Method and system for securely scanning network traffic

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07543332

ABSTRACT:
A method and system for implementing secure network communications between a first device and a second device, at least one of the devices communicating with the other device via a firewall device, are provided. The method and system may include obtaining an encryption parameter that is shared by the first device, second device and firewall device. A data packet sent by the first device may then be copied within the firewall device, so that decryption of the copy of the data packet within a portion of the firewall device may take place. In particular, the portion of the firewall device in which decryption takes place is defined such that contents of the portion are inaccessible to an operator of the firewall device. Thus, scanning of the decrypted copy of the data packet for compliance with a predetermined criterion may take place within the firewall device, without an operator of the firewall device having access to the contents of the data packet to be transmitted. Thereafter, the original data packet can be forwarded to its originally intended recipient.

REFERENCES:
patent: 5732275 (1998-03-01), Kullick
patent: 5745701 (1998-04-01), Nguyen-Thai
patent: 5825891 (1998-10-01), Levesque
patent: 5835726 (1998-11-01), Shwed
patent: 5940591 (1999-08-01), Boyle
patent: 5958013 (1999-09-01), King
patent: 5983350 (1999-11-01), Minear
patent: 6006259 (1999-12-01), Adelman
patent: 6038322 (2000-03-01), Harkins
patent: 6049878 (2000-04-01), Caronni
patent: 6055236 (2000-04-01), Nessett
patent: 6078953 (2000-06-01), Vaid
patent: 6079020 (2000-06-01), Liu
patent: 6091820 (2000-07-01), Aziz
patent: 6092200 (2000-07-01), Muniyappa
patent: 6105027 (2000-08-01), Schneider
patent: 6182226 (2001-01-01), Reid
patent: 6195751 (2001-02-01), Caronni
patent: 6226751 (2001-05-01), Arrow
patent: 6253321 (2001-06-01), Nikander
patent: 6269099 (2001-07-01), Borella
patent: 6275588 (2001-08-01), Vidercrantz
patent: 6289382 (2001-09-01), Bowman-Amuah
patent: 6304973 (2001-10-01), Williams
patent: 6330562 (2001-12-01), Boden
patent: 6331228 (2001-12-01), Siegel
patent: 6353886 (2002-03-01), Howard
patent: 6496867 (2002-12-01), Beser
patent: 6636898 (2003-10-01), Ludovici
patent: 6662221 (2003-12-01), Gonda
patent: 6697354 (2004-02-01), Borella
patent: 6826684 (2004-11-01), Fink
patent: 6883100 (2005-04-01), Elley
patent: 6915437 (2005-07-01), Swander et al.
patent: 6931529 (2005-08-01), Kunzinger
patent: 6938155 (2005-08-01), D'Sa
patent: 6954790 (2005-10-01), Forslow
patent: 6976177 (2005-12-01), Ahonen
patent: 7003662 (2006-02-01), Genty
patent: 7028335 (2006-04-01), Borella
patent: 7054319 (2006-05-01), Akahane
patent: 7107464 (2006-09-01), Shapira
patent: 2001/0009025 (2001-07-01), Ahonen
patent: 2001/0020273 (2001-09-01), Murakawa
patent: 2001/0023443 (2001-09-01), Fichou
patent: 2001/0047474 (2001-11-01), Takagi
patent: 2002/0016926 (2002-02-01), Nguyen
patent: 2002/0093915 (2002-07-01), Larson
patent: 2002/0144144 (2002-10-01), Weiss
patent: 2003/0018813 (2003-01-01), Antes
patent: 2003/0061505 (2003-03-01), Sperry
patent: 2003/0069958 (2003-04-01), Jalava
patent: 2003/0135753 (2003-07-01), Batra
patent: 2003/0154259 (2003-08-01), Lamberton
patent: 2003/0191937 (2003-10-01), Balissat
patent: 2004/0066747 (2004-04-01), Jorgensen
patent: 2004/0093492 (2004-05-01), Daude
patent: 2005/0088977 (2005-04-01), Roch
patent: 1 093 255 (2001-04-01), None
patent: 1 418 730 (2004-05-01), None
patent: 1 657 880 (2007-08-01), None
patent: WO 99/67930 (1999-12-01), None
patent: WO 00/19678 (2000-04-01), None
patent: WO 01/16766 (2001-03-01), None
U.S. Appl. No. 10/115,554, filed Apr. 4, 2002, Balissat.
De Clercq, “An Architecture for Provider Provisioned CE-based Virtual Private Networks”, Jun. 1, 2002, 17 page(s), France.
Hunt, “PKI and Digital Certification Infrastructure”, Oct. 1, 2001, 6 page(s), US.
Younglove, “Public Key Infrastructure/ How it Works”, Apr. 1, 2001, 4 page(s), US.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for securely scanning network traffic does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for securely scanning network traffic, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for securely scanning network traffic will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4112434

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.