Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2011-04-12
2011-04-12
Moazzami, Nasser (Department: 2436)
Information security
Monitoring or scanning of software or data including attack...
Reexamination Certificate
active
07926108
ABSTRACT:
In one embodiment, a transparent relay receives diverted e-mail communications between an e-mail client and an e-mail server. The transparent relay may be configured to examine the e-mail communications for network security policy violations. E-mail communications that do not violate a network security policy may be relayed to their intended destination. Policy actions, such as discarding or redirection, may be performed on those that violate one or more network security policies. The transparent relay may include a pair of communications interfaces running in promiscuous mode, one for downstream communications and another for upstream communications. The transparent relay may decompose a network communication protocol to look network security policy violations.
REFERENCES:
patent: 5623600 (1997-04-01), Ji et al.
patent: 6092194 (2000-07-01), Touboul
patent: 6195587 (2001-02-01), Hruska et al.
patent: 6321267 (2001-11-01), Donaldson
patent: 6938097 (2005-08-01), Vincent et al.
patent: 7010807 (2006-03-01), Yanovsky
patent: 2002/0024964 (2002-02-01), Baum et al.
patent: 2002/0184190 (2002-12-01), Sugiura
patent: 2003/0135567 (2003-07-01), Reilly
patent: 2004/0177247 (2004-09-01), Peles
patent: 2004/0193730 (2004-09-01), Vernon
patent: 2004/0255161 (2004-12-01), Cavanaugh
patent: 2005/0015455 (2005-01-01), Liu
patent: 2005/0166268 (2005-07-01), Szor
patent: 2005/0188035 (2005-08-01), Ueno
patent: 2005/0204169 (2005-09-01), Tonnesen
patent: 2006/0085503 (2006-04-01), Stoye et al.
patent: 2006/0212572 (2006-09-01), Afek et al.
Keisuke Ishibashi, et al., and Masahiro Ishino, et al., “Detecting Mass-Mailing Worm Infected Hosts by Mining DNS Traffic Data”, Aug. 2005, 7 sheets, Sigcomm 2005 Workshops, ACM, PA, USA.ACM, PA, USA.
Antoine Schonewille and Dirk-Jan Van Helmond, “The Domain Name Service as an IDS—How DNS can be used for detecting and monitoring badware in a network”, Feb. 5, 2006, pp. 1-24, Surf net, University Van Amsterdam, USA.University Van Amsterdam, USA.
P. Mockapetris, “Domain Names—Implementation and Specification” ISI Nov. 1987, pp. 1-52, [retrieved on Apr. 22, 2006]. Retrieved from the internet<URL:http://www.ietf.org/rfc/rfc1035.txt>.
Simplicita: Carrier Scale Internet Applications Infrastructure, 27 sheets. Webpage [online] [retrieved on Jun. 1, 2006]. Retrieved from the internet<URL:http//www.simplicita.com>.
The Register® Biting the hand that feeds IT “Trend Micro to kick butt on botnets”, Sep. 26, 2006, 4 sheets; Webpage [online] [retrieved on Sep. 29, 2006]; Retrieved from the Internet: http://www.theregister.com/2006/09/26/trend—micro—botnet—appliance/print.html.
2006 Press Releases, “Trend Micro Takes Unprecedented Approach to Eliminating Botnet Threats with the Unveiling of InterCloud Security Device”, Sep. 25, 2006, 3 sheets; Webpage [online] [retrieved on Sep. 29, 2006]; Retrieved from the Internet: http://www.trendmicro.com/en/about
ews/pr/archive/2006/pr092506.htm.
Laura Chappell “Inside the TCP Handshake” Mar. 2000, NetWare Connection, 2 sheets.
Internet Protocols (IP), Dec. 14, 2005, pp. 1-15, Cisco Systems, Inc., webpage [online][retrieved on Sep. 6, 2006]. Retrieved from the internet: http://www.cisco.com.univercd/cc/td/doc/cisintwk/ito—doc/ip.htm.
Jonathan B. Postel “Simple Mail Transfer Protocol”, Aug. 1982, pp. 1-68, Information Sciences Institute, University of Southern California, [retrieved on Sep. 21, 2006]. Retrieived from the internet: http://www.ietf.org/rfc/rfc0821.txt.
Esters Scott D.
Moriarty Paul M.
Rand David L.
Scharf Gerald C.
McNally Michael S
Moazzami Nasser
Okamoto & Benedicto LLP
Trend Micro Incorporated
LandOfFree
SMTP network security processing in a transparent relay in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with SMTP network security processing in a transparent relay in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and SMTP network security processing in a transparent relay in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2730312