Improving security of data communications networks

A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Green, Stuart D, Brown, Scott G, Crain, Jonathan M, Myers, Jeffrey Van, Perry, Carl A, Yax, Marcus L
Format: Patent
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Green, Stuart D
Brown, Scott G
Crain, Jonathan M
Myers, Jeffrey Van
Perry, Carl A
Yax, Marcus L
description A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine if they violate any of a plurality of protection rules stored in a local protection rules database. Any transaction found to be in violation is discarded. Valid transactions are forwarded to the BlackNet. If an otherwise valid transaction is found to be suspicious, the FireBreak will forward to a FireNet Server relevant information relating to that transaction. If the FireNet Server verifies that the transaction is indeed part of an attack, the FireNet Server will create new protection rules suitable to defend against the newly identified source or strategy of attack. Periodically, all FireBreaks in the FireNet system will transfer, directly or indirectly, all new rules.
format Patent
fullrecord <record><control><sourceid>uspatents_EFH</sourceid><recordid>TN_cdi_uspatents_grants_07716717</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>07716717</sourcerecordid><originalsourceid>FETCH-uspatents_grants_077167173</originalsourceid><addsrcrecordid>eNrjZDDyzC0oyi_LzEtXKE5NLi3KLKlUyE9TSEksSVRIzs_NLc3LTE4syczPK1bISy0pzy_KLuZhYE1LzClO5YXS3AwKbq4hzh66pcUFiSWpeSXF8elFiSDKwNzc0Mzc0NyYCCUA6oAttw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Improving security of data communications networks</title><source>USPTO Issued Patents</source><creator>Green, Stuart D ; Brown, Scott G ; Crain, Jonathan M ; Myers, Jeffrey Van ; Perry, Carl A ; Yax, Marcus L</creator><creatorcontrib>Green, Stuart D ; Brown, Scott G ; Crain, Jonathan M ; Myers, Jeffrey Van ; Perry, Carl A ; Yax, Marcus L</creatorcontrib><description>A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine if they violate any of a plurality of protection rules stored in a local protection rules database. Any transaction found to be in violation is discarded. Valid transactions are forwarded to the BlackNet. If an otherwise valid transaction is found to be suspicious, the FireBreak will forward to a FireNet Server relevant information relating to that transaction. If the FireNet Server verifies that the transaction is indeed part of an attack, the FireNet Server will create new protection rules suitable to defend against the newly identified source or strategy of attack. Periodically, all FireBreaks in the FireNet system will transfer, directly or indirectly, all new rules.</description><language>eng</language><creationdate>2010</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7716717$$EPDF$$P50$$Guspatents$$Hfree_for_read</linktopdf><link.rule.ids>230,308,780,802,885,64039</link.rule.ids><linktorsrc>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7716717$$EView_record_in_USPTO$$FView_record_in_$$GUSPTO$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Green, Stuart D</creatorcontrib><creatorcontrib>Brown, Scott G</creatorcontrib><creatorcontrib>Crain, Jonathan M</creatorcontrib><creatorcontrib>Myers, Jeffrey Van</creatorcontrib><creatorcontrib>Perry, Carl A</creatorcontrib><creatorcontrib>Yax, Marcus L</creatorcontrib><title>Improving security of data communications networks</title><description>A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine if they violate any of a plurality of protection rules stored in a local protection rules database. Any transaction found to be in violation is discarded. Valid transactions are forwarded to the BlackNet. If an otherwise valid transaction is found to be suspicious, the FireBreak will forward to a FireNet Server relevant information relating to that transaction. If the FireNet Server verifies that the transaction is indeed part of an attack, the FireNet Server will create new protection rules suitable to defend against the newly identified source or strategy of attack. Periodically, all FireBreaks in the FireNet system will transfer, directly or indirectly, all new rules.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2010</creationdate><recordtype>patent</recordtype><sourceid>EFH</sourceid><recordid>eNrjZDDyzC0oyi_LzEtXKE5NLi3KLKlUyE9TSEksSVRIzs_NLc3LTE4syczPK1bISy0pzy_KLuZhYE1LzClO5YXS3AwKbq4hzh66pcUFiSWpeSXF8elFiSDKwNzc0Mzc0NyYCCUA6oAttw</recordid><startdate>20100511</startdate><enddate>20100511</enddate><creator>Green, Stuart D</creator><creator>Brown, Scott G</creator><creator>Crain, Jonathan M</creator><creator>Myers, Jeffrey Van</creator><creator>Perry, Carl A</creator><creator>Yax, Marcus L</creator><scope>EFH</scope></search><sort><creationdate>20100511</creationdate><title>Improving security of data communications networks</title><author>Green, Stuart D ; Brown, Scott G ; Crain, Jonathan M ; Myers, Jeffrey Van ; Perry, Carl A ; Yax, Marcus L</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-uspatents_grants_077167173</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2010</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Green, Stuart D</creatorcontrib><creatorcontrib>Brown, Scott G</creatorcontrib><creatorcontrib>Crain, Jonathan M</creatorcontrib><creatorcontrib>Myers, Jeffrey Van</creatorcontrib><creatorcontrib>Perry, Carl A</creatorcontrib><creatorcontrib>Yax, Marcus L</creatorcontrib><collection>USPTO Issued Patents</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Green, Stuart D</au><au>Brown, Scott G</au><au>Crain, Jonathan M</au><au>Myers, Jeffrey Van</au><au>Perry, Carl A</au><au>Yax, Marcus L</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Improving security of data communications networks</title><date>2010-05-11</date><risdate>2010</risdate><abstract>A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine if they violate any of a plurality of protection rules stored in a local protection rules database. Any transaction found to be in violation is discarded. Valid transactions are forwarded to the BlackNet. If an otherwise valid transaction is found to be suspicious, the FireBreak will forward to a FireNet Server relevant information relating to that transaction. If the FireNet Server verifies that the transaction is indeed part of an attack, the FireNet Server will create new protection rules suitable to defend against the newly identified source or strategy of attack. Periodically, all FireBreaks in the FireNet system will transfer, directly or indirectly, all new rules.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_uspatents_grants_07716717
source USPTO Issued Patents
title Improving security of data communications networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T10%3A28%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-uspatents_EFH&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Green,%20Stuart%20D&rft.date=2010-05-11&rft_id=info:doi/&rft_dat=%3Cuspatents_EFH%3E07716717%3C/uspatents_EFH%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true