Multi-level security network system

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C726S003000, C726S004000

Reexamination Certificate

active

07069437

ABSTRACT:
A network prevents unauthorized users from gaining access to confidential information. The network has various workstations and servers connected by a common medium and through a router to the Internet. The network has two major components, a Network Security Center (NSC) and security network interface cards or devices. The NSC is an administrative workstation through which the network security officer manages the network as a whole as well as the individual security devices. The security devices are interposed between each of workstation, including the NSC, and the common medium and operate at a network layer (layer3) of the protocol hierarchy. The network allows trusted users to access outside information, including the Internet, while stopping outside attackers at their point of entry. At the same time, the network limits an unauthorized insider to information defined in their particular security profile. The user may select which virtual network to access at any given time. The result is trusted access to multiple secure Virtual Private Networks (VPN), all from a single desktop machine.

REFERENCES:
patent: 4797928 (1989-01-01), Dykes
patent: 4845717 (1989-07-01), Iijima
patent: 4987595 (1991-01-01), Marino, Jr. et al.
patent: 5075884 (1991-12-01), Sherman et al.
patent: 5155829 (1992-10-01), Koo
patent: 5241594 (1993-08-01), Kung
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5276444 (1994-01-01), McNair
patent: 5297255 (1994-03-01), Hamanaka et al.
patent: 5459851 (1995-10-01), Nakajima et al.
patent: 5546463 (1996-08-01), Caputo et al.
patent: 5548721 (1996-08-01), Denslow
patent: 5577209 (1996-11-01), Boyle et al.
patent: 5602918 (1997-02-01), Chen et al.
patent: 5603031 (1997-02-01), White et al.
patent: 5604490 (1997-02-01), Blakley et al.
patent: 5623601 (1997-04-01), Vu
patent: 5638448 (1997-06-01), Nguyen
patent: 5680452 (1997-10-01), Shanton
patent: 5689566 (1997-11-01), Nguyen
patent: 5692124 (1997-11-01), Holden et al.
patent: 5699513 (1997-12-01), Feigen et al.
patent: 5701343 (1997-12-01), Takashima et al.
patent: 5724027 (1998-03-01), Shipman et al.
patent: 5765036 (1998-06-01), Lim
patent: 5787310 (1998-07-01), Shimizu et al.
patent: 5802178 (1998-09-01), Holden et al.
patent: 5818939 (1998-10-01), Davis
patent: 5822435 (1998-10-01), Boebert et al.
patent: 5822784 (1998-10-01), Garney
patent: 5828832 (1998-10-01), Holden et al.
patent: 5832228 (1998-11-01), Holden et al.
patent: 5860021 (1999-01-01), Klingman
patent: 5872847 (1999-02-01), Boyle et al.
patent: 5889958 (1999-03-01), Willens
patent: 5940591 (1999-08-01), Boyle et al.
patent: 5944824 (1999-08-01), He
patent: 6081848 (2000-06-01), Grun et al.
patent: 6088451 (2000-07-01), He et al.
patent: 6134591 (2000-10-01), Nickles
patent: 6175622 (2001-01-01), Chiniwala et al.
patent: 6212636 (2001-04-01), Boyle et al.
patent: 6243816 (2001-06-01), Fang et al.
patent: 6304973 (2001-10-01), Williams
patent: 6603843 (2003-08-01), Hagemann
Network Security Laboratories, Inc., “Technical Overview of Cryptek's DiamondTEK Ultra,” http://www.cryptek.com/Dtekultrd.html [internet], Feb. 1998.
DiamondTEK Brochure On-Line, http://www.cryptek.com/diamond.html [internet], Feb. 2000.
DiamondNIC Trademark information, http://trademarks.uspto.gov [internet].
LAN Magazine Aug. 1997, http://www.hackzone.ru
sp/info/misc/osp/o—r—books.html [internet], Aug. 1997.
Stallings, William; Cryptography and Network Security; Jun. 4, 1998; Prentice Hall, Inc.; pp. 323-353.
Garfinkel et al.; Practicle UNIX Security; Jun. 1994; O'Reilly & Associates, Inc.; pp. 21-56.
General Kinetics Inc., VSLAN 6.0 VSLANE 6.0 Network Component MDIA, Jul. 20, 1995.
Verdix Corporation, VSLAN 5.0 Network Component MDIA, Aug. 22, 1990.
Department of Defense Trusted Computer System Evaluation Criteria, Dec. 1985, DOD 5200.28-STD.
Trused Network Interpretation of the TCSEC, NCSC-TG-005, Version 1, Jul. 31, 1987.
Wen-Pai Lu et al.: “A Model for Multilevel Security in Computer Networks”, IEEE Transactions on Software Engineering, IEEE Inc., vol. 16, No. 6, Jun. 1, 1990.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Multi-level security network system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Multi-level security network system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Multi-level security network system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3629660

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.