, upon receipt of an information message indicating at least one network access type, determine the network access type, to create a start message containing at least a user identity, and to encapsulate the start message in an authentication message compatible with the access network identified in the information message, and an access controller for reading the encapsulated message from the mobile and forwarding the encapsulated message to an authentication server identified in the encapsulated message. The invention also proposes a corresponding method for authenticating and authorizing network services, and an access control device, a subscriber device and a router device.Type: GrantFiled: November 16, 2012Date of Patent: October 21, 2014Assignee: Nokia CorporationInventors: Jari T. Malinen, Timothy J. Kniveton, Meghana Sahasrabudhe
-
Patent number: 8869270Abstract: Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router.Type: GrantFiled: March 11, 2009Date of Patent: October 21, 2014Assignee: Cupp Computing ASInventor: Shlomo Touboul
-
Patent number: 8869261Abstract: A method is disclosed for adjusting a security interface display on an electronic device. The method comprises a user of an electronic device requesting a change in the display of an interface for entering security code information on the device. The device presents to the user a variety of options related to the manner in which the graphical elements of the security interface may be displayed. The user may select any one or more of the display options. The electronic device thereafter displays a security interface with graphical elements displayed according to the user's selection.Type: GrantFiled: May 2, 2012Date of Patent: October 21, 2014Assignee: Google Inc.Inventor: Kenneth Russell Carter
-
Publication number: 20140310797Abstract: A Trusted Routing Point (TROP) generates a signaling message that includes an authorization token used to authorize a firewall to open a pinhole. The signaling message contains a first indicator that indicates whether a data field in the signaling message represents a source address of a media flow. The signaling message also includes a second indicator that indicates whether the firewall should derive the source address of the media flow from the data field. The authorization token is generated using a one-way hash function over information that may be included in the signaling message, including the first indicator and the second indicator.Type: ApplicationFiled: June 27, 2014Publication date: October 16, 2014Inventors: Ram Mohan Ravindranath, Muthu Arul Mozhi Perumal
-
Patent number: 8863244Abstract: Communication abuse prevention techniques are described. In an implementation, a reputation level for a communication is determined based on relation information for a sender and an intended recipient of the communication. A challenge is invoked that is to be completed by the sender before the communication is sent. The challenge is selected based on the reputation level for the communication. The communication is caused to be available for access based on successful completion of the challenge. Access to the communication is inhibited in response to a subsequent determination of the reputation level that indicates that the reputation level for the communication has changed to a new reputation level prior to the communication being accessed by the intended recipient. The subsequent determination is based on additional information associated with the sender of the communication.Type: GrantFiled: May 31, 2012Date of Patent: October 14, 2014Assignee: Microsoft CorporationInventors: Joseph Andrew Bono, Thomas R. Bauman, Jeffrey E. Steinbok, Eileen S. Hash, Dan Wu
-
Patent number: 8862880Abstract: A two-stage anonymization process is applied to monitored network traffic in which unique user identifiers, such as the MSISDN (Mobile Station International Subscriber Directory Number), are extracted from the traffic and anonymized to generate an ASI (anonymized subscriber identifier). A strictly random RSI (random subscriber identifier) is generated and used to replace the ASI. The RSI is generated upon a first occurrence of an ASI and stored in a lookup table for utilization upon subsequent ASI occurrences. Use of the strictly random RSI enables various studies and analysis of user behavior to be performed at a heightened level of privacy protection as compared with conventional anonymization schemes that do not utilize strictly random identifiers.Type: GrantFiled: September 23, 2011Date of Patent: October 14, 2014Assignee: GfK Holding Inc.Inventors: Jacques Combet, Yves-Marie LeMaitre, Antero Kivi
-
Patent number: 8863268Abstract: A security module and method within an information handling system are disclosed. In a particular form, a processing module can include a local processor configurable to initiate access to resources of a host processing system. The processing module can also include a security module configured to enable use of the resources of the host processing system using a security metric. According to an aspect, the security module can be further configured to detect the security metric, and enable access to a resource of the host processing system in response to the security metric. The security module can further be configured to disable access to another resource of the host processing system in response to the security metric.Type: GrantFiled: October 29, 2008Date of Patent: October 14, 2014Assignee: Dell Products, LPInventors: Roy W. Stedman, Andrew T. Sultenfuss, David Loadman
-
Patent number: 8863270Abstract: According to one embodiment, a computer system executing a computer program is coupled to multiple secure network domains configured in a multi-level security architecture. The computer program simultaneously establishes a voice connection with a first terminal configured on a first secure network domain and a second terminal configured on a second secure network domain. The computer program may then selectively couple an electroacoustical transducer to the first terminal or the second terminal, and generate an indicator on a user interface indicating the security level of the selected terminal.Type: GrantFiled: January 13, 2010Date of Patent: October 14, 2014Assignee: Raytheon CompanyInventors: John F. Masiyowski, Raymond A. Magon, Michael O. Tierney, Robert L. Marchant
-
Patent number: 8856911Abstract: Recommending a security policy to a firewall, includes receiving a request from a firewall for a recommendation as to whether the firewall should allow or block a detected present communication for which the firewall does not have an existing security policy. Information about past blocked and allowed communications at other firewalls on a network is searched to identify past communications that are similar to the present communication. The identified past communications are assigned a respective positive or negative vote. A positive vote indicates a past communication was allowed and a negative vote indicates a past communication was not allowed. A positive recommendation is sent to the requesting firewall to allow the present communication if the positive votes outnumber the negative votes, and a negative recommendation is sent to the requesting firewall to block the present communication if the negative votes outnumber the positive votes.Type: GrantFiled: July 26, 2012Date of Patent: October 7, 2014Assignee: AT&T Intellectual Property I, L.P.Inventor: Jeffrey Aaron
-
Patent number: 8856915Abstract: A negotiation unit, of a logical network control apparatus connected to a LAN, judges settings of processing to be performed on communication data by a network connection apparatus, from properties of an application to be used in communication, and decides parameters to be used for a VPN connection. The VPN connection is performed using the determined parameters.Type: GrantFiled: January 7, 2009Date of Patent: October 7, 2014Assignee: Canon Kabushiki KaishaInventor: Kensuke Yasuma
-
Patent number: 8856544Abstract: The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the equipment and other users executing on the processor, which is an advantageous feature for rentable, secure computers. In addition to the hardware extensions required to secure a virtualizable computer, an infrastructure for the deployment of such processors is also provided. Furthermore, a signaling flow to establish the various relationships between the owner, user and manufacturer of the equipment is disclosed.Type: GrantFiled: July 16, 2010Date of Patent: October 7, 2014Assignee: Alcatel LucentInventors: Peter Bosch, Vladimir Kolesnikov, Sape Mullender, Jim McKie, Philippe Dobbelaere, Hubert McLellan
-
Patent number: 8856920Abstract: A system and method are provided for supporting storage and analysis by law enforcement agency premises equipment of intercepted network traffic. The system and method provide integrity of the intercepted network traffic stored in an archive in accordance with lawful intercept requirements by storing all of the intercepted traffic, both benign and malicious, in the archive in its original form. The system and method furthermore provide for security from any malicious data packets of the archive by separating the malicious packets from the benign packets and forwarding only the benign packets to analysis applications of the law enforcement agency premises equipment.Type: GrantFiled: September 18, 2006Date of Patent: October 7, 2014Assignee: Alcatel LucentInventors: Faud Ahmad Khan, Dmitri Vinokurov, Vinod Kumar Choyi
-
Patent number: 8856869Abstract: Methods, systems, and apparatus relating to enforcement of same origin policy of sensitive data are described. In an embodiment, a security agent may help ensure release of sensitive data is only triggered by authorized sources. The security agent may help ensure sensitive data is only released to authorized destinations. A security agent may translate or obfuscate sensitive data. Sensitive data may include HTTP cookies, session data, authentication information, authorization information, personal information, user credentials, and/or other data sensitive in nature. Sensitive data destinations and/or sensitive data origins may be identified. Identification may be performed using secure means (such as for example a SSL/TLS handshake). Other embodiments are also disclosed and claimed.Type: GrantFiled: June 22, 2010Date of Patent: October 7, 2014Assignee: NexWavSec Software Inc.Inventor: Jeffrey E. Brinskelle
-
Patent number: 8856861Abstract: Methods and systems of rendering content on a device having a native digital rights management (DRM) system are described. A device, such as an end-user device capable of executing or playing content, acquires content in a common content format file having standardized locations for specific types of data. A generic digital rights token associated with the content is obtained by utilizing one of the standardized locations in the content format file, where the rights token contains information sufficient to allow retrieval of the rights associated with the content. Utilizing data in another of the standardized locations, it is then determined whether the device is registered in a domain. A license server directory may be accessed utilizing data in another of the standardized locations in the common content format file and a domain identifier, a device identifier, or both are transmitted to the license server directory.Type: GrantFiled: December 20, 2007Date of Patent: October 7, 2014Assignee: Samsung Electronics Co., Ltd.Inventors: Paul Fahn, Sanjeev Verma
-
Patent number: 8856914Abstract: A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is described. The virtualization platform of the virtual server is enhanced with networking drivers that provide a “fast path” firewall function for pre-configured guest VMs that already have dedicated deep packet inspection security agents installed. A separate security VM is deployed to provide virtual security agents providing deep packet inspection for non pre-configured guest VMs. The network drivers are then configured to intercept the data traffic of these guest VMs and route it through their corresponding virtual security agents, thus providing a “slow-path” for intrusion detection and prevention.Type: GrantFiled: April 4, 2013Date of Patent: October 7, 2014Assignee: Trend Micro IncorporatedInventor: William Gerald McGee
-
Patent number: 8856885Abstract: Methods and systems for managing cloud zones are described herein. A management server for a cloud of computing resources may add private zones to the cloud. The private zones may contain computers owned and operated by a user of the cloud, such as a cloud customer, rather than the cloud operator. The management server may manage the computing resources in the private zone by sending commands to an agent, which in turn relays the management server's commands to the individual computing resources. The agent may be authenticated using a token.Type: GrantFiled: April 30, 2012Date of Patent: October 7, 2014Assignee: Citrix Systems, Inc.Inventors: Alex Huang, Chiradeep Vittal, William Chan
-
Patent number: 8850521Abstract: In one embodiment, a first network device receives a priority message from a second network device, wherein the priority message conforms to a connection establishment protocol and indicates a priority associated with the second network device. The first network device obtains the priority from the priority message and stores the priority. The first network device allocates resources for at least one of control or data plane processing to the second network device in accordance with the priority.Type: GrantFiled: August 4, 2009Date of Patent: September 30, 2014Assignee: Cisco Technology, Inc.Inventors: Mohamed Khalid, Sunil Cherukuri, Haseeb Sarwar Niazi, Muhammad Afaq Khan
-
Patent number: 8844018Abstract: Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address.Type: GrantFiled: December 18, 2008Date of Patent: September 23, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Thusitha Jayawardena, Gustavo De Los Reyes, Gang Xu
-
Patent number: 8838965Abstract: Secure Remote Support Automation Process wherein a remote support server receives a support task request and schedules a predefined task to a predefined actor who also has a predefined escalation policy and notifies the support actor of the scheduled task along with a key, a key seed, or a credential to use in authentication. The method enabling privileged access to an Internet security appliance using public/private key pairs through a firewall and network address translation by a support server and an assigned support task actor.Type: GrantFiled: August 23, 2007Date of Patent: September 16, 2014Assignee: Barracuda Networks, Inc.Inventors: Zachary Levow, Andrew Konstantinov
-
Patent number: 8839398Abstract: A security token access device, a user device such as a computing device or communications device, and a method for managing multiple connections between multiple user devices and the access device. The access device maintains connection information, including security information, for each user device securely paired with the access device. Each time a new user device is paired with the access device, the access device transmits a notification to the user devices already paired to the user device. A user may provide instructions to the access device to terminate a pairing with one of the user devices by overwriting at least a portion of the connection information associated with the designated user device. A user device may further request a listing of all user devices currently paired with the access device.Type: GrantFiled: January 16, 2012Date of Patent: September 16, 2014Assignee: BlackBerry LimitedInventors: Neil Patrick Adams, Herbert Anthony Little
-
Patent number: 8839406Abstract: An attack blocking control method uses an access control list (ACL). The method includes investigating the ACL if a packet is input, and checking whether or not the packet is registered in the ACL, comparing a current time count value with a blocking time of the packet if the packet is determined to be registered in the ACL. Further, the method includes increasing the number of blocking times of the packet by 1 if the current time count value is smaller than or equal to the blocking time. Further, the method includes automatically renewing the blocking time, and removing registration information for the packet from the ACL if the current time count value is greater than the blocking time.Type: GrantFiled: November 12, 2012Date of Patent: September 16, 2014Assignee: Electronics and Telecommunications Research InstituteInventor: Dae Won Kim
-
Patent number: 8839408Abstract: A check in communication is received from an agent running inside a firewall via a permitted firewall communication channel. The check in communication is received via the permitted firewall communication channel without modifying a firewall configuration. The check in communication is responding to with an instruction to be performed by the agent running inside the firewall, where the response is via the permitted firewall communication channel.Type: GrantFiled: November 10, 2010Date of Patent: September 16, 2014Assignee: Okta, Inc.Inventors: Todd McKinnon, Kristoffer J. Grandy
-
Publication number: 20140259147Abstract: An example router device disclosed herein functions as a transport level proxy and application level proxy, is able to host both authenticated user and device sessions with stored session state and access control to resources for enhanced performance and ease of use. The device is able to function as a protocol proxy for improved performance and security. The device may be configured to implement a captive portal login mechanism, and may programmatically force unsecure LAN-side client requests to secure WAN-side connections. The device may execute an API for remote applications to utilize. The router device may pre-fetch content for client devices, and may communicate with other servers and peer routers to ascertain congestion on the WAN, and perform intelligent routing of WAN traffic based on the detected congestion. The device may also employ techniques to enhance privacy, virtualized address spaces, cookie filters, and traffic modification.Type: ApplicationFiled: September 28, 2012Publication date: September 11, 2014Inventors: Israel L'Heureux, Mark Alleman
-
Patent number: 8832821Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept.Type: GrantFiled: March 13, 2013Date of Patent: September 9, 2014Assignee: Telefonaktiebolaget LM Ericsson (PUBL)Inventors: Luis Barriga, Rolf Blom, Yi Cheng, Fredrik Lindholm, Mats Naslund, Karl Norrman
-
Patent number: 8832818Abstract: A multi-tenant data center environment includes a dedicated domain having at least one dedicated server associated with a client and a cloud domain having at least one cloud server associated with the client. The cloud server may have a public interface to a public network and a private interface to a private network. In turn, a network device is coupled between the dedicated domain and the public network, and is further coupled to the cloud server via the private network. A controller of the data center may be used to determine presence of the cloud server, and configure the network device to allow certain traffic to pass directly to the dedicated domain, while preventing other traffic from this direct path, based on access controls of the network device.Type: GrantFiled: February 28, 2011Date of Patent: September 9, 2014Assignee: Rackspace US, Inc.Inventor: Christopher Kuehl
-
Patent number: 8832311Abstract: A method is provided for electronically masking the geographic location of a client device in a communication network comprising the following steps: (a) mapping a communication from a first diverter node at a first location to a second diverter node at a second location, and (b) causing the communication to appear as originating from a client device at the second location when the communication is received by a destination device, wherein the second location is different from the first location. Also provided is a device that may be used to implement such a method.Type: GrantFiled: August 4, 2011Date of Patent: September 9, 2014Assignee: Chickasaw Management Company, LLCInventors: James Andrew Reynolds, Brett Burley, Gene Ward, Joe Kenney, Michael Howland, Christopher Allen Howland, Gilbert C. Medeiros, Carlos Flor, David Gutierrez, Philip Desch
-
Patent number: 8832817Abstract: A computer-implemented method includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace.Type: GrantFiled: July 19, 2012Date of Patent: September 9, 2014Assignee: Google Inc.Inventor: Gabriel A. Cohen
-
Patent number: 8832286Abstract: A method and system for controlling access to an application being executed by a server. A time interval between the server's receipt times of a first request and a second request. The first and second requests are included in multiple requests for an access to the application. An adjustment value is selected based on the time interval and multiple historical time intervals. Each historical time interval is between the server's receipt times of two requests of the multiple requests. The two requests' receipt times are prior to the first and second requests' receipt times. An accumulator is adjusted with the adjustment value, resulting in the accumulator's value exceeding a predefined threshold. Access to the application is controlled via a warning, a delay in responding to the second request, a temporary halt in processing, or a permanent access denial in response to the accumulator's value exceeding the threshold.Type: GrantFiled: November 12, 2007Date of Patent: September 9, 2014Assignee: International Business Machines CorporationInventor: Robert J. Purpura
-
Patent number: 8826014Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.Type: GrantFiled: January 21, 2005Date of Patent: September 2, 2014Assignee: International Business Machines CorporationInventors: Jeffery Bart Jennings, Kofi Kekessie
-
Patent number: 8826425Abstract: A system and method for discovering security classifications of network areas includes representing actually allowed network flows and flows permitted by a security policy in a format that enables comparison. The actually allowed network flows and the security policy are provided in a networked computing environment including network areas, wherein each network area is a collection of one or more computing and network devices, and enterprise security policy defines security requirements for security classifications. An assignment of security classifications to network areas is determined by comparing the actually allowed network flows with the flows permitted by the security policy.Type: GrantFiled: December 1, 2009Date of Patent: September 2, 2014Assignee: International Business Machines CorporationInventors: Birgit Monika Pfitzmann, Harigovind Venkatraj Ramasamy, Cheng-Lin Tsao
-
Patent number: 8826060Abstract: Methods and apparatus, including computer program products, are provided for using a relative timestamp to log activity in a distributed computing system. In one aspect, there is provided a computer-implemented method. The method may include receiving a message including a first timestamp representative of when the message is sent at a first processor. A second processor may generate an entry logging receipt of the received message. The second processor may determine a second timestamp representative of a time relative to the first timestamp. The second timestamp may be included as an entry at a log at the second processor.Type: GrantFiled: August 3, 2007Date of Patent: September 2, 2014Assignee: SAP AGInventors: Erol Bozak, Alexander Gebhart
-
Patent number: 8826413Abstract: Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID of the WID to specify whether traffic is allowed to or from the ESSID. For example, in one implementation of such a firewall rule, packets that are required to be sent out on all wired ports can be blocked from being flooded out on WLANs (e.g., the packet is allowed to pass only to the wired ports). A method and system are provided for preventing a malicious wireless client device (WCD) that is transmitting undesirable traffic from using RF resources by deauthenticating the malicious WCD to remove it from the WLAN and blacklisting it to prevent it from rejoining the WLAN for a time period. Method and systems are also provided for either “on-demand” and/or predicatively communicating state information regarding an existing firewall session.Type: GrantFiled: December 30, 2009Date of Patent: September 2, 2014Assignee: Motorla Solutions, Inc.Inventors: Rajesh Vijayakumar, Nicolas S. Dade, Jacob Thomas, Anurag Verma
-
Publication number: 20140245425Abstract: Methods and apparatus for a configurable-quality random data service are disclosed. A method includes implementing programmatic interfaces enabling a determination of respective characteristics of random data to be delivered to one or more clients of a random data service of a provider network. The method includes implementing security protocols for transmission of random data to the clients, including a protocol for transmission of random data to trusted clients at devices within the provider network. The method further includes obtaining, on behalf of a particular client and in accordance with the determined characteristics, random data from one or more servers of the provider network, and initiating a transmission of the random data directed to a destination associated with the particular client.Type: ApplicationFiled: February 28, 2013Publication date: August 28, 2014Applicant: AMAZON TECHNOLOGIES, INC.Inventor: Amazon Technologies, Inc.
-
Patent number: 8819808Abstract: Disclosed is a computer implemented method to report a bad host. A receiver host receives a packet from a sender host. The receiver host detects that the packet contains suspect hostile content. The receiver host transmits a negative trust report.Type: GrantFiled: September 14, 2012Date of Patent: August 26, 2014Assignee: International Business Machines CorporationInventors: Eric P. Fried, Anand Goyal, Sipla Kosanam, Suresh Sabarathinam
-
Patent number: 8819819Abstract: JavaScript on webpages linked to by URLs in messages is identified and the JavaScript is extracted. The JavaScript is then subjected to a JavaScript execution and analysis process whereby the JavaScript is executed in the context of a simulated web browser. The behavior of the JavaScript is then analyzed to identify one or more of: any URLs to be redirected to; any further executable JavaScript; and any content dynamically written to the webpage. The results are then either recursed into or are recorded and used to aid in the identification of spam messages.Type: GrantFiled: April 24, 2012Date of Patent: August 26, 2014Assignee: Symantec CorporationInventors: Nicholas Johnston, Graham Coomer
-
Patent number: 8819809Abstract: In a method and appliance for authenticating, by an appliance, a client to access a virtual network connection, based on an attribute of a client-side certificate, a client authentication certificate is requested from a client. A value of at least one field in the client authentication certificate received from the client is identified. One of a plurality of types of access is assigned responsive to an application of a policy to the identified value of the at least one field, each of the plurality of access types associated with at least one connection characteristic.Type: GrantFiled: March 26, 2013Date of Patent: August 26, 2014Assignee: Citrix Systems, Inc.Inventors: Amarnath Mullick, Shashi Nanjundaswamy, Ajay Soni
-
Patent number: 8819005Abstract: Systems and methods for providing automated computer support are described herein. One described method comprises receiving a plurality of snapshots from a plurality of computers, storing the plurality of snapshots in a data store, and creating an adaptive reference model based at least in part on the plurality of snapshots. The described method further comprises comparing at least one of the plurality of snapshots to the adaptive reference model, and identifying at least one anomaly based on the comparison.Type: GrantFiled: January 3, 2012Date of Patent: August 26, 2014Assignee: Triumfant, Inc.Inventor: David Eugene Hooks
-
Patent number: 8819764Abstract: A network security monitoring apparatus and a network security monitoring system manages “permitted” or “not permitted” communication between nodes based on an access policy. A network security monitoring system includes nodes 31,32,33, application server 20, router 40, and network security monitoring apparatus 10 deployed in the network. The network security monitoring apparatus 10 judges whether the nodes are permitted to communicate with other nodes in the network or not based on the access policy, and repeatedly transmits data to block the communication between nodes judged as “not permitted” at fixed time intervals until the access policy is changed from “not permitted” to “permitted”. This invention enables to block communication between nodes defined as “not permitted” for communicating with other nodes in the access policy, and to allow communication between nodes defined as “permitted” for communicating with other nodes in the access policy.Type: GrantFiled: August 28, 2008Date of Patent: August 26, 2014Assignee: Cyber Solutions Inc.Inventor: Glenn Mansfield Keeni
-
Publication number: 20140237584Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.Type: ApplicationFiled: April 28, 2014Publication date: August 21, 2014Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
-
Patent number: 8812638Abstract: A method of controlling an apparatus comprising a plurality of features and adapted to receive messages via a first network interface, wherein said method is implemented in a filter superposed on the top of an existing architecture of the apparatus. The method comprises the following steps: receiving network management message via said first network interface; interrogating said message in order to identify a feature said network management message relates to and filtering the received management message such that said management message is rejected if the identified feature is classified as disabled and said management message is allowed top go through if said feature is classified as enabled.Type: GrantFiled: July 12, 2006Date of Patent: August 19, 2014Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventor: Jürgen Fischer
-
Patent number: 8813210Abstract: A Mandatory Access Control (MAC) aware firewall includes an extended rule set for MAC attributes, such as a security label or path. Application labels may be used to identify processes and perform firewall rule-checking. The firewall rule set may including conventional firewall rules, such as address checking, in addition to an extension for MAC attributes.Type: GrantFiled: November 29, 2011Date of Patent: August 19, 2014Assignee: Samsung Electronics Co., Ltd.Inventors: Andrew C. Blaich, Onur Aciicmez
-
Patent number: 8813176Abstract: A method and apparatus for creating a policy based on a pre-configured template is described. In one embodiment, source data having a tabular structure is identified. Further, one of multiple policy templates is used to automatically create a policy for detecting information from any one or more rows within the tabular structure of the source data.Type: GrantFiled: June 25, 2012Date of Patent: August 19, 2014Assignee: Symantec CorporationInventors: Chris Jones, Eric Bothwell, Kevin T. Rowney
-
Patent number: 8813216Abstract: A method and system for providing security to a Network Job Entry (NJE) network. A first NJE node and a third NJE node are connected by a second NJE node. The second NJE node conducts a security check of NJE packets traveling between the first and third NJE nodes. The security check performed by the second NJE node includes checking the userid of the person or job that sent the NJE packet, as well as the NJE data type. The NJE data type may be classified by the type of operation being performed, such as a batch job, sysout, command, message, as well as what application is being used. In one preferred embodiment, the security check includes checking the security level of the source of the data being transferred, such as a sensitive application. The security check can be based on the size of the data packet, such that excessively large data packets from a particular user are not permitted to be transmitted outside a secure NJE network.Type: GrantFiled: December 16, 2004Date of Patent: August 19, 2014Assignee: International Business Machines CorporationInventors: William Joseph Bloemeke, Reid Anthony Cashion
-
Patent number: 8813217Abstract: A method for authorizing and accounting a host with multiple addresses in IPv6 Network includes: authorizing multiple addresses of the host respectively; charging the multiple addresses authorized of the host respectively. A system based on the above method includes: a network access server, for transmitting accounting information of multiple addresses of a host upon receiving authorization information; an Authentication, Authorization and Accounting (AAA) server, for authorizing the multiple addresses of the host respectively, and transmitting the authorization information to the network access server; receiving the accounting information transmitted from the network access server, and charging the multiple addresses according to the accounting information respectively.Type: GrantFiled: February 22, 2007Date of Patent: August 19, 2014Assignee: Huawei Technologies Co., Ltd.Inventors: Hongguang Guan, Jin Wang, Yongqiang Huang
-
Patent number: 8806650Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: GrantFiled: July 23, 2013Date of Patent: August 12, 2014Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
-
Patent number: 8806189Abstract: An apparatus for analyzing traffic is provided. The apparatus may precisely identify and analyze web traffic through 5 tuple-, HTTP-, and request/response pair-based packet analysis by monitoring the correlation between sessions.Type: GrantFiled: December 21, 2011Date of Patent: August 12, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Dong-Won Kang, Joon-Kyung Lee, Sang-Sik Yoon, Wang-Bong Lee
-
Patent number: 8806633Abstract: In one embodiment, a security device receives one or more first unique identifications of packets sent by a first device to a second device for which a corresponding acknowledgment was purportedly returned by the second device to the first device. The security device also receives one or more second unique identifications of packets received by the second device from the first device and acknowledged by the second device to the first device. By comparing the first and second unique identifications, the security device may then determine whether acknowledgments received by the first device were truly returned from the second device based on whether the first and second unique identifications exactly match.Type: GrantFiled: August 22, 2011Date of Patent: August 12, 2014Assignee: Cisco Technology, Inc.Inventors: Shmuel Shaffer, Jean-Philippe Vasseur, Jonathan W. Hui
-
Patent number: 8806606Abstract: A cloud center infrastructure system may include a service aggregator connected directly to a provider network. The service aggregator may be configured to receive, via the provider network, a data unit from a customer device, associated with a customer; identify a first device, associated with a first traffic processing service, based on a sequence of traffic processing services associated with the customer; and send the data unit to the first device, wherein the first device is located in a cloud services center, and wherein the first device is connected to the service aggregator over a Layer 2 connection.Type: GrantFiled: February 28, 2012Date of Patent: August 12, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: Syed A. Ahmad, Juzer T. Kopti
-
Patent number: 8806191Abstract: An e-mail firewall applies policies to e-mail messages between a first site and second sites in accordance with administrator selectable policies. The firewall includes a simple mail transfer protocol relay for causing the e-mail messages to be transmitted between the first site and selected ones of the second sites. Policy managers enforce-administrator selectable policies relative to one or more of encryption and decryption, signature, source/destination, content and viruses.Type: GrantFiled: August 27, 2012Date of Patent: August 12, 2014Assignee: Axway Inc.Inventors: Robert D. Dickinson, III, Sathvik Krishnamurthy
-
Patent number: 8800007Abstract: In general, techniques are described for seamlessly migrating a secure session established between a first computing device and a secure access appliance to a second computing device. In one example, a client computing device establishes a secure session with a secure access appliance. The client computing device receives a request via a communication channel from a second client computing device for secure session data for the first secure session usable by the second client computing device to establish a second secure session with the secure access appliance. The client computing device generates a message that includes the secure session data for the first secure session and sends the message to the second client computing device. Responsive to receiving the message, the second client computing device establishes a new secure session with the secure access appliance.Type: GrantFiled: June 24, 2011Date of Patent: August 5, 2014Assignee: Juniper Networks, Inc.Inventor: Chandrasekaran Rajagopalan