Movatterモバイル変換


[0]ホーム

URL:


US20020116643A1 - Method and system for extracting application protocol characteristics - Google Patents

Method and system for extracting application protocol characteristics
Download PDF

Info

Publication number
US20020116643A1
US20020116643A1US09/974,214US97421401AUS2002116643A1US 20020116643 A1US20020116643 A1US 20020116643A1US 97421401 AUS97421401 AUS 97421401AUS 2002116643 A1US2002116643 A1US 2002116643A1
Authority
US
United States
Prior art keywords
message
protocol
application
server
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/974,214
Inventor
Gil Raanan
Tal Moran
Yaroa Galant
Yuval El-Hanani
Eran Reshef
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
F5 Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filedlitigationCriticalhttps://patents.darts-ip.com/?family=23357098&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20020116643(A1)"Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from US09/149,911external-prioritypatent/US6321337B1/en
Application filed by IndividualfiledCriticalIndividual
Priority to US09/974,214priorityCriticalpatent/US20020116643A1/en
Publication of US20020116643A1publicationCriticalpatent/US20020116643A1/en
Priority to US10/909,645prioritypatent/US7774835B2/en
Assigned to WATCHFIRE CORPORATIONreassignmentWATCHFIRE CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SANCTUM LTD.
Assigned to F5 NETWORKS, INC.reassignmentF5 NETWORKS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: WATCHFIRE CORPORATION
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.

Description

Claims (1)

What is claimed is:
1. A method for defining a set of allowable actions for an application program residing on a server, the method comprising:
receiving a message transmitted by the server addressed to one or more clients;
extracting application protocol data from the server message to thereby retrieve the set of allowable actions which may be taken in response to the server message;
storing the extracted application protocol data in a protocol database.
US09/974,2141998-09-092001-09-14Method and system for extracting application protocol characteristicsAbandonedUS20020116643A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US09/974,214US20020116643A1 (en)1998-09-092001-09-14Method and system for extracting application protocol characteristics
US10/909,645US7774835B2 (en)1998-09-092004-08-02Method and system for extracting application protocol characteristics

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US09/149,911US6321337B1 (en)1997-09-091998-09-09Method and system for protecting operations of trusted internal networks
US09/345,920US6311278B1 (en)1998-09-091999-07-01Method and system for extracting application protocol characteristics
US09/974,214US20020116643A1 (en)1998-09-092001-09-14Method and system for extracting application protocol characteristics

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US09/345,920ContinuationUS6311278B1 (en)1998-09-091999-07-01Method and system for extracting application protocol characteristics

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US10/909,645ContinuationUS7774835B2 (en)1998-09-092004-08-02Method and system for extracting application protocol characteristics

Publications (1)

Publication NumberPublication Date
US20020116643A1true US20020116643A1 (en)2002-08-22

Family

ID=23357098

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US09/345,920Expired - LifetimeUS6311278B1 (en)1998-09-091999-07-01Method and system for extracting application protocol characteristics
US09/974,214AbandonedUS20020116643A1 (en)1998-09-092001-09-14Method and system for extracting application protocol characteristics
US10/909,645Expired - Fee RelatedUS7774835B2 (en)1998-09-092004-08-02Method and system for extracting application protocol characteristics

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US09/345,920Expired - LifetimeUS6311278B1 (en)1998-09-091999-07-01Method and system for extracting application protocol characteristics

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US10/909,645Expired - Fee RelatedUS7774835B2 (en)1998-09-092004-08-02Method and system for extracting application protocol characteristics

Country Status (8)

CountryLink
US (3)US6311278B1 (en)
EP (1)EP1203297B1 (en)
JP (2)JP4733886B2 (en)
AT (1)ATE463793T1 (en)
AU (1)AU5561200A (en)
DE (1)DE60044133D1 (en)
IL (1)IL147423A0 (en)
WO (1)WO2001002963A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040088423A1 (en)*2002-06-102004-05-06Akonix Systems, Inc.Systems and methods for authentication of target protocol screen names
US20040103318A1 (en)*2002-06-102004-05-27Akonix Systems, Inc.Systems and methods for implementing protocol enforcement rules
US20040136386A1 (en)*2002-06-102004-07-15Akonix Systems, Inc.Systems and methods for reflecting messages associated with a target protocol within a network
US20050193136A1 (en)*2004-02-272005-09-01International Business Machines CorporationServer-side protocol configuration of accessing clients
US20050234842A1 (en)*2004-03-312005-10-20International Business Machines CorporationSystem and method for increasing system resource availability in database management systems
US20060272008A1 (en)*2005-06-142006-11-30Imperva, IncMethod and security system for indentifying and blocking web attacks by enforcing read-only parameters
US20070112957A1 (en)*2005-11-032007-05-17Akonix Systems, Inc.Systems and Methods for Remote Rogue Protocol Enforcement
US20070124577A1 (en)*2002-06-102007-05-31AkonixSystems and methods for implementing protocol enforcement rules
US20080196099A1 (en)*2002-06-102008-08-14Akonix Systems, Inc.Systems and methods for detecting and blocking malicious content in instant messages
US7596803B1 (en)2004-07-122009-09-29Advanced Micro Devices, Inc.Method and system for generating access policies
US7657616B1 (en)2002-06-102010-02-02Quest Software, Inc.Automatic discovery of users associated with screen names
US7707401B2 (en)2002-06-102010-04-27Quest Software, Inc.Systems and methods for a protocol gateway
US8516539B2 (en)2007-11-092013-08-20Citrix Systems, IncSystem and method for inferring access policies from access event records
US8539552B1 (en)*2003-09-252013-09-17Hewlett-Packard Development Company, L.P.System and method for network based policy enforcement of intelligent-client features
US8910241B2 (en)2002-04-252014-12-09Citrix Systems, Inc.Computer security system
US8943575B2 (en)2008-04-302015-01-27Citrix Systems, Inc.Method and system for policy simulation
US8990573B2 (en)2008-11-102015-03-24Citrix Systems, Inc.System and method for using variable security tag location in network communications
US8990910B2 (en)2007-11-132015-03-24Citrix Systems, Inc.System and method using globally unique identities
US9240945B2 (en)2008-03-192016-01-19Citrix Systems, Inc.Access, priority and bandwidth management based on application identity

Families Citing this family (89)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6311278B1 (en)1998-09-092001-10-30Sanctum Ltd.Method and system for extracting application protocol characteristics
US7700296B2 (en)*1999-07-042010-04-20Mgp Diagnostics AsDiagnostic assay for human Matrix Gla-protein and its use as a biomarker
IL149322A0 (en)*1999-10-252002-11-10Sanctum LtdMethod and system for verifying a client request
US6950881B1 (en)*1999-11-022005-09-27Mshift, Inc.System for converting wireless communications for a mobile device
US6839766B1 (en)*2000-01-142005-01-04Cisco Technology, Inc.Method and apparatus for communicating cops protocol policies to non-cops-enabled network devices
IL151455A0 (en)*2000-03-032003-04-10Sanctum LtdSystem for determining web application vulnerabilities
US20010044849A1 (en)*2000-05-162001-11-22Awele NdiliSystem for providing network content to wireless devices
GB2366015B (en)*2000-08-182005-04-20Smart Media LtdApparatus, system and method for enhancing data security
US6804704B1 (en)*2000-08-182004-10-12International Business Machines CorporationSystem for collecting and storing email addresses with associated descriptors in a bookmark list in association with network addresses of electronic documents using a browser program
US20020161928A1 (en)*2000-10-102002-10-31Awele NdiliSmart agent for providing network content to wireless devices
US20020083342A1 (en)*2000-12-212002-06-27Webb Brian T.Systems, methods and computer program products for accessing devices on private networks via clients on a public network
US7185232B1 (en)2001-02-282007-02-27Cenzic, Inc.Fault injection methods and apparatus
US7882555B2 (en)*2001-03-162011-02-01Kavado, Inc.Application layer security method and system
US7313822B2 (en)*2001-03-162007-12-25Protegrity CorporationApplication-layer security method and system
US7457858B1 (en)*2001-04-022008-11-25Fujitsu LimitedFiltering network management messages
US20030051142A1 (en)*2001-05-162003-03-13Hidalgo Lluis MoraFirewalls for providing security in HTTP networks and applications
EP1412874A4 (en)*2001-07-272007-10-17Quigo Technologies IncSystem and method for automated tracking and analysis of document usage
US7325026B1 (en)*2001-11-122008-01-29Compuware CorporationNetwork communications analysis
US6604139B1 (en)2001-12-142003-08-05Networks Associates Technology, Inc.Voice protocol filtering system and method
US6814842B1 (en)2001-12-142004-11-09Networks Associates Technology, Inc.System and method for organizing objects of a voice call in a tree representation
US6970823B1 (en)2001-12-142005-11-29Networks Associates Technology, Inc.System, method and computer program product for monitoring voice application calls over a network
US7543056B2 (en)2002-01-152009-06-02Mcafee, Inc.System and method for network vulnerability detection and reporting
US7243148B2 (en)*2002-01-152007-07-10Mcafee, Inc.System and method for network vulnerability detection and reporting
US7257630B2 (en)2002-01-152007-08-14Mcafee, Inc.System and method for network vulnerability detection and reporting
US7664845B2 (en)*2002-01-152010-02-16Mcafee, Inc.System and method for network vulnerability detection and reporting
US8370936B2 (en)2002-02-082013-02-05Juniper Networks, Inc.Multi-method gateway-based network security systems and methods
US7734752B2 (en)*2002-02-082010-06-08Juniper Networks, Inc.Intelligent integrated network security device for high-availability applications
US7650634B2 (en)2002-02-082010-01-19Juniper Networks, Inc.Intelligent integrated network security device
IL149583A0 (en)*2002-05-092003-07-06Kavado Israel LtdMethod for automatic setting and updating of a security policy
US20040030788A1 (en)*2002-05-152004-02-12Gaetano CimoComputer message validation system
US20040024861A1 (en)*2002-06-282004-02-05Coughlin Chesley B.Network load balancing
US8041948B2 (en)*2002-08-262011-10-18Comverse, Ltd.Application level gateway for request verification
EP1547335B1 (en)*2002-10-022007-05-23Telus Communications CompanyRule creation for computer application screening
US20040073811A1 (en)*2002-10-152004-04-15Aleksey SaninWeb service security filter
US20040260947A1 (en)*2002-10-212004-12-23Brady Gerard AnthonyMethods and systems for analyzing security events
US7343626B1 (en)*2002-11-122008-03-11Microsoft CorporationAutomated detection of cross site scripting vulnerabilities
JP2006518080A (en)2003-02-142006-08-03プリベンシス,インコーポレイティド Network audit and policy assurance system
US20040243852A1 (en)*2003-05-282004-12-02Rosenstein Adam H.Method, system and software for state signing of internet resources
US7406714B1 (en)2003-07-012008-07-29Symantec CorporationComputer code intrusion detection system based on acceptable retrievals
US7568229B1 (en)2003-07-012009-07-28Symantec CorporationReal-time training for a computer code intrusion detection system
US7472413B1 (en)*2003-08-112008-12-30F5 Networks, Inc.Security for WAP servers
US8266177B1 (en)2004-03-162012-09-11Symantec CorporationEmpirical database access adjustment
US8201257B1 (en)2004-03-312012-06-12Mcafee, Inc.System and method of managing network security risks
WO2006015182A2 (en)2004-07-292006-02-09Infoassure, Inc.Object access level
US7478429B2 (en)*2004-10-012009-01-13Prolexic Technologies, Inc.Network overload detection and mitigation system and method
US20060094413A1 (en)*2004-11-012006-05-04Evans Mark SApplication protocol identification
US7444331B1 (en)2005-03-022008-10-28Symantec CorporationDetecting code injection attacks against databases
JP4575219B2 (en)2005-04-122010-11-04株式会社東芝 Security gateway system and method and program thereof
US8046374B1 (en)2005-05-062011-10-25Symantec CorporationAutomatic training of a database intrusion detection system
US7558796B1 (en)2005-05-192009-07-07Symantec CorporationDetermining origins of queries for a database intrusion detection system
JP2007004685A (en)*2005-06-272007-01-11Hitachi Ltd Communication information monitoring device
US7774361B1 (en)*2005-07-082010-08-10Symantec CorporationEffective aggregation and presentation of database intrusion incidents
US7690037B1 (en)2005-07-132010-03-30Symantec CorporationFiltering training data for machine learning
US7746862B1 (en)2005-08-022010-06-29Juniper Networks, Inc.Packet processing in a multiple processor system
US7661136B1 (en)2005-12-132010-02-09At&T Intellectual Property Ii, L.P.Detecting anomalous web proxy activity
EP1830253A3 (en)*2006-02-082009-03-18Secerno LimitedMethod, computer program and apparatus for analysing symbols in a computer system
US7983900B2 (en)*2006-02-082011-07-19Oracle International CorporationMethod, computer program and apparatus for analysing symbols in a computer system
DE102006010535A1 (en)*2006-03-072007-09-13Siemens Ag A method of providing updated protocols in a medical radiology information system
US8458647B2 (en)*2006-03-072013-06-04Sap Portals Israel Ltd.Method and apparatus for graphically constructing applications utilizing information from multiple sources
US8732476B1 (en)*2006-04-132014-05-20Xceedium, Inc.Automatic intervention
US7540766B2 (en)*2006-06-142009-06-02Itron, Inc.Printed circuit board connector for utility meters
ES2446944T3 (en)*2007-04-122014-03-10Core Sdi, Incorporated System, method and computer-readable medium to provide network penetration tests
US8782771B2 (en)2007-06-192014-07-15Rockwell Automation Technologies, Inc.Real-time industrial firewall
EP2023572B1 (en)*2007-08-082017-12-06Oracle International CorporationMethod, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor
JP2009095071A (en)*2007-10-032009-04-30Tdk-Lambda CorpUninterruptible power supply unit
US20090119769A1 (en)*2007-11-052009-05-07Microsoft CorporationCross-site scripting filter
US8635332B2 (en)*2008-11-122014-01-21YeeJang James LinSystem and method for identifying real users behind application servers
WO2010084344A1 (en)2009-01-202010-07-29Secerno LtdMethod, computer program and apparatus for analysing symbols in a computer system
AU2010232688C1 (en)2009-03-312014-04-10Commvault Systems, Inc.Systems and methods for normalizing data of heterogeneous data sources
KR101061255B1 (en)*2009-04-172011-09-01주식회사 파이오링크 Web security management device and method for monitoring communication between web server and client
US8666731B2 (en)*2009-09-222014-03-04Oracle International CorporationMethod, a computer program and apparatus for processing a computer message
US10721269B1 (en)2009-11-062020-07-21F5 Networks, Inc.Methods and system for returning requests with javascript for clients before passing a request to a server
US11140178B1 (en)*2009-11-232021-10-05F5 Networks, Inc.Methods and system for client side analysis of responses for server purposes
JP5381649B2 (en)*2009-11-262014-01-08富士通株式会社 Verification target extraction program, verification target extraction device, and verification target extraction method
US10296653B2 (en)2010-09-072019-05-21F5 Networks, Inc.Systems and methods for accelerating web page loading
US9336396B2 (en)2010-10-252016-05-10Radware, Ltd.Method and system for generating an enforceable security policy based on application sitemap
US9501650B2 (en)2011-05-312016-11-22Hewlett Packard Enterprise Development LpApplication security testing
EP2715599B1 (en)2011-05-312019-07-03EntIT Software LLCApplication security testing
US8448233B2 (en)2011-08-252013-05-21Imperva, Inc.Dealing with web attacks using cryptographically signed HTTP cookies
US10230566B1 (en)2012-02-172019-03-12F5 Networks, Inc.Methods for dynamically constructing a service principal name and devices thereof
WO2013163648A2 (en)2012-04-272013-10-31F5 Networks, Inc.Methods for optimizing service of content requests and devices thereof
CN102891795B (en)*2012-10-112016-12-21上海金自天正信息技术有限公司A kind of industrial security communication gateway
US9953169B2 (en)2013-02-282018-04-24Entit Software LlcModify execution of application under test so user is power user
US10187317B1 (en)2013-11-152019-01-22F5 Networks, Inc.Methods for traffic rate control and devices thereof
US9497222B2 (en)*2014-05-202016-11-15International Business Machines CorporationIdentification of web form parameters for an authorization engine
US10476992B1 (en)2015-07-062019-11-12F5 Networks, Inc.Methods for providing MPTCP proxy options and devices thereof
CN106656919B (en)*2015-10-302019-08-06中国科学院声学研究所 A method and system for session parsing based on Telnet protocol
CN110896388B (en)*2018-09-122022-07-05西门子(中国)有限公司Network traffic analysis method, device and computer readable medium
WO2025069024A1 (en)*2023-09-272025-04-03Ariel Scientific Innovations Ltd.System and method for establishing secure communication via application programming interface (api)

Citations (36)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5166977A (en)*1991-05-311992-11-24Encrypto, Inc.Protocol converter for a secure fax transmission system
US5237693A (en)*1990-04-041993-08-17Sharp Kabushiki KaishaSystem for accessing peripheral devices connected in network
US5257369A (en)*1990-10-221993-10-26Skeen Marion DApparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US5347578A (en)*1992-03-171994-09-13International Computers LimitedComputer system security
US5392390A (en)*1992-04-101995-02-21Intellilink Corp.Method for mapping, translating, and dynamically reconciling data between disparate computer platforms
US5485409A (en)*1992-04-301996-01-16International Business Machines CorporationAutomated penetration analysis system and method
US5557798A (en)*1989-07-271996-09-17Tibco, Inc.Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US5559800A (en)*1994-01-191996-09-24Research In Motion LimitedRemote control of gateway functions in a wireless data communication network
US5566326A (en)*1993-09-281996-10-15Bull Hn Information Systems Inc.Copy file mechanism for transferring files between a host system and an emulated file system
US5611048A (en)*1992-10-301997-03-11International Business Machines CorporationRemote password administration for a computer network among a plurality of nodes sending a password update message to all nodes and updating on authorized nodes
US5623601A (en)*1994-11-181997-04-22Milkway Networks CorporationApparatus and method for providing a secure gateway for communication and data exchanges between networks
US5659547A (en)*1992-08-311997-08-19The Dow Chemical CompanyScript-based system for testing a multi-user computer system
US5673322A (en)*1996-03-221997-09-30Bell Communications Research, Inc.System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks
US5699518A (en)*1993-11-291997-12-16Microsoft CorporationSystem for selectively setting a server node, evaluating to determine server node for executing server code, and downloading server code prior to executing if necessary
US5701451A (en)*1995-06-071997-12-23International Business Machines CorporationMethod for fulfilling requests of a web browser
US5715453A (en)*1996-05-311998-02-03International Business Machines CorporationWeb server mechanism for processing function calls for dynamic data queries in a web page
US5724355A (en)*1995-10-241998-03-03At&T CorpNetwork access to internet and stored multimedia services from a terminal supporting the H.320 protocol
US5774695A (en)*1996-03-221998-06-30Ericsson Inc.Protocol interface gateway and method of connecting an emulator to a network
US5778189A (en)*1996-05-291998-07-07Fujitsu LimitedSystem and method for converting communication protocols
US5793966A (en)*1995-12-011998-08-11Vermeer Technologies, Inc.Computer system and computer-implemented process for creation and maintenance of online services
US5805823A (en)*1996-01-301998-09-08Wayfarer Communications, Inc.System and method for optimal multiplexed message aggregation between client applications in client-server networks
US5812763A (en)*1988-02-171998-09-22Digital Equipment CorporationExpert system having a plurality of security inspectors for detecting security flaws in a computer system
US5828893A (en)*1992-12-241998-10-27Motorola, Inc.System and method of communicating between trusted and untrusted computer systems
US5850388A (en)*1996-08-021998-12-15Wandel & Goltermann Technologies, Inc.Protocol analyzer for monitoring digital transmission networks
US5870559A (en)*1996-10-151999-02-09Mercury InteractiveSoftware system and associated methods for facilitating the analysis and management of web sites
US5870544A (en)*1997-10-201999-02-09International Business Machines CorporationMethod and apparatus for creating a secure connection between a java applet and a web server
US5881232A (en)*1996-07-231999-03-09International Business Machines CorporationGeneric SQL query agent
US5892903A (en)*1996-09-121999-04-06Internet Security Systems, Inc.Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5892900A (en)*1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5908469A (en)*1997-02-141999-06-01International Business Machines CorporationGeneric user authentication for network computers
US5910987A (en)*1995-02-131999-06-08Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5933498A (en)*1996-01-111999-08-03Mrj, Inc.System for controlling access and distribution of digital property
US5941947A (en)*1995-08-181999-08-24Microsoft CorporationSystem and method for controlling access to data entities in a computer network
US5944794A (en)*1994-09-301999-08-31Kabushiki Kaisha ToshibaUser identification data management scheme for networking computer systems using wide area network
US5983270A (en)*1997-03-111999-11-09Sequel Technology CorporationMethod and apparatus for managing internetwork and intranetwork activity
US6185689B1 (en)*1998-06-242001-02-06Richard S. Carson & Assoc., Inc.Method for network self security assessment

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPS61133454A (en)*1984-12-031986-06-20Hitachi Ltd Terminal control method
US5191611A (en)1989-04-031993-03-02Lang Gerald SMethod and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US5073933A (en)1989-12-011991-12-17Sun Microsystems, Inc.X window security system
US5220604A (en)1990-09-281993-06-15Digital Equipment CorporationMethod for performing group exclusion in hierarchical group structures
US5315657A (en)1990-09-281994-05-24Digital Equipment CorporationCompound principals in access control lists
US5224163A (en)1990-09-281993-06-29Digital Equipment CorporationMethod for delegating authorization from one entity to another through the use of session encryption keys
JPH06268650A (en)1993-03-111994-09-22Toshiba Corp Network relay device
US5606668A (en)*1993-12-151997-02-25Checkpoint Software Technologies Ltd.System for securing inbound and outbound data packet flow in a computer network
US5629981A (en)1994-07-291997-05-13Texas Instruments IncorporatedInformation management and security system
US5802320A (en)*1995-05-181998-09-01Sun Microsystems, Inc.System for packet filtering of data packets at a computer network interface
US5752022A (en)*1995-08-071998-05-12International Business Machines Corp.Method for creating a hypertext language for a distributed computer network
US5657390A (en)1995-08-251997-08-12Netscape Communications CorporationSecure socket layer application program apparatus and method
US5692124A (en)*1996-08-301997-11-25Itt Industries, Inc.Support of limited write downs through trustworthy predictions in multilevel security of computer network communications
IT1290935B1 (en)1997-02-171998-12-14Algotech Sistemi S R L EQUIPMENT AND METHOD FOR DETECTION AND INTERPRETATION OF APPLICATION PROTOCOLS OF NETWORK DATA TRANSMISSION SYSTEMS.
US6286045B1 (en)1997-05-192001-09-04Matchlogic, Inc.Information storage and delivery over a computer network using centralized intelligence to monitor and control the information being delivered
IL126148A (en)1997-09-092004-02-19Sanctum LtdMethod and system for maintaining restricted operating environments for application programs or operating systems
JPH11163947A (en)1997-09-221999-06-18Toshiba Corp Gateway device, wireless terminal device, router device, and gateway control method for communication network
US5999932A (en)*1998-01-131999-12-07Bright Light Technologies, Inc.System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing
EP1062779B1 (en)1998-03-122012-02-08Whale Communications Ltd.Techniques for protection of data-communication networks
US6865672B1 (en)1998-05-182005-03-08Spearhead Technologies, Ltd.System and method for securing a computer communication network
US6311278B1 (en)1998-09-092001-10-30Sanctum Ltd.Method and system for extracting application protocol characteristics
AU9093798A (en)*1998-09-102000-04-03Sanctum, Inc.Method and system for protecting operations of trusted internal networks
IL149322A0 (en)1999-10-252002-11-10Sanctum LtdMethod and system for verifying a client request

Patent Citations (40)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5812763A (en)*1988-02-171998-09-22Digital Equipment CorporationExpert system having a plurality of security inspectors for detecting security flaws in a computer system
US5557798A (en)*1989-07-271996-09-17Tibco, Inc.Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US5237693A (en)*1990-04-041993-08-17Sharp Kabushiki KaishaSystem for accessing peripheral devices connected in network
US5257369A (en)*1990-10-221993-10-26Skeen Marion DApparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes
US5166977A (en)*1991-05-311992-11-24Encrypto, Inc.Protocol converter for a secure fax transmission system
US5347578A (en)*1992-03-171994-09-13International Computers LimitedComputer system security
US5392390A (en)*1992-04-101995-02-21Intellilink Corp.Method for mapping, translating, and dynamically reconciling data between disparate computer platforms
US5485409A (en)*1992-04-301996-01-16International Business Machines CorporationAutomated penetration analysis system and method
US5659547A (en)*1992-08-311997-08-19The Dow Chemical CompanyScript-based system for testing a multi-user computer system
US5611048A (en)*1992-10-301997-03-11International Business Machines CorporationRemote password administration for a computer network among a plurality of nodes sending a password update message to all nodes and updating on authorized nodes
US5828893A (en)*1992-12-241998-10-27Motorola, Inc.System and method of communicating between trusted and untrusted computer systems
US5566326A (en)*1993-09-281996-10-15Bull Hn Information Systems Inc.Copy file mechanism for transferring files between a host system and an emulated file system
US5699518A (en)*1993-11-291997-12-16Microsoft CorporationSystem for selectively setting a server node, evaluating to determine server node for executing server code, and downloading server code prior to executing if necessary
US5559800A (en)*1994-01-191996-09-24Research In Motion LimitedRemote control of gateway functions in a wireless data communication network
US5944794A (en)*1994-09-301999-08-31Kabushiki Kaisha ToshibaUser identification data management scheme for networking computer systems using wide area network
US5623601A (en)*1994-11-181997-04-22Milkway Networks CorporationApparatus and method for providing a secure gateway for communication and data exchanges between networks
US5910987A (en)*1995-02-131999-06-08Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5982891A (en)*1995-02-131999-11-09Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5915019A (en)*1995-02-131999-06-22Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5917912A (en)*1995-02-131999-06-29Intertrust Technologies CorporationSystem and methods for secure transaction management and electronic rights protection
US5949876A (en)*1995-02-131999-09-07Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US5701451A (en)*1995-06-071997-12-23International Business Machines CorporationMethod for fulfilling requests of a web browser
US5941947A (en)*1995-08-181999-08-24Microsoft CorporationSystem and method for controlling access to data entities in a computer network
US5724355A (en)*1995-10-241998-03-03At&T CorpNetwork access to internet and stored multimedia services from a terminal supporting the H.320 protocol
US5793966A (en)*1995-12-011998-08-11Vermeer Technologies, Inc.Computer system and computer-implemented process for creation and maintenance of online services
US5933498A (en)*1996-01-111999-08-03Mrj, Inc.System for controlling access and distribution of digital property
US5805823A (en)*1996-01-301998-09-08Wayfarer Communications, Inc.System and method for optimal multiplexed message aggregation between client applications in client-server networks
US5774695A (en)*1996-03-221998-06-30Ericsson Inc.Protocol interface gateway and method of connecting an emulator to a network
US5673322A (en)*1996-03-221997-09-30Bell Communications Research, Inc.System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks
US5778189A (en)*1996-05-291998-07-07Fujitsu LimitedSystem and method for converting communication protocols
US5715453A (en)*1996-05-311998-02-03International Business Machines CorporationWeb server mechanism for processing function calls for dynamic data queries in a web page
US5881232A (en)*1996-07-231999-03-09International Business Machines CorporationGeneric SQL query agent
US5850388A (en)*1996-08-021998-12-15Wandel & Goltermann Technologies, Inc.Protocol analyzer for monitoring digital transmission networks
US5892900A (en)*1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5892903A (en)*1996-09-121999-04-06Internet Security Systems, Inc.Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5870559A (en)*1996-10-151999-02-09Mercury InteractiveSoftware system and associated methods for facilitating the analysis and management of web sites
US5908469A (en)*1997-02-141999-06-01International Business Machines CorporationGeneric user authentication for network computers
US5983270A (en)*1997-03-111999-11-09Sequel Technology CorporationMethod and apparatus for managing internetwork and intranetwork activity
US5870544A (en)*1997-10-201999-02-09International Business Machines CorporationMethod and apparatus for creating a secure connection between a java applet and a web server
US6185689B1 (en)*1998-06-242001-02-06Richard S. Carson & Assoc., Inc.Method for network self security assessment

Cited By (32)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8910241B2 (en)2002-04-252014-12-09Citrix Systems, Inc.Computer security system
US9781114B2 (en)2002-04-252017-10-03Citrix Systems, Inc.Computer security system
US7707401B2 (en)2002-06-102010-04-27Quest Software, Inc.Systems and methods for a protocol gateway
US7774832B2 (en)2002-06-102010-08-10Quest Software, Inc.Systems and methods for implementing protocol enforcement rules
US20040103318A1 (en)*2002-06-102004-05-27Akonix Systems, Inc.Systems and methods for implementing protocol enforcement rules
US20040136386A1 (en)*2002-06-102004-07-15Akonix Systems, Inc.Systems and methods for reflecting messages associated with a target protocol within a network
US20040088423A1 (en)*2002-06-102004-05-06Akonix Systems, Inc.Systems and methods for authentication of target protocol screen names
US20070124577A1 (en)*2002-06-102007-05-31AkonixSystems and methods for implementing protocol enforcement rules
US20080196099A1 (en)*2002-06-102008-08-14Akonix Systems, Inc.Systems and methods for detecting and blocking malicious content in instant messages
US7428590B2 (en)2002-06-102008-09-23Akonix Systems, Inc.Systems and methods for reflecting messages associated with a target protocol within a network
US20080256257A1 (en)*2002-06-102008-10-16Akonix Systems, Inc.Systems and methods for reflecting messages associated with a target protocol within a network
US8195833B2 (en)2002-06-102012-06-05Quest Software, Inc.Systems and methods for managing messages in an enterprise network
US20110131653A1 (en)*2002-06-102011-06-02Quest Software, Inc.Systems and methods for managing messages in an enterprise network
US7882265B2 (en)2002-06-102011-02-01Quest Software, Inc.Systems and methods for managing messages in an enterprise network
US7657616B1 (en)2002-06-102010-02-02Quest Software, Inc.Automatic discovery of users associated with screen names
US7664822B2 (en)2002-06-102010-02-16Quest Software, Inc.Systems and methods for authentication of target protocol screen names
US7818565B2 (en)*2002-06-102010-10-19Quest Software, Inc.Systems and methods for implementing protocol enforcement rules
US8539552B1 (en)*2003-09-252013-09-17Hewlett-Packard Development Company, L.P.System and method for network based policy enforcement of intelligent-client features
US20050193136A1 (en)*2004-02-272005-09-01International Business Machines CorporationServer-side protocol configuration of accessing clients
US7519718B2 (en)*2004-02-272009-04-14International Business Machines CorporationServer-side protocol configuration of accessing clients
US20050234842A1 (en)*2004-03-312005-10-20International Business Machines CorporationSystem and method for increasing system resource availability in database management systems
US7523088B2 (en)*2004-03-312009-04-21International Business Machines CorporationMethod for increasing system resource availability in database management systems
US7596803B1 (en)2004-07-122009-09-29Advanced Micro Devices, Inc.Method and system for generating access policies
US8051484B2 (en)*2005-06-142011-11-01Imperva, Inc.Method and security system for indentifying and blocking web attacks by enforcing read-only parameters
US20060272008A1 (en)*2005-06-142006-11-30Imperva, IncMethod and security system for indentifying and blocking web attacks by enforcing read-only parameters
US20070112957A1 (en)*2005-11-032007-05-17Akonix Systems, Inc.Systems and Methods for Remote Rogue Protocol Enforcement
US7756981B2 (en)2005-11-032010-07-13Quest Software, Inc.Systems and methods for remote rogue protocol enforcement
US8516539B2 (en)2007-11-092013-08-20Citrix Systems, IncSystem and method for inferring access policies from access event records
US8990910B2 (en)2007-11-132015-03-24Citrix Systems, Inc.System and method using globally unique identities
US9240945B2 (en)2008-03-192016-01-19Citrix Systems, Inc.Access, priority and bandwidth management based on application identity
US8943575B2 (en)2008-04-302015-01-27Citrix Systems, Inc.Method and system for policy simulation
US8990573B2 (en)2008-11-102015-03-24Citrix Systems, Inc.System and method for using variable security tag location in network communications

Also Published As

Publication numberPublication date
JP2003504723A (en)2003-02-04
EP1203297A4 (en)2004-05-12
AU5561200A (en)2001-01-22
DE60044133D1 (en)2010-05-20
JP4733886B2 (en)2011-07-27
ATE463793T1 (en)2010-04-15
WO2001002963A1 (en)2001-01-11
IL147423A0 (en)2002-08-14
EP1203297A1 (en)2002-05-08
JP2009134725A (en)2009-06-18
EP1203297B1 (en)2010-04-07
US7774835B2 (en)2010-08-10
US6311278B1 (en)2001-10-30
US20050044420A1 (en)2005-02-24

Similar Documents

PublicationPublication DateTitle
US7774835B2 (en)Method and system for extracting application protocol characteristics
US6961759B2 (en)Method and system for remotely managing persistent state data
US8271636B2 (en)Rule-based networking device
US8046495B2 (en)System and method for modifying web content via a content transform proxy service
US6438600B1 (en)Securely sharing log-in credentials among trusted browser-based applications
US6385642B1 (en)Internet web server cache storage and session management system
EP3097509B1 (en)Intercepting and supervising calls to transformed operations and objects
US7246263B2 (en)System and method for portal infrastructure tracking
US6029245A (en)Dynamic assignment of security parameters to web pages
US7293281B1 (en)Method and system for verifying a client request
US5987523A (en)Applet redirection for controlled access to non-orginating hosts
US8051484B2 (en)Method and security system for indentifying and blocking web attacks by enforcing read-only parameters
US6789201B2 (en)Anti-virus toolbar system and method for use with a network browser
US20090070418A1 (en)System for Maintaining State Information on a Client
WO2003073195A2 (en)Method and system for effectively communicating file properties and directory structures in a distributed file system
US20030187976A1 (en)Tracking users at a web server network
US9092448B2 (en)System and method for portal infrastructure tracking
JP2004520654A (en) Cracker tracking system and method, and authentication system and method using the same
JP5347429B2 (en) Uniform resource locator rewriting method and apparatus
EP3024191B1 (en)Data processing system, center apparatus and program
IL147423A (en)Method and system for extracting application protocol characteristics
EP1232425B1 (en)Method and system for verifying a client request
KR20020022314A (en)Method and apparatus for analyzing a client computer
CA2510633C (en)Access control list checking
WO2000079435A1 (en)Site identification system

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:WATCHFIRE CORPORATION, CANADA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SANCTUM LTD.;REEL/FRAME:015687/0308

Effective date:20040824

ASAssignment

Owner name:F5 NETWORKS, INC., WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WATCHFIRE CORPORATION;REEL/FRAME:017097/0627

Effective date:20050506


[8]ページ先頭

©2009-2025 Movatter.jp