Secure server utilizing separate protocol stacks

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

39518701, G06F 1300

Patent

active

059130245

ABSTRACT:
A secure commerce server system and method. A secure commerce server system includes a plurality of regions or burbs, including an internal burb and an external burb, a commerce server and an administration server. Processes and data objects associated with the administration server are bound to the internal burb. Processes and data objects associated with the commerce server are bound to the external burb. Processes bound to one burb cannot communicate directly to processes and data objects bound to other burbs. The administration server cannot be manipulated by a process bound to the external burb.

REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4584639 (1986-04-01), Hardy
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4648031 (1987-03-01), Jenner
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4870571 (1989-09-01), Frink
patent: 4885789 (1989-12-01), Burger et al.
patent: 5093914 (1992-03-01), Coplien et al.
patent: 5124984 (1992-06-01), Engel
patent: 5153918 (1992-10-01), Tuai
patent: 5204961 (1993-04-01), Barlow
patent: 5228083 (1993-07-01), Lozowick et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5272754 (1993-12-01), Boebert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5303303 (1994-04-01), White
patent: 5305385 (1994-04-01), Schanning et al.
patent: 5311593 (1994-05-01), Carmi
patent: 5329623 (1994-07-01), Smith et al.
patent: 5355474 (1994-10-01), Thuraisngham et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5485460 (1996-01-01), Schrier et al.
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5566170 (1996-10-01), Bakke et al.
patent: 5586260 (1996-12-01), Hu
patent: 5606668 (1997-02-01), Shwed
patent: 5615340 (1997-03-01), Dai et al.
patent: 5619648 (1997-04-01), Canale et al.
patent: 5623601 (1997-04-01), Vu
patent: 5636371 (1997-06-01), Yu
patent: 5644571 (1997-07-01), Seaman
patent: 5671279 (1997-09-01), Elgamal
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5699513 (1997-12-01), Feigen et al.
patent: 5706507 (1998-01-01), Schloss
patent: 5708780 (1998-01-01), Levergood et al.
patent: 5720035 (1998-02-01), Allegre et al.
patent: 5781550 (1998-07-01), Templin et al.
Commun. of the ACM, vol. 35, p. 28, (Dec. 1992).
"Answers to Frequently Asked Questions About Network Security", Secure Computing Corporation, pp. 1-41 & pp. 1-16, (Date unavailable).
"Copy of PCT Search Report", Application No. PCT/US95/12681, 8 pages, (Apr. 9, 1996).
J. A. Adam, "Meta-matrices", IEEE Spectrum, p. 26, (Oct. 1992).
J. A. Adam, "Playing on the net", IEEE Spectrum, 29 (Oct. 1992).
Lee Badger, et al., "Practical Domain and Type Enforcement for UNIX", 1995 IEEE Symposium on Security and Privacy, pp. 66-77, (May, 1995).
N. J. Belkin, et al., "Information filtering and information retrieval: Two sides of the same coin?", Commun. of the ACM, vol. 35, p. 29, (1992).
S. M. Bellovin, et al., "Network Firewalls", IEEE Communications Magazine, vol. 32, 9 pages, (Sep. 1994).
William R. Bevier, et al., "Connection Policies and Controlled Interference", The Eighth IEEE Computer Security Foundations Workshop, IEEE Computer Society Technical Committee on Security and Privacy, pp. 167-176, (Jun., 1995).
T. F. Bowen, et al., "The datacycle architecture", Commun. of the ACM, 35, 71 (1992).
J. Bryan, "Firewalls For Sale", BYTE, 99-100, 102, 104-105, (Apr. 1995).
B. B. Dillaway, et al., "A Practical Design For A Multilevel Secure Database Management System", American Institute of Aeronautics and Astronautics, Inc., pp. 44-57, (Dec. 1986).
Todd Fine, et al., "Asssuring Distributed Trusted Mach", IEEE Computer Society Symposium on Research in Security and Privacy, pp. 206-218, (1993).
P. W. Foltz, et al., "Personalized information delivery: an analysis of information filtering methods", Commun. of the ACM, vol. 35, p. 51, (1992).
D. Goldberg, et al., "Using collaborative filtering to weave an information tapestry", Commun. of the ACM, vol. 35, p. 61, (1992).
F. T. Grampp, "Unix Operating System Security", AT&T Bell Laboratories Technical Journal, vol. 63, No. 8, 1649-1672, (Oct. 1984).
J. Thomas Haigh, et al., "Extending the Noninterference Version of MLS", IEEE Transactions on Software Engineering, vol. SE-13, No. 2, pp. 141-150, (Feb., 1987).
S. T. Kent, "Internet privacy enhanced mail", Commun. of the ACM, vol. 36, p. 48, (1993).
K. Lee, et al., "A framework for controlling cooperative agents", Computer, p. 8, (1993).
Yuet C. Lee, et al., "Multimedia: Full-Service Impact on Business, Education, and the Home", SPIE--The International Society for Optical Engineering, vol. 2617, pp. 143-150, (Oct. 1995).
S. Loeb, "Architecting personalized delivery of multimedia information", Commun. of the ACM, 35, 39 (1992).
K. Obraczka, et al., "Internet resource discovery services", Computer, p. 8, (Sep., 1993).
L. Press, "The net: progress and opportunity", Commun. of the ACM, vol. 35, p. 21, (1992).
M. F. Schwartz, "Internet resource discovery at the University of Colorado", Computer, p. 25, (Sep. 1993).
Richard E. Smith, "Sidewinder: Defense in Depth Using Type Enforcement", International Journal of Network Management, pp. 219-229, (Jul.-Aug. 1995).
New Release: "100% of Hackers Failed to Break Into One Internet Site Protected by Sidewinder.TM.", Secure Computing Corporation (Feb. 16, 1995).
News Release: "Internet Security System Given `Product of the Year` Award", Secure Computing Corporation (Mar. 28, 1995).
News Release: "SATAN No Threat to Sidewinder.TM.", Secure Computing Corporation (Apr. 26, 1995).
"Sidewinder Internals", Product information, Secure Computing Corporation, 16 pp. 1-15 (Oct. 1994).
"Special Report: Secure Computing Corporation and Network Security", Computer Select, 13 p. (Dec. 1995).
Ancilotti, P., et al., "Language Features for Access Control", IEEE Transactions on Software Engineering, SE-9, 16-25 (Jan. 1983).
Cobb, S., "Establishing Firewall Policy", IEEE, 198-205, (1996).
Damashek, M., "Guaging Similarity with n-Grams: Language-Independent Categorization of Text", Science, 267, 843-848 (Feb. 10, 1995).
Gassman, B., "Internet Security, and Firewalls Protection on the Internets", IEEE, 93-107 (1996).
Greenwald, M., et al., "Designing an Academic Firewall: Policy, Practice, and Experience with SURF", IEEE, 79-92 (1996).
Karn, P., et al., "The ESP DES-CBC Transform", Network Working Group, Request for Comment No. 1829, http//ds.internic.net/rfc/rfc1829.txt, 9 pp. 1-9 (Aug. 1995).
Lampson, B.W., et al., "Dynamic Protection Structures", AFIPS Conference Proceedings, 35, 1969 Fall Joint Computer Conference, Las Vegas, NV, 27-38 (Nov. 18-20, 1969).
McCarthy, S.P., "Hey Hackers| Secure Computing Says You Can't Break into This Telnet Site", Computer Select, 2 p. (Dec. 1995).
Metzger, P., et al., "IP Authentication using Keyed MD5", Network Working Group, Request for Comments No. 1828, http//ds.internic.net/rfc/rfc 1828.txt, 5 p. (Aug. 1995).
Peterson, L.L., et al., In: Computer Networks, Morgan Kaufman Publishers, Inc., San Francisco, CA, pp. 218-221, 284-286 (1996).
Schroeder, M.D., et al., "A Hardware Architecture for Implementing Protection Rings", Communications of the ACM, 15, 157-170 (Mar. 1972).
Smith, R.E., "Constructing a High Assurance Mail Guard", Secure Computing Corporation (Appeared in the Proceedings of the National Computer Security Conference), 7 p. (1994).
Stadnyk, I., et al., "Modeling User's Interests in Information Filters", Communications of the ACM, 35 39-50 (Dec. 1992).
Stempel, S., "IpAccess--An Internet Service Access System for Firewall Installations", IEEE, 31-41 (1995).
Stevens, S., "Automating the Creation of Information Filters", Communications of the ACM, 35, 48 (Dec. 1992).
Warrier, U.S., et al., "A Platform for Heterogenous Interconnection Network Management"

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure server utilizing separate protocol stacks does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure server utilizing separate protocol stacks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure server utilizing separate protocol stacks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-408271

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.