Movatterモバイル変換


[0]ホーム

URL:


US20120195429A1 - Method and system for securely scanning network traffic - Google Patents

Method and system for securely scanning network traffic
Download PDF

Info

Publication number
US20120195429A1
US20120195429A1US13/360,550US201213360550AUS2012195429A1US 20120195429 A1US20120195429 A1US 20120195429A1US 201213360550 AUS201213360550 AUS 201213360550AUS 2012195429 A1US2012195429 A1US 2012195429A1
Authority
US
United States
Prior art keywords
network
firewall
packet
devices
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/360,550
Inventor
Joel Balissat
Claude Galand
Jean-Francois LePennec
Jean-Marie Sommerlatt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intellectual Ventures II LLC
Original Assignee
Worcester Technologies LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Worcester Technologies LLCfiledCriticalWorcester Technologies LLC
Priority to US13/360,550priorityCriticalpatent/US20120195429A1/en
Assigned to WORCESTER TECHNOLOGIES LLCreassignmentWORCESTER TECHNOLOGIES LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: AT&T INTELLECTUAL PROPERTY II, L.P.
Publication of US20120195429A1publicationCriticalpatent/US20120195429A1/en
Assigned to INTELLECTUAL VENTURES II LLCreassignmentINTELLECTUAL VENTURES II LLCMERGER (SEE DOCUMENT FOR DETAILS).Assignors: WORCESTER TECHNOLOGIES LLC
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Secure network communications via a firewall device are provided between a first device and a second device, where an encryption parameter is shared by the devices. A data packet sent by the first device may then be copied within the firewall device, so that the copy of the data packet can be decrypted within a portion of the firewall device. In particular, the portion of the firewall device in which decryption takes place is defined such that contents of the portion are inaccessible to an operator of the firewall device. Thus, scanning of the decrypted copy of the data packet for compliance with a predetermined criterion may take place within the firewall device, without an operator of the firewall device having access to the contents of the data packet to be transmitted. Thereafter, the original data packet can be forwarded to its originally intended recipient.

Description

Claims (21)

US13/360,5502002-04-042012-01-27Method and system for securely scanning network trafficAbandonedUS20120195429A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US13/360,550US20120195429A1 (en)2002-04-042012-01-27Method and system for securely scanning network traffic

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US10/115,554US7188365B2 (en)2002-04-042002-04-04Method and system for securely scanning network traffic
US11/703,020US7543332B2 (en)2002-04-042007-02-06Method and system for securely scanning network traffic
US12/105,756US8136152B2 (en)2002-04-042008-04-18Method and system for securely scanning network traffic
US13/360,550US20120195429A1 (en)2002-04-042012-01-27Method and system for securely scanning network traffic

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US12/105,756ContinuationUS8136152B2 (en)2002-04-042008-04-18Method and system for securely scanning network traffic

Publications (1)

Publication NumberPublication Date
US20120195429A1true US20120195429A1 (en)2012-08-02

Family

ID=28673797

Family Applications (5)

Application NumberTitlePriority DateFiling Date
US10/115,554Expired - LifetimeUS7188365B2 (en)2002-04-042002-04-04Method and system for securely scanning network traffic
US11/525,399Expired - LifetimeUS7448081B2 (en)2002-04-042006-09-22Method and system for securely scanning network traffic
US11/703,020Expired - LifetimeUS7543332B2 (en)2002-04-042007-02-06Method and system for securely scanning network traffic
US12/105,756Expired - Fee RelatedUS8136152B2 (en)2002-04-042008-04-18Method and system for securely scanning network traffic
US13/360,550AbandonedUS20120195429A1 (en)2002-04-042012-01-27Method and system for securely scanning network traffic

Family Applications Before (4)

Application NumberTitlePriority DateFiling Date
US10/115,554Expired - LifetimeUS7188365B2 (en)2002-04-042002-04-04Method and system for securely scanning network traffic
US11/525,399Expired - LifetimeUS7448081B2 (en)2002-04-042006-09-22Method and system for securely scanning network traffic
US11/703,020Expired - LifetimeUS7543332B2 (en)2002-04-042007-02-06Method and system for securely scanning network traffic
US12/105,756Expired - Fee RelatedUS8136152B2 (en)2002-04-042008-04-18Method and system for securely scanning network traffic

Country Status (2)

CountryLink
US (5)US7188365B2 (en)
FR (1)FR2839226B1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100226383A1 (en)*2005-01-202010-09-09Cisco Technology, Inc.Inline Intrusion Detection
US11409770B2 (en)*2015-03-262022-08-09Oracle International CorporationMulti-distance similarity analysis with tri-point arbitration
US20220400011A1 (en)*2021-06-152022-12-15Whitestar Communications, Inc.Anti-replay protection based on hashing encrypted temporal key in a secure peer-to-peer data network

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP4386732B2 (en)2002-01-082009-12-16セブン ネットワークス, インコーポレイテッド Mobile network connection architecture
KR100455802B1 (en)*2002-07-032004-11-06주식회사 아이콘랩Method and apparatus for displaying a time-varying code to a handheld terminal, and method and apparatus for approval and authentication processing by using the same
JP4159328B2 (en)*2002-09-112008-10-01Necインフロンティア株式会社 Network, IPsec setting server device, IPsec processing device, and IPsec setting method used therefor
WO2004036834A1 (en)*2002-10-172004-04-29Nokia CorporationSecured virtual private network with mobile nodes
JP3914861B2 (en)*2002-11-292007-05-16Necインフロンティア株式会社 Communications system
JP4077351B2 (en)*2003-03-282008-04-16富士通株式会社 Name / address converter
WO2005008997A1 (en)*2003-07-032005-01-27Sinett CorporationHardware acceleration for unified ipsec and l2tp with ipsec processing in a device that integrates wired and wireless lan, l2 and l3 switching functionality
WO2005008999A1 (en)*2003-07-032005-01-27Sinett CorporationHardware acceleration for diffie hellman in a wireless lan
US7287278B2 (en)*2003-08-292007-10-23Trend Micro, Inc.Innoculation of computing devices against a selected computer virus
CA2546841A1 (en)*2003-11-242005-06-02Fsc Internet Corp.Network session re-construction
US7546357B2 (en)*2004-01-072009-06-09Microsoft CorporationConfiguring network settings using portable storage media
JP4006403B2 (en)*2004-01-212007-11-14キヤノン株式会社 Digital signature issuing device
US7814543B2 (en)*2004-02-132010-10-12Microsoft CorporationSystem and method for securing a computer system connected to a network from attacks
US7716726B2 (en)*2004-02-132010-05-11Microsoft CorporationSystem and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
US20050228997A1 (en)*2004-04-072005-10-13Bicker Dennis DMethods and devices for providing secure communication sessions
US7676838B2 (en)*2004-07-262010-03-09Alcatel LucentSecure communication methods and systems
US20090094671A1 (en)*2004-08-132009-04-09Sipera Systems, Inc.System, Method and Apparatus for Providing Security in an IP-Based End User Device
US8862718B2 (en)*2006-07-122014-10-14Avaya Inc.System, method and apparatus for troubleshooting an IP network
US20060072761A1 (en)*2004-09-302006-04-06Bruce JohnsonAccess point that wirelessly provides an encryption key to an authenticated wireless station
US7716727B2 (en)*2004-10-292010-05-11Microsoft CorporationNetwork security device and method for protecting a computing device in a networked environment
US8838963B2 (en)*2005-02-042014-09-16Apple Inc.Security enhancement arrangement
CN100414929C (en)*2005-03-152008-08-27华为技术有限公司 Message transmission method in a mobile internet protocol network
US7706314B2 (en)*2005-05-202010-04-27Cisco Technology, Inc.Approach for implementing IPsec in performance enhancing proxy (PEP) environments
US8547874B2 (en)*2005-06-302013-10-01Cisco Technology, Inc.Method and system for learning network information
EP1744515B1 (en)*2005-07-122011-07-13Fujitsu Siemens Computers, Inc.Method, cluster system and computer-readable medium for distributing data packets
US7593911B1 (en)*2005-10-122009-09-22At&T Corp.System and method for applying rule sets and rule interactions
JP4899442B2 (en)*2005-11-212012-03-21ソニー株式会社 Information processing apparatus, information recording medium manufacturing apparatus, information recording medium and method, and computer program
US20070234036A1 (en)*2006-03-302007-10-04Tan Tat KNetwork mobility node authentication
US20080134300A1 (en)*2006-07-082008-06-05David IzattMethod for Improving Security of Computer Networks
WO2008008856A2 (en)*2006-07-122008-01-17Sipera Systems, Inc.System, method and apparatus for securely exchanging security keys and monitoring links in an ip communications network
US8543808B2 (en)*2006-08-242013-09-24Microsoft CorporationTrusted intermediary for network data processing
US7836497B2 (en)*2006-12-222010-11-16Telefonaktiebolaget L M Ericsson (Publ)Apparatus and method for resilient IP security/internet key exchange security gateway
US20090119510A1 (en)*2007-11-062009-05-07Men LongEnd-to-end network security with traffic visibility
US8467527B2 (en)2008-12-032013-06-18Intel CorporationEfficient key derivation for end-to-end network security with traffic visibility
US8166534B2 (en)*2007-05-182012-04-24Microsoft CorporationIncorporating network connection security levels into firewall rules
US8667151B2 (en)*2007-08-092014-03-04Alcatel LucentBootstrapping method for setting up a security association
US7929449B2 (en)*2008-05-302011-04-19International Business Machines CorporationSystem, method and program for determining failure in network communication
US8289970B2 (en)*2009-07-172012-10-16Microsoft CorporationIPSec encapsulation mode
US9068085B2 (en)2009-10-162015-06-30PoscoRadiation curable resin composition, and fingerprint-resistant resin composition containing same
GB0918478D0 (en)*2009-10-222009-12-09Qinetiq LtdChecking data content
GB0918479D0 (en)2009-10-222009-12-09Qinetiq LtdData content checking
US8826366B2 (en)2010-07-152014-09-02Tt Government Solutions, Inc.Verifying access-control policies with arithmetic quantifier-free form constraints
GB201008888D0 (en)*2010-05-272010-07-14Qinetiq LtdNetwork security
US8930692B2 (en)2010-07-232015-01-06Silicon Image, Inc.Mechanism for internal processing of content through partial authentication on secondary channel
US8386501B2 (en)2010-10-202013-02-26Microsoft CorporationDynamically splitting multi-tenant databases
JP5824257B2 (en)*2011-06-292015-11-25キヤノン株式会社 Image processing apparatus, control method thereof, and program
US9100324B2 (en)*2011-10-182015-08-04Secure Crossing Research & Development, Inc.Network protocol analyzer apparatus and method
US9973335B2 (en)2012-03-282018-05-15Intel CorporationShared buffers for processing elements on a network device
JP5784562B2 (en)*2012-09-072015-09-24株式会社東芝 Communication apparatus and program
US9176838B2 (en)*2012-10-192015-11-03Intel CorporationEncrypted data inspection in a network environment
WO2014207929A1 (en)*2013-06-282014-12-31富士通株式会社Information processing device, terminal, information processing system, and information processing method
US9930013B2 (en)*2014-11-142018-03-27Cisco Technology, Inc.Control of out-of-band multipath connections
US9923719B2 (en)*2014-12-092018-03-20Cryptography Research, Inc.Location aware cryptography
FR3030162B1 (en)*2014-12-102017-01-27Thales Sa METHOD FOR EXCHANGING DIGITAL DATA FRAMES AND ASSOCIATED COMMUNICATION SYSTEM
US10084820B2 (en)*2015-02-272018-09-25Konica Minolta Laboratory U.S.A., Inc.Method and system for IPSec security for IPP-USB data
JP6438850B2 (en)*2015-06-102018-12-19株式会社日立製作所 Evaluation system
US10425430B2 (en)2016-04-222019-09-24Expanse, Inc.Hierarchical scanning of internet connected assets
JP6699377B2 (en)*2016-06-092020-05-27富士ゼロックス株式会社 Communication data relay device and program
JP7131045B2 (en)*2018-04-132022-09-06ブラザー工業株式会社 Program and communication system
US11310246B2 (en)*2018-08-102022-04-19Cisco Technology, Inc.Endpoint-assisted inspection of encrypted network traffic
CN110311785B (en)*2019-06-102022-06-07平安科技(深圳)有限公司Intranet access method and related device
CN111181985B (en)*2019-12-312022-11-11奇安信科技集团股份有限公司 Data transmission method, data transmission system, firewall device and storage medium
US11496504B2 (en)*2020-04-132022-11-08Juniper Networks, Inc.SSL proxy whitelisting

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6151675A (en)*1998-07-232000-11-21Tumbleweed Software CorporationMethod and apparatus for effecting secure document format conversion
US20010009025A1 (en)*2000-01-182001-07-19Ahonen Pasi Matti KaleviVirtual private networks
US20010020275A1 (en)*2000-03-042001-09-06Arkko JariCommunication node, communication network and method of recovering from a temporary failure of a node
US6330562B1 (en)*1999-01-292001-12-11International Business Machines CorporationSystem and method for managing security objects
US20020069356A1 (en)*2000-06-122002-06-06Kwang Tae KimIntegrated security gateway apparatus
US20020091921A1 (en)*2001-01-052002-07-11International Business Machines CorporationEstablishing consistent, end-to-end protection for a user datagram
US20020129271A1 (en)*2001-03-122002-09-12Lucent Technologies Inc.Method and apparatus for order independent processing of virtual private network protocols
US20020138623A1 (en)*2001-03-212002-09-26International Business Machines CorporationSystem and method for nesting virtual private networking connections with coincident endpoints
US6560705B1 (en)*2000-02-232003-05-06Sun Microsystems, Inc.Content screening with end-to-end encryption prior to reaching a destination
US6708273B1 (en)*1997-09-162004-03-16Safenet, Inc.Apparatus and method for implementing IPSEC transforms within an integrated circuit
US20050091527A1 (en)*2000-12-202005-04-28Swander Brian D.System and method for improved network security

Family Cites Families (65)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5577209A (en)*1991-07-111996-11-19Itt CorporationApparatus and method for providing multi-level security for communication among computers and terminals on a network
US5835726A (en)*1993-12-151998-11-10Check Point Software Technologies Ltd.System for securing the flow of and selectively modifying packets in a computer network
FR2716323B1 (en)*1994-02-141996-05-03France Telecom Secure system for interconnecting local networks via a public transmission network.
US6091820A (en)*1994-06-102000-07-18Sun Microsystems, Inc.Method and apparatus for achieving perfect forward secrecy in closed user groups
US5732275A (en)*1996-01-111998-03-24Apple Computer, Inc.Method and apparatus for managing and automatically updating software programs
WO1997026735A1 (en)*1996-01-161997-07-24Raptor Systems, Inc.Key management for network communication
US5835729A (en)*1996-09-131998-11-10Silicon Graphics, Inc.Circuit to separate and combine color space component data of a video image
US5983350A (en)*1996-09-181999-11-09Secure Computing CorporationSecure firewall supporting different levels of authentication based on address or encryption status
US6105027A (en)*1997-03-102000-08-15Internet Dynamics, Inc.Techniques for eliminating redundant access checking by access filters
US6092200A (en)*1997-08-012000-07-18Novell, Inc.Method and apparatus for providing a virtual private network
US5958013A (en)*1997-09-111999-09-28International Business Machines CorporationApparatus, methods and computer program products for conducting a persistent session with a host-based application
US6078953A (en)*1997-12-292000-06-20Ukiah Software, Inc.System and method for monitoring quality of service over network
US6195751B1 (en)*1998-01-202001-02-27Sun Microsystems, Inc.Efficient, secure multicasting with minimal knowledge
US6049878A (en)*1998-01-202000-04-11Sun Microsystems, Inc.Efficient, secure multicasting with global knowledge
US6079020A (en)*1998-01-272000-06-20Vpnet Technologies, Inc.Method and apparatus for managing a virtual private network
CA2228687A1 (en)*1998-02-041999-08-04Brett HowardSecured virtual private networks
US6055236A (en)*1998-03-052000-04-253Com CorporationMethod and system for locating network services with distributed network address translation
US7032242B1 (en)*1998-03-052006-04-183Com CorporationMethod and system for distributed network address translation with network security features
US6353614B1 (en)*1998-03-052002-03-053Com CorporationMethod and protocol for distributed network address translation
US6182226B1 (en)*1998-03-182001-01-30Secure Computing CorporationSystem and method for controlling interactions between networks
US6193221B1 (en)*1998-04-102001-02-27Grt, Inc.Method of and apparatus for producing sub-micron bubbles in liquids, slurries, and sludges
US6226751B1 (en)*1998-04-172001-05-01Vpnet Technologies, Inc.Method and apparatus for configuring a virtual private network
US6165319A (en)1998-05-112000-12-26Fort James CorporationPrinted, soft, bulky single-ply absorbent paper having a serpentine configuration and low sidedness and methods for its manufacture
US6253321B1 (en)1998-06-192001-06-26Ssh Communications Security Ltd.Method and arrangement for implementing IPSEC policy management using filter code
US6269099B1 (en)*1998-07-012001-07-313Com CorporationProtocol and method for peer network device discovery
US6304973B1 (en)*1998-08-062001-10-16Cryptek Secure Communications, LlcMulti-level security network system
WO2000019678A2 (en)1998-09-302000-04-06Siemens AktiengesellschaftArrangement and method for encoding and decoding digital data according to the internet protocol
US6038322A (en)*1998-10-202000-03-14Cisco Technology, Inc.Group key distribution
US6275588B1 (en)*1998-11-122001-08-14I-Data International A/SApparatus and method for performing and controlling encryption/decryption for data to be transmitted on local area network
US6006259A (en)*1998-11-201999-12-21Network Alchemy, Inc.Method and apparatus for an internet protocol (IP) network clustering system
US6636898B1 (en)*1999-01-292003-10-21International Business Machines CorporationSystem and method for central management of connections in a virtual private network
US6662221B1 (en)*1999-04-122003-12-09Lucent Technologies Inc.Integrated network and service management with automated flow through configuration and provisioning of virtual private networks
US6684336B1 (en)*1999-04-302004-01-27Hewlett-Packard Development Company, L.P.Verification by target end system of intended data transfer operation
US6883100B1 (en)*1999-05-102005-04-19Sun Microsystems, Inc.Method and system for dynamic issuance of group certificates
US6496867B1 (en)*1999-08-272002-12-173Com CorporationSystem and method to negotiate private network addresses for initiating tunneling associations through private and/or public networks
WO2001016766A1 (en)1999-08-312001-03-08Science Applications International CorporationSystem and method for interconnecting multiple virtual private networks
US6289382B1 (en)*1999-08-312001-09-11Andersen Consulting, LlpSystem, method and article of manufacture for a globally addressable interface in a communication services patterns environment
US6332163B1 (en)*1999-09-012001-12-18Accenture, LlpMethod for providing communication services over a computer network system
ATE452489T1 (en)1999-10-142010-01-15Alcatel Lucent METHOD FOR CONNECTING A USER TERMINAL TO A SECOND USER TERMINAL, APPARATUS AND SOFTWARE MODULE THEREFOR
JP2001160828A (en)1999-12-032001-06-12Matsushita Electric Ind Co Ltd VPN communication method in security gateway device
US7320034B2 (en)*2000-03-202008-01-15International Business Machines CorporationSystem and method for reserving a virtual connection in an IP network
AU2001257306A1 (en)*2000-04-272001-11-07Fortress Technologies, Inc.A method and apparatus for integrating tunneling protocols with standard routingprotocols
JP3730480B2 (en)*2000-05-232006-01-05株式会社東芝 Gateway device
GB2365717B (en)*2000-05-242004-01-21Ericsson Telefon Ab L MIPsec processing
JP4099930B2 (en)*2000-06-022008-06-11株式会社日立製作所 Router device and VPN identification information setting method
US6826684B1 (en)*2000-08-282004-11-30Verizon Corporate Services Group Inc.Sliding scale adaptive self-synchronized dynamic address translation
US7181012B2 (en)*2000-09-112007-02-20Telefonaktiebolaget Lm Ericsson (Publ)Secured map messages for telecommunications networks
US6954790B2 (en)*2000-12-052005-10-11Interactive People Unplugged AbNetwork-based mobile workgroup system
US20050088977A1 (en)*2000-12-142005-04-28Nortel Networks LimitedDynamic virtual private network (VPN) tunnel quality of service (QoS) treatment
US7426566B2 (en)*2001-01-172008-09-16International Business Machines CorporationMethods, systems and computer program products for security processing inbound communications in a cluster computing environment
US7146432B2 (en)*2001-01-172006-12-05International Business Machines CorporationMethods, systems and computer program products for providing failure recovery of network secure communications in a cluster computing environment
US7209479B2 (en)*2001-01-182007-04-24Science Application International Corp.Third party VPN certification
US7159031B1 (en)*2001-01-262007-01-02Fortinet, Inc.Remote customer management of virtual routers allocated to the customer
US20020144144A1 (en)*2001-03-272002-10-03Jeffrey WeissMethod and system for common control of virtual private network devices
US6938155B2 (en)*2001-05-242005-08-30International Business Machines CorporationSystem and method for multiple virtual private network authentication schemes
US7003662B2 (en)*2001-05-242006-02-21International Business Machines CorporationSystem and method for dynamically determining CRL locations and access methods
US7107464B2 (en)*2001-07-102006-09-12Telecom Italia S.P.A.Virtual private network mechanism incorporating security association processor
US7171685B2 (en)*2001-08-232007-01-30International Business Machines CorporationStandard format specification for automatically configuring IP security tunnels
US7162630B2 (en)*2001-08-312007-01-09Adaptec, Inc.Systems and methods for implementing host-based security in a computer network
FI20011949A0 (en)*2001-10-052001-10-05Stonesoft Corp Managing a Virtual Private Network
US6789121B2 (en)*2002-02-082004-09-07Nortel Networks LimitedMethod of providing a virtual private network service through a shared network, and provider edge device for such network
US7203957B2 (en)*2002-04-042007-04-10At&T Corp.Multipoint server for providing secure, scaleable connections between a plurality of network devices
US20040066747A1 (en)*2002-10-022004-04-08Ben JorgensenMethods and structure for automated troubleshooting of a virtual private network connection
US7574738B2 (en)2002-11-062009-08-11At&T Intellectual Property Ii, L.P.Virtual private network crossovers based on certificates
US20040093492A1 (en)*2002-11-132004-05-13Olivier DaudeVirtual private network management with certificates

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6708273B1 (en)*1997-09-162004-03-16Safenet, Inc.Apparatus and method for implementing IPSEC transforms within an integrated circuit
US6151675A (en)*1998-07-232000-11-21Tumbleweed Software CorporationMethod and apparatus for effecting secure document format conversion
US6330562B1 (en)*1999-01-292001-12-11International Business Machines CorporationSystem and method for managing security objects
US20010009025A1 (en)*2000-01-182001-07-19Ahonen Pasi Matti KaleviVirtual private networks
US6560705B1 (en)*2000-02-232003-05-06Sun Microsystems, Inc.Content screening with end-to-end encryption prior to reaching a destination
US20010020275A1 (en)*2000-03-042001-09-06Arkko JariCommunication node, communication network and method of recovering from a temporary failure of a node
US20020069356A1 (en)*2000-06-122002-06-06Kwang Tae KimIntegrated security gateway apparatus
US20050091527A1 (en)*2000-12-202005-04-28Swander Brian D.System and method for improved network security
US20020091921A1 (en)*2001-01-052002-07-11International Business Machines CorporationEstablishing consistent, end-to-end protection for a user datagram
US20020129271A1 (en)*2001-03-122002-09-12Lucent Technologies Inc.Method and apparatus for order independent processing of virtual private network protocols
US20020138623A1 (en)*2001-03-212002-09-26International Business Machines CorporationSystem and method for nesting virtual private networking connections with coincident endpoints

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100226383A1 (en)*2005-01-202010-09-09Cisco Technology, Inc.Inline Intrusion Detection
US9009830B2 (en)*2005-01-202015-04-14Cisco Technology, Inc.Inline intrusion detection
US11409770B2 (en)*2015-03-262022-08-09Oracle International CorporationMulti-distance similarity analysis with tri-point arbitration
US20220400011A1 (en)*2021-06-152022-12-15Whitestar Communications, Inc.Anti-replay protection based on hashing encrypted temporal key in a secure peer-to-peer data network
US12126728B2 (en)*2021-06-152024-10-22Whitestar Communications, Inc.Anti-replay protection based on hashing encrypted temporal key in a secure peer-to-peer data network

Also Published As

Publication numberPublication date
US20030191963A1 (en)2003-10-09
US7543332B2 (en)2009-06-02
US20070016947A1 (en)2007-01-18
US20070169187A1 (en)2007-07-19
FR2839226A1 (en)2003-10-31
US7448081B2 (en)2008-11-04
US8136152B2 (en)2012-03-13
US20080192930A1 (en)2008-08-14
US7188365B2 (en)2007-03-06
FR2839226B1 (en)2005-07-08

Similar Documents

PublicationPublication DateTitle
US7448081B2 (en)Method and system for securely scanning network traffic
US11283772B2 (en)Method and system for sending a message through a secure connection
US6931529B2 (en)Establishing consistent, end-to-end protection for a user datagram
US20030191843A1 (en)Secure network connection for devices on a private network
US7856655B2 (en)System and method for improved network security
US7660980B2 (en)Establishing secure TCP/IP communications using embedded IDs
US20030191937A1 (en)Multipoint server for providing secure, scaleable connections between a plurality of network devices
KR100839941B1 (en) Abnormal ISP traffic control system using IP setting information and session information and control method thereof
KR20090098542A (en) Encrypted data communication system and encrypted data communication method using proxy
JP4783340B2 (en) Protecting data traffic in a mobile network environment
BellovinGuidelines for specifying the use of ipsec version 2
CiscoIntroduction to Cisco IPsec Technology
CiscoIntroduction to Cisco IPsec Technology
CiscoConfiguring IPSec Network Security
Khandkar et al.Masking host identity on internet: Encrypted TLS/SSL handshake
Arora et al.Comparison of VPN protocols–IPSec, PPTP, and L2TP
Murhammer et al.A Comprehensive Guide to Virtual Private Networks, Volume III: Cross-Platform Key and Policy Management
SchaferIntroduction to Network Security
SwamiDesign of IPsec and IKE version 1 and 2
CremersSecurity Protocols II
GolenIPSec–A Network Layer Security Protocol

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:WORCESTER TECHNOLOGIES LLC, DELAWARE

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AT&T INTELLECTUAL PROPERTY II, L.P.;REEL/FRAME:027612/0017

Effective date:20110923

ASAssignment

Owner name:INTELLECTUAL VENTURES II LLC, DELAWARE

Free format text:MERGER;ASSIGNOR:WORCESTER TECHNOLOGIES LLC;REEL/FRAME:030638/0027

Effective date:20130523

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp