Improving security of data communications networks
A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine i...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Green, Stuart D Brown, Scott G Crain, Jonathan M Myers, Jeffrey Van Perry, Carl A Yax, Marcus L |
description | A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine if they violate any of a plurality of protection rules stored in a local protection rules database. Any transaction found to be in violation is discarded. Valid transactions are forwarded to the BlackNet. If an otherwise valid transaction is found to be suspicious, the FireBreak will forward to a FireNet Server relevant information relating to that transaction. If the FireNet Server verifies that the transaction is indeed part of an attack, the FireNet Server will create new protection rules suitable to defend against the newly identified source or strategy of attack. Periodically, all FireBreaks in the FireNet system will transfer, directly or indirectly, all new rules. |
format | Patent |
fullrecord | <record><control><sourceid>uspatents_EFH</sourceid><recordid>TN_cdi_uspatents_grants_07716717</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>07716717</sourcerecordid><originalsourceid>FETCH-uspatents_grants_077167173</originalsourceid><addsrcrecordid>eNrjZDDyzC0oyi_LzEtXKE5NLi3KLKlUyE9TSEksSVRIzs_NLc3LTE4syczPK1bISy0pzy_KLuZhYE1LzClO5YXS3AwKbq4hzh66pcUFiSWpeSXF8elFiSDKwNzc0Mzc0NyYCCUA6oAttw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Improving security of data communications networks</title><source>USPTO Issued Patents</source><creator>Green, Stuart D ; Brown, Scott G ; Crain, Jonathan M ; Myers, Jeffrey Van ; Perry, Carl A ; Yax, Marcus L</creator><creatorcontrib>Green, Stuart D ; Brown, Scott G ; Crain, Jonathan M ; Myers, Jeffrey Van ; Perry, Carl A ; Yax, Marcus L</creatorcontrib><description>A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine if they violate any of a plurality of protection rules stored in a local protection rules database. Any transaction found to be in violation is discarded. Valid transactions are forwarded to the BlackNet. If an otherwise valid transaction is found to be suspicious, the FireBreak will forward to a FireNet Server relevant information relating to that transaction. If the FireNet Server verifies that the transaction is indeed part of an attack, the FireNet Server will create new protection rules suitable to defend against the newly identified source or strategy of attack. Periodically, all FireBreaks in the FireNet system will transfer, directly or indirectly, all new rules.</description><language>eng</language><creationdate>2010</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7716717$$EPDF$$P50$$Guspatents$$Hfree_for_read</linktopdf><link.rule.ids>230,308,780,802,885,64039</link.rule.ids><linktorsrc>$$Uhttps://image-ppubs.uspto.gov/dirsearch-public/print/downloadPdf/7716717$$EView_record_in_USPTO$$FView_record_in_$$GUSPTO$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Green, Stuart D</creatorcontrib><creatorcontrib>Brown, Scott G</creatorcontrib><creatorcontrib>Crain, Jonathan M</creatorcontrib><creatorcontrib>Myers, Jeffrey Van</creatorcontrib><creatorcontrib>Perry, Carl A</creatorcontrib><creatorcontrib>Yax, Marcus L</creatorcontrib><title>Improving security of data communications networks</title><description>A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine if they violate any of a plurality of protection rules stored in a local protection rules database. Any transaction found to be in violation is discarded. Valid transactions are forwarded to the BlackNet. If an otherwise valid transaction is found to be suspicious, the FireBreak will forward to a FireNet Server relevant information relating to that transaction. If the FireNet Server verifies that the transaction is indeed part of an attack, the FireNet Server will create new protection rules suitable to defend against the newly identified source or strategy of attack. Periodically, all FireBreaks in the FireNet system will transfer, directly or indirectly, all new rules.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2010</creationdate><recordtype>patent</recordtype><sourceid>EFH</sourceid><recordid>eNrjZDDyzC0oyi_LzEtXKE5NLi3KLKlUyE9TSEksSVRIzs_NLc3LTE4syczPK1bISy0pzy_KLuZhYE1LzClO5YXS3AwKbq4hzh66pcUFiSWpeSXF8elFiSDKwNzc0Mzc0NyYCCUA6oAttw</recordid><startdate>20100511</startdate><enddate>20100511</enddate><creator>Green, Stuart D</creator><creator>Brown, Scott G</creator><creator>Crain, Jonathan M</creator><creator>Myers, Jeffrey Van</creator><creator>Perry, Carl A</creator><creator>Yax, Marcus L</creator><scope>EFH</scope></search><sort><creationdate>20100511</creationdate><title>Improving security of data communications networks</title><author>Green, Stuart D ; Brown, Scott G ; Crain, Jonathan M ; Myers, Jeffrey Van ; Perry, Carl A ; Yax, Marcus L</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-uspatents_grants_077167173</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2010</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Green, Stuart D</creatorcontrib><creatorcontrib>Brown, Scott G</creatorcontrib><creatorcontrib>Crain, Jonathan M</creatorcontrib><creatorcontrib>Myers, Jeffrey Van</creatorcontrib><creatorcontrib>Perry, Carl A</creatorcontrib><creatorcontrib>Yax, Marcus L</creatorcontrib><collection>USPTO Issued Patents</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Green, Stuart D</au><au>Brown, Scott G</au><au>Crain, Jonathan M</au><au>Myers, Jeffrey Van</au><au>Perry, Carl A</au><au>Yax, Marcus L</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Improving security of data communications networks</title><date>2010-05-11</date><risdate>2010</risdate><abstract>A FireNet security system in which trustworthy networks, called BlackNets, each comprising One (1) or more client computers, are protected by FireBreaks against attacks from untrustworthy networks, called RedNets. All incoming transactions from the RedNet are examined by the FireBreak to determine if they violate any of a plurality of protection rules stored in a local protection rules database. Any transaction found to be in violation is discarded. Valid transactions are forwarded to the BlackNet. If an otherwise valid transaction is found to be suspicious, the FireBreak will forward to a FireNet Server relevant information relating to that transaction. If the FireNet Server verifies that the transaction is indeed part of an attack, the FireNet Server will create new protection rules suitable to defend against the newly identified source or strategy of attack. Periodically, all FireBreaks in the FireNet system will transfer, directly or indirectly, all new rules.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_uspatents_grants_07716717 |
source | USPTO Issued Patents |
title | Improving security of data communications networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T10%3A28%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-uspatents_EFH&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Green,%20Stuart%20D&rft.date=2010-05-11&rft_id=info:doi/&rft_dat=%3Cuspatents_EFH%3E07716717%3C/uspatents_EFH%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |