Movatterモバイル変換


[0]ホーム

URL:


US20140090014A1 - Policy-based content filtering - Google Patents

Policy-based content filtering
Download PDF

Info

Publication number
US20140090014A1
US20140090014A1US14/093,142US201314093142AUS2014090014A1US 20140090014 A1US20140090014 A1US 20140090014A1US 201314093142 AUS201314093142 AUS 201314093142AUS 2014090014 A1US2014090014 A1US 2014090014A1
Authority
US
United States
Prior art keywords
firewall
network
policy
content filtering
firewall security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/093,142
Inventor
William J. Crawford
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fortinet Inc
Original Assignee
Fortinet Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filedlitigationCriticalhttps://patents.darts-ip.com/?family=38054930&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20140090014(A1)"Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Fortinet IncfiledCriticalFortinet Inc
Priority to US14/093,142priorityCriticalpatent/US20140090014A1/en
Publication of US20140090014A1publicationCriticalpatent/US20140090014A1/en
Priority to US14/452,292prioritypatent/US9729508B2/en
Priority to US14/791,422prioritypatent/US9762540B2/en
Priority to US15/670,254prioritypatent/US10084750B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods and systems for processing application-level content of network service protocols are described. According to one embodiment, a firewall device maintains a policy database including multiple policies. The policies includes information regarding an action to take with respect to a network session based on a set of source internet protocol (IP) addresses, a set of destination IP addresses and/or a network service protocol. When the action is to allow the network session, the policy also includes information regarding a configuration scheme defining administrator-configurable content filtering processes to be performed on traffic associated with the network session. Policy-based content filtering is performed by the firewall device by (i) identifying a matching policy for the network session at issue; (ii) identifying multiple content filtering processes to be performed on the traffic based on the configuration scheme associated with the matching policy; and (iii) applying the identified content filtering processes on the traffic.

Description

Claims (14)

What is claimed is:
1. A computer-implemented method comprising:
maintaining, by a firewall device, a security policy database including information defining a plurality of firewall security policies, wherein the information defining the plurality of firewall security policies includes, for each firewall security policy of the plurality of firewall security policies, an action to take with respect to a particular network session based on one or more of a set of one or more source internet protocol (IP) addresses, a set of one or more destination IP addresses and a network service protocol;
when the action to take for a firewall security policy of the plurality of firewall security policies is to allow the particular network session to pass through the firewall device, then the firewall security policy also includes information regarding a configuration scheme defining a set of administrator-configurable content filtering processes to be performed on traffic associated with the particular network session; and
performing, by the firewall device, policy-based content filtering of a plurality of network sessions by, for each network session of the plurality of network sessions:
identifying a firewall security policy from among the plurality of firewall security policies that matches traffic associated with the network session;
identifying a plurality of content filtering processes to be performed on the traffic based on the configuration scheme associated with the matching firewall security policy; and
applying the identified plurality of content filtering processes on the traffic.
2. The method ofclaim 1, further comprising:
processing application-level content of a packet stream associated with the network session by
reassembling the application-level content from a plurality of packets of the packet stream; and
scanning the application-level content based on the identified plurality of content filtering processes.
3. The method ofclaim 2, wherein the network service protocol comprises at least one of a group consisting of HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Internet Message Access Protocol (IMAP) and Server Message Block/Common Internet File System (SMB/CIFS).
4. The method ofclaim 3, further comprising receiving from a network administrator, by the firewall device, via a graphical user interface, selections indicative of the content filtering processes to be performed on the traffic associated with the particular network session.
5. The method ofclaim 4, wherein content filtering options available to the network administrator via the graphical user interface include at least antivirus scanning, Uniform Resource Locator (URL) blocking and file blocking.
6. The method ofclaim 5, wherein the content filtering options available to the network administrator via the graphical user interface further include one or more of banned word filtering and spam blocking.
7. The method ofclaim 5, wherein the file blocking comprises blocking transmission of specific file types.
8. A non-transitory computer-readable storage medium tangibly embodying a set of instructions, which when executed by one or more processors of a firewall system, cause the one or more processors to perform a method comprising:
maintaining a security policy database including information defining a plurality of firewall security policies, wherein the information defining the plurality of firewall security policies includes, for each firewall security policy of the plurality of firewall security policies, an action to take with respect to a particular network session based on one or more of a set of one or more source internet protocol (IP) addresses, a set of one or more destination IP addresses and a network service protocol;
when the action to take for a firewall security policy of the plurality of firewall security policies is to allow the particular network session to pass through the firewall device, then the firewall security policy also includes information regarding a configuration scheme defining a set of administrator-configurable content filtering processes to be performed on traffic associated with the particular network session; and
performing policy-based content filtering of a plurality of network sessions by, for each network session of the plurality of network sessions:
identifying a firewall security policy from among the plurality of firewall security policies that matches traffic associated with the network session;
identifying a plurality of content filtering processes to be performed on the traffic based on the configuration scheme associated with the matching firewall security policy; and
applying the identified plurality of content filtering processes on the traffic.
9. The computer-readable storage medium ofclaim 8, wherein the method further comprises:
processing application-level content of a packet stream associated with the network session by
reassembling the application-level content from a plurality of packets of the packet stream; and
scanning the application-level content based on the identified plurality of content filtering processes.
10. The computer-readable storage medium ofclaim 9, wherein the network service protocol comprises at least one of a group consisting of HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Internet Message Access Protocol (IMAP) and Server Message Block/Common Internet File System (SMB/CIFS).
11. The computer-readable storage medium ofclaim 10, wherein the method further comprises receiving from a network administrator via a graphical user interface selections indicative of the content filtering processes to be performed on the traffic associated with the particular network session.
12. The computer-readable storage medium ofclaim 11, wherein content filtering options available to the network administrator via the graphical user interface include at least antivirus scanning, Uniform Resource Locator (URL) blocking and file blocking.
13. The computer-readable storage medium ofclaim 12, wherein the content filtering options available to the network administrator via the graphical user interface further include one or more of banned word filtering and spam blocking.
14. The computer-readable storage medium ofclaim 12, wherein the file blocking comprises blocking transmission of specific file types.
US14/093,1422005-11-222013-11-29Policy-based content filteringAbandonedUS20140090014A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US14/093,142US20140090014A1 (en)2005-11-222013-11-29Policy-based content filtering
US14/452,292US9729508B2 (en)2005-11-222014-08-05Policy-based content filtering
US14/791,422US9762540B2 (en)2005-11-222015-07-04Policy based content filtering
US15/670,254US10084750B2 (en)2005-11-222017-08-07Policy-based content filtering

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US11/283,891US7966654B2 (en)2005-11-222005-11-22Computerized system and method for policy-based content filtering
US13/114,292US8205251B2 (en)2005-11-222011-05-24Policy-based content filtering
US13/526,510US8656479B2 (en)2005-11-222012-06-18Policy-based content filtering
US14/093,142US20140090014A1 (en)2005-11-222013-11-29Policy-based content filtering

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/526,510ContinuationUS8656479B2 (en)2005-11-222012-06-18Policy-based content filtering

Related Child Applications (2)

Application NumberTitlePriority DateFiling Date
US14/452,292ContinuationUS9729508B2 (en)2005-11-222014-08-05Policy-based content filtering
US14/791,422ContinuationUS9762540B2 (en)2005-11-222015-07-04Policy based content filtering

Publications (1)

Publication NumberPublication Date
US20140090014A1true US20140090014A1 (en)2014-03-27

Family

ID=38054930

Family Applications (8)

Application NumberTitlePriority DateFiling Date
US11/283,891Active2029-05-16US7966654B2 (en)2005-11-222005-11-22Computerized system and method for policy-based content filtering
US13/114,292ActiveUS8205251B2 (en)2005-11-222011-05-24Policy-based content filtering
US13/526,510ActiveUS8656479B2 (en)2005-11-222012-06-18Policy-based content filtering
US14/093,133ActiveUS8813215B2 (en)2005-11-222013-11-29Policy-based content filtering
US14/093,142AbandonedUS20140090014A1 (en)2005-11-222013-11-29Policy-based content filtering
US14/452,292ActiveUS9729508B2 (en)2005-11-222014-08-05Policy-based content filtering
US14/791,422ActiveUS9762540B2 (en)2005-11-222015-07-04Policy based content filtering
US15/670,254ActiveUS10084750B2 (en)2005-11-222017-08-07Policy-based content filtering

Family Applications Before (4)

Application NumberTitlePriority DateFiling Date
US11/283,891Active2029-05-16US7966654B2 (en)2005-11-222005-11-22Computerized system and method for policy-based content filtering
US13/114,292ActiveUS8205251B2 (en)2005-11-222011-05-24Policy-based content filtering
US13/526,510ActiveUS8656479B2 (en)2005-11-222012-06-18Policy-based content filtering
US14/093,133ActiveUS8813215B2 (en)2005-11-222013-11-29Policy-based content filtering

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US14/452,292ActiveUS9729508B2 (en)2005-11-222014-08-05Policy-based content filtering
US14/791,422ActiveUS9762540B2 (en)2005-11-222015-07-04Policy based content filtering
US15/670,254ActiveUS10084750B2 (en)2005-11-222017-08-07Policy-based content filtering

Country Status (2)

CountryLink
US (8)US7966654B2 (en)
CN (1)CN1972297B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140075497A1 (en)*2012-09-132014-03-13Cisco Technology, Inc.Early Policy Evaluation of Multiphase Attributes in High-Performance Firewalls
US8813215B2 (en)2005-11-222014-08-19Fortinet, Inc.Policy-based content filtering
CN106161378A (en)*2015-04-132016-11-23中国移动通信集团公司Security service device, method and business processing device, method and system
CN106936719A (en)*2017-05-172017-07-07济南浪潮高新科技投资发展有限公司A kind of IP messages strategy matching method
CN111277586A (en)*2020-01-172020-06-12武汉思普崚技术有限公司Method and device for adjusting firewall security policy
US11368474B2 (en)*2018-01-232022-06-21Rapid7, Inc.Detecting anomalous internet behavior

Families Citing this family (175)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP4386732B2 (en)2002-01-082009-12-16セブン ネットワークス, インコーポレイテッド Mobile network connection architecture
CN102355466B (en)2004-04-302016-01-20黑莓有限公司The system and method for deal with data transmission
US8438633B1 (en)2005-04-212013-05-07Seven Networks, Inc.Flexible real-time inbox access
WO2006136660A1 (en)2005-06-212006-12-28Seven Networks International OyMaintaining an ip connection in a mobile network
US8468589B2 (en)2006-01-132013-06-18Fortinet, Inc.Computerized system and method for advanced network content processing
US8381297B2 (en)2005-12-132013-02-19Yoggie Security Systems Ltd.System and method for providing network security to mobile devices
US8869270B2 (en)2008-03-262014-10-21Cupp Computing AsSystem and method for implementing content and network security inside a chip
US20080276302A1 (en)2005-12-132008-11-06Yoggie Security Systems Ltd.System and Method for Providing Data and Device Security Between External and Host Devices
US8561127B1 (en)*2006-03-012013-10-15Adobe Systems IncorporatedClassification of security sensitive information and application of customizable security policies
GB2432933B (en)*2006-03-142008-07-09Streamshield Networks LtdA method and apparatus for providing network security
US8122492B2 (en)*2006-04-212012-02-21Microsoft CorporationIntegration of social network information and network firewalls
US8079073B2 (en)*2006-05-052011-12-13Microsoft CorporationDistributed firewall implementation and control
US8176157B2 (en)*2006-05-182012-05-08Microsoft CorporationExceptions grouping
GB2444514A (en)*2006-12-042008-06-11GlasswallElectronic file re-generation
US8166534B2 (en)*2007-05-182012-04-24Microsoft CorporationIncorporating network connection security levels into firewall rules
US8365272B2 (en)2007-05-302013-01-29Yoggie Security Systems Ltd.System and method for providing network and computer firewall protection with dynamic address isolation to a device
US8805425B2 (en)2007-06-012014-08-12Seven Networks, Inc.Integrated messaging
US8984620B2 (en)*2007-07-062015-03-17Cyberoam Technologies Pvt. Ltd.Identity and policy-based network security and management system and method
WO2009008003A2 (en)*2007-07-102009-01-15Bhavin TurakhiaMethod and system for restricting access of one or more users to a service
US8132248B2 (en)*2007-07-182012-03-06Trend Micro IncorporatedManaging configurations of a firewall
JP2009044230A (en)*2007-08-062009-02-26Toshiba Corp Communication device and network connection management program
US9002828B2 (en)2007-12-132015-04-07Seven Networks, Inc.Predictive content delivery
US8862657B2 (en)2008-01-252014-10-14Seven Networks, Inc.Policy based content service
US20090193338A1 (en)2008-01-282009-07-30Trevor FiatalReducing network and battery consumption during content delivery and playback
US20090270141A1 (en)*2008-04-292009-10-29Sony Ericsson Mobile Communications AbApparatus having input means with rugged surface
US9769053B2 (en)*2008-07-302017-09-19Tekelec Global, Inc.Methods, systems, and computer readable media for implementing a policy for a router
US8631488B2 (en)*2008-08-042014-01-14Cupp Computing AsSystems and methods for providing security services during power management mode
US8909759B2 (en)2008-10-102014-12-09Seven Networks, Inc.Bandwidth measurement
WO2010059747A2 (en)2008-11-182010-05-27Workshare Technology, Inc.Methods and systems for exact data match filtering
US8789202B2 (en)2008-11-192014-07-22Cupp Computing AsSystems and methods for providing real time access monitoring of a removable media device
US9494931B2 (en)*2009-09-232016-11-15Fisher-Rosemount Systems, Inc.Dynamic hyperlinks for process control systems
US9350705B2 (en)2010-06-252016-05-24Salesforce.Com, Inc.Methods and systems for providing a token-based application firewall correlation
US9160710B2 (en)2010-06-252015-10-13Salesforce.Com, Inc.Methods and systems for context-based application firewalls
US8838783B2 (en)2010-07-262014-09-16Seven Networks, Inc.Distributed caching for resource and mobile network traffic management
EP2599003B1 (en)2010-07-262018-07-11Seven Networks, LLCMobile network traffic coordination across multiple applications
WO2012060995A2 (en)2010-11-012012-05-10Michael LunaDistributed caching in a wireless network of content delivered for a mobile application over a long-held request
US8843153B2 (en)2010-11-012014-09-23Seven Networks, Inc.Mobile traffic categorization and policy for network use optimization while preserving user experience
US8484314B2 (en)2010-11-012013-07-09Seven Networks, Inc.Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
GB2500327B (en)2010-11-222019-11-06Seven Networks LlcOptimization of resource polling intervals to satisfy mobile device requests
US20120133989A1 (en)2010-11-292012-05-31Workshare Technology, Inc.System and method for providing a common framework for reviewing comparisons of electronic documents
US10783326B2 (en)2013-03-142020-09-22Workshare, Ltd.System for tracking changes in a collaborative document editing environment
US11030163B2 (en)2011-11-292021-06-08Workshare, Ltd.System for tracking and displaying changes in a set of related electronic documents
CN102571751B (en)*2010-12-242014-12-31佳能It解决方案株式会社Relay processing device and control method therefor
EP2661697B1 (en)2011-01-072018-11-21Seven Networks, LLCSystem and method for reduction of mobile network traffic used for domain name system (dns) queries
US8806569B2 (en)*2011-02-072014-08-12Tufin Software Technologies Ltd.Method and system for analyzing security ruleset by generating a logically equivalent security rule-set
US9578030B2 (en)2011-02-072017-02-21Tufin Software Technologies Ltd.Method and system for analyzing security ruleset by generating a logically equivalent security rule-set
EP2700020A4 (en)2011-04-192015-01-07Seven Networks IncDevice resource sharing for network resource conservation
WO2012149216A2 (en)2011-04-272012-11-01Seven Networks, Inc.Mobile device which offloads requests made by a mobile application to a remote entity for conservation of mobile device and network resources and methods therefor
US8621075B2 (en)2011-04-272013-12-31Seven Metworks, Inc.Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
US9948676B2 (en)2013-07-252018-04-17Workshare, Ltd.System and method for securing documents prior to transmission
US10963584B2 (en)2011-06-082021-03-30Workshare Ltd.Method and system for collaborative editing of a remotely stored document
US9613340B2 (en)2011-06-142017-04-04Workshare Ltd.Method and system for shared document approval
US10880359B2 (en)2011-12-212020-12-29Workshare, Ltd.System and method for cross platform document sharing
US9170990B2 (en)2013-03-142015-10-27Workshare LimitedMethod and system for document retrieval with selective document comparison
US10574729B2 (en)*2011-06-082020-02-25Workshare Ltd.System and method for cross platform document sharing
US8881258B2 (en)2011-08-242014-11-04Mcafee, Inc.System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy
US9161226B2 (en)2011-10-172015-10-13Blackberry LimitedAssociating services to perimeters
US9613219B2 (en)*2011-11-102017-04-04Blackberry LimitedManaging cross perimeter access
US8934414B2 (en)2011-12-062015-01-13Seven Networks, Inc.Cellular or WiFi mobile traffic optimization based on public or private network destination
EP2789138B1 (en)2011-12-062016-09-14Seven Networks, LLCA mobile device and method to utilize the failover mechanisms for fault tolerance provided for mobile traffic management and network/device resource conservation
US9208123B2 (en)*2011-12-072015-12-08Seven Networks, LlcMobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor
US9277443B2 (en)2011-12-072016-03-01Seven Networks, LlcRadio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US20130159511A1 (en)2011-12-142013-06-20Seven Networks, Inc.System and method for generating a report to a network operator by distributing aggregation of data
CN102591791B (en)*2011-12-312016-08-03深圳市中兴昆腾有限公司A kind of system and method for reducing data storage capacity by defining strategy
EP2801236A4 (en)2012-01-052015-10-21Seven Networks IncDetection and management of user interactions with foreground applications on a mobile device in distributed caching
US8812695B2 (en)2012-04-092014-08-19Seven Networks, Inc.Method and system for management of a virtual network connection without heartbeat messages
US10263899B2 (en)2012-04-102019-04-16Seven Networks, LlcEnhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network
US9348927B2 (en)2012-05-072016-05-24Smart Security Systems LlcSystems and methods for detecting, identifying and categorizing intermediate nodes
US9325676B2 (en)2012-05-242016-04-26Ip Ghoster, Inc.Systems and methods for protecting communications between nodes
US10778659B2 (en)2012-05-242020-09-15Smart Security Systems LlcSystem and method for protecting communications
US9369466B2 (en)2012-06-212016-06-14Blackberry LimitedManaging use of network resources
US8775631B2 (en)2012-07-132014-07-08Seven Networks, Inc.Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
IL221175A (en)*2012-07-292017-08-31Verint Systems LtdSystem and method for automatic provisioning of multi-stage rule-based traffic filtering
US9602539B1 (en)*2012-09-282017-03-21Palo Alto Networks, Inc.Externally defined objects in security policy
WO2014059037A2 (en)2012-10-092014-04-17Cupp Computing AsTransaction security systems and methods
US9161258B2 (en)2012-10-242015-10-13Seven Networks, LlcOptimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
WO2014077615A1 (en)*2012-11-192014-05-22Samsung Sds Co., Ltd.Anti-malware system, method of processing packet in the same, and computing device
US20140177497A1 (en)2012-12-202014-06-26Seven Networks, Inc.Management of mobile device radio state promotion and demotion
US9241314B2 (en)2013-01-232016-01-19Seven Networks, LlcMobile device with application or context aware fast dormancy
US8874761B2 (en)2013-01-252014-10-28Seven Networks, Inc.Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US9326185B2 (en)2013-03-112016-04-26Seven Networks, LlcMobile network congestion recognition for optimization of mobile traffic
US11567907B2 (en)2013-03-142023-01-31Workshare, Ltd.Method and system for comparing document versions encoded in a hierarchical representation
US11157976B2 (en)2013-07-082021-10-26Cupp Computing AsSystems and methods for providing digital content marketplace security
US9065765B2 (en)2013-07-222015-06-23Seven Networks, Inc.Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
US10911492B2 (en)2013-07-252021-02-02Workshare Ltd.System and method for securing documents prior to transmission
KR102005408B1 (en)2013-08-082019-07-30삼성전자주식회사Method and apparatus for registering and authenticating a device in a wireless communication system
CN104580078B (en)*2013-10-152018-04-17北京神州泰岳软件股份有限公司A kind of method for network access control and system
CN103580919B (en)*2013-11-042017-11-17复旦大学A kind of method and system that mail user mark is carried out using mail server daily record
US10382595B2 (en)2014-01-292019-08-13Smart Security Systems LlcSystems and methods for protecting communications
WO2015123611A2 (en)2014-02-132015-08-20Cupp Computing AsSystems and methods for providing network security using a secure digital device
US9215214B2 (en)2014-02-202015-12-15Nicira, Inc.Provisioning firewall rules on a firewall enforcing device
CN105141571A (en)*2014-06-092015-12-09中兴通讯股份有限公司Distributed virtual firewall device and method
US9756485B2 (en)*2014-10-022017-09-05Deborah Lynn PinardMethods and systems for walkie-talkie communications
US11182551B2 (en)2014-12-292021-11-23Workshare Ltd.System and method for determining document version geneology
US10133723B2 (en)2014-12-292018-11-20Workshare Ltd.System and method for determining document version geneology
US9264370B1 (en)2015-02-102016-02-16Centripetal Networks, Inc.Correlating packets in communications networks
US10114966B2 (en)2015-03-192018-10-30Netskope, Inc.Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (CCS)
US9866576B2 (en)2015-04-172018-01-09Centripetal Networks, Inc.Rule-based network-threat detection
US9806948B2 (en)2015-06-302017-10-31Nicira, Inc.Providing firewall rules for workload spread across multiple data centers
US11763013B2 (en)2015-08-072023-09-19Workshare, Ltd.Transaction document management system and method
US9723027B2 (en)*2015-11-102017-08-01Sonicwall Inc.Firewall informed by web server security policy identifying authorized resources and hosts
US9860259B2 (en)2015-12-102018-01-02Sonicwall Us Holdings Inc.Reassembly free deep packet inspection for peer to peer networks
CN106936799B (en)*2015-12-312021-05-04阿里巴巴集团控股有限公司Message cleaning method and device
US11405423B2 (en)2016-03-112022-08-02Netskope, Inc.Metadata-based data loss prevention (DLP) for cloud resources
US10938781B2 (en)2016-04-222021-03-02Sophos LimitedSecure labeling of network flows
US11277416B2 (en)2016-04-222022-03-15Sophos LimitedLabeling network flows according to source applications
US11165797B2 (en)2016-04-222021-11-02Sophos LimitedDetecting endpoint compromise based on network usage history
US11102238B2 (en)2016-04-222021-08-24Sophos LimitedDetecting triggering events for distributed denial of service attacks
US10986109B2 (en)2016-04-222021-04-20Sophos LimitedLocal proxy detection
US10348685B2 (en)2016-04-292019-07-09Nicira, Inc.Priority allocation for distributed service rules
US11425095B2 (en)2016-05-012022-08-23Nicira, Inc.Fast ordering of firewall sections and rules
US11171920B2 (en)2016-05-012021-11-09Nicira, Inc.Publication of firewall configuration
ES2728292T3 (en)2016-05-172019-10-23Nolve Dev S L Server and method to provide secure access to network-based services
US10270788B2 (en)2016-06-062019-04-23Netskope, Inc.Machine learning based anomaly detection
US12021831B2 (en)2016-06-102024-06-25Sophos LimitedNetwork security
US11258761B2 (en)*2016-06-292022-02-22Nicira, Inc.Self-service firewall configuration
US11082400B2 (en)2016-06-292021-08-03Nicira, Inc.Firewall configuration versioning
US10476907B2 (en)2016-08-102019-11-12Netskope, Inc.Systems and methods of detecting and responding to a data attack on a file system
US10608881B2 (en)*2016-09-222020-03-31Nicira, Inc.Application-based network segmentation in a virtualized computing environment
DE102016222740A1 (en)*2016-11-182018-05-24Continental Automotive Gmbh Method for a communication network and electronic control unit
CN108243168B (en)*2016-12-272021-07-09比亚迪股份有限公司 Message parsing, packet grouping method and device, and message processing system
CN107425997B (en)*2017-03-272019-08-06烽火通信科技股份有限公司The network architecture and implementation method of class people net
US11233777B2 (en)2017-07-242022-01-25Centripetal Networks, Inc.Efficient SSL/TLS proxy
US10834113B2 (en)2017-07-252020-11-10Netskope, Inc.Compact logging of network traffic events
US10878110B2 (en)2017-09-122020-12-29Sophos LimitedDashboard for managing enterprise network traffic
US10616280B2 (en)2017-10-252020-04-07Bank Of America CorporationNetwork security system with cognitive engine for dynamic automation
US10659482B2 (en)2017-10-252020-05-19Bank Of America CorporationRobotic process automation resource insulation system
US10437984B2 (en)2017-10-262019-10-08Bank Of America CorporationAuthentication protocol elevation triggering system
US10503627B2 (en)2017-10-302019-12-10Bank Of America CorporationRobotic process automation enabled file dissection for error diagnosis and correction
US10686684B2 (en)2017-11-022020-06-16Bank Of America CorporationIndividual application flow isotope tagging within a network infrastructure
US10575231B2 (en)2017-11-032020-02-25Bank Of America CorporationSystem for connection channel adaption using robotic automation
US10606687B2 (en)2017-12-042020-03-31Bank Of America CorporationProcess automation action repository and assembler
US11194930B2 (en)2018-04-272021-12-07Datatrendz, LlcUnobtrusive systems and methods for collecting, processing and securing information transmitted over a network
US10862895B2 (en)*2018-09-282020-12-08Fortinet, Inc.Logical network abstraction for network access control
US11087179B2 (en)2018-12-192021-08-10Netskope, Inc.Multi-label classification of text documents
CN113273140A (en)*2018-12-202021-08-17北京嘀嘀无限科技发展有限公司System and method for managing network communication sessions
US11012518B2 (en)2018-12-202021-05-18Beijing Didi Infinity Technology And Development Co., Ltd.Systems and methods for managing networked communication sessions
CN109525613B (en)*2019-01-162021-11-09湖南快乐阳光互动娱乐传媒有限公司Request processing system and method
US10986150B2 (en)2019-03-012021-04-20Netskope, Inc.Load balancing in a dynamic scalable services mesh
US11310202B2 (en)2019-03-132022-04-19Vmware, Inc.Sharing of firewall rules among multiple workloads in a hypervisor
US11405424B1 (en)2019-05-142022-08-02Juniper Networks, Inc.Displaying a firewall policy interface
US11516242B2 (en)*2019-08-272022-11-29Illumio, Inc.Virtual patching in a label-based segmented network environment
US12063248B2 (en)*2020-06-042024-08-13Palo Alto Networks, Inc.Deep learning for malicious URL classification (URLC) with the innocent until proven guilty (IUPG) learning framework
US11856003B2 (en)2020-06-042023-12-26Palo Alto Networks, Inc.Innocent until proven guilty (IUPG): adversary resistant and false positive resistant deep learning models
CN112437058B (en)*2020-11-112022-02-08中国电子科技集团公司第三十研究所Firewall security policy automatic generation method based on session flow log
US11316741B1 (en)2020-11-232022-04-26Netskope, Inc.Multi-environment networking management system
CN112636953A (en)*2020-12-072021-04-09杭州迪普科技股份有限公司Policy command issuing method and device and electronic equipment
US11222112B1 (en)2021-02-242022-01-11Netskope, Inc.Signatureless detection of malicious MS office documents containing advanced threats in macros
US11336698B1 (en)2021-04-222022-05-17Netskope, Inc.Synthetic request injection for cloud policy enforcement
US12192214B2 (en)2021-05-052025-01-07Sophos LimitedMitigating threats associated with tampering attempts
US11997127B2 (en)2021-05-072024-05-28Netskope, Inc.Policy based vulnerability identification, correlation, remediation, and mitigation
US11671430B2 (en)2021-05-262023-06-06Netskope, Inc.Secure communication session using encryption protocols and digitally segregated secure tunnels
CN113079185B (en)*2021-06-072021-09-24北京网藤科技有限公司Industrial firewall control method and equipment for realizing deep data packet detection control
US11475158B1 (en)2021-07-262022-10-18Netskope, Inc.Customized deep learning classifier for detecting organization sensitive data in images on premises
US11392705B1 (en)2021-07-292022-07-19Netskope, Inc.Disk encryption key management for booting of a device
US11528279B1 (en)2021-11-122022-12-13Netskope, Inc.Automatic user directory synchronization and troubleshooting
US11553008B1 (en)2021-12-302023-01-10Netskope, Inc.Electronic agent scribe and communication protections
US12166782B2 (en)2022-12-052024-12-10Netskope, Inc.Policy-based IP address allocation
US11847486B1 (en)2023-01-312023-12-19Netskope, Inc.Capacity resolver for point of presence (POP) systems
US12243294B1 (en)2023-08-162025-03-04Netskope, Inc.Image fingerprinting conversion between different image fingerprinting models
US12315231B2 (en)2023-08-162025-05-27Netskope, Inc.Image classification and accelerated classification training using deep learning image fingerprinting models and indexed embeddings
US12238177B1 (en)2024-01-262025-02-25Netskope, Inc.Mid-link forensic system for remote application environment
US12197590B1 (en)2024-01-292025-01-14Netskope, Inc.Hierarchical risk scoring for SaaS applications
US12316647B1 (en)2024-01-312025-05-27Netskope, Inc.Video data loss prevention (vDLP)
US12166776B1 (en)2024-01-312024-12-10Netskope, Inc.Middle-ware artificial intelligence (AI) engine
US12244637B1 (en)2024-02-092025-03-04Netskope, Inc.Machine learning powered cloud sandbox for malware detection
US12266209B1 (en)2024-02-262025-04-01Netskope, Inc.Image classifier automated testing and outlier detection
US12255877B1 (en)2024-05-102025-03-18Netskope, Inc.Cloud packet tap
US12273392B1 (en)2024-05-212025-04-08Netskope, Inc.Security and privacy inspection of bidirectional generative artificial intelligence traffic using a forward proxy
US12282545B1 (en)2024-05-212025-04-22Netskope, Inc.Efficient training data generation for training machine learning models for security and privacy inspection of bidirectional generative artificial intelligence traffic
US12284222B1 (en)2024-05-212025-04-22Netskope, Inc.Security and privacy inspection of bidirectional generative artificial intelligence traffic using a reverse proxy
US12278845B1 (en)2024-05-212025-04-15Netskope, Inc.Security and privacy inspection of bidirectional generative artificial intelligence traffic using API notifications
US12245036B1 (en)2024-07-102025-03-04Netskope, Inc.Global secure SIM clientless SASE architecture for cellular devices
US12219360B1 (en)2024-07-242025-02-04Netskope, Inc.Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation
US12361680B1 (en)2024-08-152025-07-15Netskope, Inc.Webpage categorization based on image classification of webpage screen capture

Family Cites Families (39)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4688250A (en)1986-01-291987-08-18Rca CorporationApparatus and method for effecting a key change via a cryptographically protected link
US5864683A (en)1994-10-121999-01-26Secure Computing CorporartionSystem for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5708780A (en)1995-06-071998-01-13Open Market, Inc.Internet server access control and monitoring systems
US5757924A (en)1995-09-181998-05-26Digital Secured Networks Techolognies, Inc.Network security device which performs MAC address translation without affecting the IP address
US5826029A (en)1995-10-311998-10-20International Business Machines CorporationSecured gateway interface
US5790548A (en)1996-04-181998-08-04Bell Atlantic Network Services, Inc.Universal access multimedia data network
US5983350A (en)1996-09-181999-11-09Secure Computing CorporationSecure firewall supporting different levels of authentication based on address or encryption status
US6098172A (en)1997-09-122000-08-01Lucent Technologies Inc.Methods and apparatus for a computer network firewall with proxy reflection
US6058420A (en)1998-02-272000-05-02Netsolve, Inc.Alarm server systems, apparatus, and processes
US6393565B1 (en)1998-08-032002-05-21Entrust Technologies LimitedData management system and method for a limited capacity cryptographic storage unit
US6728885B1 (en)1998-10-092004-04-27Networks Associates Technology, Inc.System and method for network access control using adaptive proxies
US6167445A (en)1998-10-262000-12-26Cisco Technology, Inc.Method and apparatus for defining and implementing high-level quality of service policies in computer networks
US6466976B1 (en)1998-12-032002-10-15Nortel Networks LimitedSystem and method for providing desired service policies to subscribers accessing the internet
US6516053B1 (en)1999-06-212003-02-04National Instruments CorporationSystem and method for testing telecommunication service installations
US7076650B1 (en)1999-12-242006-07-11Mcafee, Inc.System and method for selective communication scanning at a firewall and a network node
US7171492B1 (en)2000-02-242007-01-30Utstarcom, Inc.Method and application programming interface for assigning multiple network addresses
US20040015725A1 (en)*2000-08-072004-01-22Dan BonehClient-side inspection and processing of secure content
US20020078382A1 (en)*2000-11-292002-06-20Ali SheikhScalable system for monitoring network system and components and methodology therefore
US7778981B2 (en)2000-12-012010-08-17Netapp, Inc.Policy engine to control the servicing of requests received by a storage server
US7958237B2 (en)*2001-01-232011-06-07Pearl Software, Inc.Method for managing computer network access
US7284267B1 (en)*2001-03-082007-10-16Mcafee, Inc.Automatically configuring a computer firewall based on network connection
US7093280B2 (en)*2001-03-302006-08-15Juniper Networks, Inc.Internet security system
US7441017B2 (en)2001-06-292008-10-21Thomas Lee WatsonSystem and method for router virtual networking
US20030115075A1 (en)*2001-12-192003-06-19Aladdin Knowledge Systems Ltd.Communication ameliorator employing the Bluetooth protocol
CN1301607C (en)*2002-02-012007-02-21联想网御科技(北京)有限公司 Method for Realizing Firewall Supporting Virtual Local Area Network
CN100339845C (en)*2002-08-152007-09-26联想网御科技(北京)有限公司Chain path layer location information filtering based on state detection
CN1190924C (en)*2002-12-032005-02-23北京朗通环球科技有限公司Method of isolating user in radio local network
US7246156B2 (en)2003-06-092007-07-17Industrial Defender, Inc.Method and computer program product for monitoring an industrial network
US7631086B2 (en)2003-09-302009-12-08Onlex Technologies, Inc.Virtual dedicated connection system and method
FR2861195B1 (en)2003-10-212006-04-07Thomas Fraisse METHOD AND DEVICE FOR FILTERING CONTENTS ONLINE
US7467409B2 (en)2003-12-122008-12-16Microsoft CorporationAggregating trust services for file transfer clients
US20050193429A1 (en)2004-01-232005-09-01The Barrier GroupIntegrated data traffic monitoring system
US8136149B2 (en)*2004-06-072012-03-13Check Point Software Technologies, Inc.Security system with methodology providing verified secured individual end points
GB2418326B (en)2004-09-172007-04-11Hewlett Packard Development CoNetwork vitrualization
US7409709B2 (en)*2005-02-142008-08-05Etsec, Inc.Systems and methods for automatically reconfiguring a network device
WO2007000772A1 (en)*2005-06-282007-01-04Hewlett - Packard Development Company L.P.Access control method and apparatus
US8166474B1 (en)2005-09-192012-04-24Vmware, Inc.System and methods for implementing network traffic management for virtual and physical machines
US7966654B2 (en)2005-11-222011-06-21Fortinet, Inc.Computerized system and method for policy-based content filtering
US8234361B2 (en)2006-01-132012-07-31Fortinet, Inc.Computerized system and method for handling network traffic

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8813215B2 (en)2005-11-222014-08-19Fortinet, Inc.Policy-based content filtering
US9729508B2 (en)2005-11-222017-08-08Fortinet, Inc.Policy-based content filtering
US9762540B2 (en)2005-11-222017-09-12Fortinet, Inc.Policy based content filtering
US10084750B2 (en)2005-11-222018-09-25Fortinet, Inc.Policy-based content filtering
US20140075497A1 (en)*2012-09-132014-03-13Cisco Technology, Inc.Early Policy Evaluation of Multiphase Attributes in High-Performance Firewalls
US9100366B2 (en)*2012-09-132015-08-04Cisco Technology, Inc.Early policy evaluation of multiphase attributes in high-performance firewalls
US9306955B2 (en)2012-09-132016-04-05Cisco Technology, Inc.Early policy evaluation of multiphase attributes in high-performance firewalls
CN106161378A (en)*2015-04-132016-11-23中国移动通信集团公司Security service device, method and business processing device, method and system
CN106936719A (en)*2017-05-172017-07-07济南浪潮高新科技投资发展有限公司A kind of IP messages strategy matching method
US11368474B2 (en)*2018-01-232022-06-21Rapid7, Inc.Detecting anomalous internet behavior
US11595423B2 (en)2018-01-232023-02-28Rapid7, Inc.Honeypot network with dynamically updated alert modules for detecting anomalous connections
CN111277586A (en)*2020-01-172020-06-12武汉思普崚技术有限公司Method and device for adjusting firewall security policy

Also Published As

Publication numberPublication date
US7966654B2 (en)2011-06-21
US10084750B2 (en)2018-09-25
US8813215B2 (en)2014-08-19
US20070118893A1 (en)2007-05-24
US20120254978A1 (en)2012-10-04
US20170339107A1 (en)2017-11-23
US9762540B2 (en)2017-09-12
CN1972297B (en)2011-02-09
US20140090013A1 (en)2014-03-27
US8205251B2 (en)2012-06-19
CN1972297A (en)2007-05-30
US20150312220A1 (en)2015-10-29
US9729508B2 (en)2017-08-08
US20140351918A1 (en)2014-11-27
US20110225646A1 (en)2011-09-15
US8656479B2 (en)2014-02-18

Similar Documents

PublicationPublication DateTitle
US10084750B2 (en)Policy-based content filtering
US10009386B2 (en)Computerized system and method for advanced network content processing
US11012415B2 (en)Filtering network data transfers
US8495200B2 (en)Computerized system and method for handling network traffic
US8639837B2 (en)System and method of traffic inspection and classification for purposes of implementing session ND content control
US7818565B2 (en)Systems and methods for implementing protocol enforcement rules
US20040111623A1 (en)Systems and methods for detecting user presence
US20040109518A1 (en)Systems and methods for a protocol gateway

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION


[8]ページ先頭

©2009-2025 Movatter.jp