System and method for providing secure internetwork services...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S164000, C709S229000

Reexamination Certificate

active

10854602

ABSTRACT:
A system and method for the secure transfer of data between a workstation connected to a private network and a remote computer connected to an unsecured network. A secure computer is inserted into the private network to serve as the gateway to the unsecured network and a client subsystem is added to the workstation in order to control the transfer of data from the workstation to the secure computer. The secure computer includes a private network interface connected to the private network, an unsecured network interface connected to the unsecured network, wherein the unsecured network interface includes means for encrypting data to be transferred from the first workstation to the remote computer and a server function for transferring data between the private network interface and the unsecured network interface.

REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4584639 (1986-04-01), Hardy
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4648031 (1987-03-01), Jenner
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4870571 (1989-09-01), Frink
patent: 4885789 (1989-12-01), Burger et al.
patent: 4888801 (1989-12-01), Foster et al.
patent: 4914568 (1990-04-01), Kodosky et al.
patent: 4914590 (1990-04-01), Loatman et al.
patent: 4933971 (1990-06-01), Bestock et al.
patent: 5056140 (1991-10-01), Kimbell
patent: 5077658 (1991-12-01), Bendert et al.
patent: 5093914 (1992-03-01), Coplien et al.
patent: 5124984 (1992-06-01), Engel
patent: 5153918 (1992-10-01), Tuai
patent: 5204961 (1993-04-01), Barlow
patent: 5228083 (1993-07-01), Lozowick et al.
patent: 5251131 (1993-10-01), Masand et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5268962 (1993-12-01), Abadi et al.
patent: 5272754 (1993-12-01), Boebert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5276789 (1994-01-01), Besaw et al.
patent: 5303303 (1994-04-01), White
patent: 5305385 (1994-04-01), Schanning et al.
patent: 5311593 (1994-05-01), Carmi
patent: 5329623 (1994-07-01), Smith et al.
patent: 5333266 (1994-07-01), Boaz et al.
patent: 5355474 (1994-10-01), Thuraisngham et al.
patent: 5386471 (1995-01-01), Bianco
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5418951 (1995-05-01), Damashek
patent: 5455828 (1995-10-01), Zisapel
patent: 5485460 (1996-01-01), Schrier et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5548507 (1996-08-01), Martino et al.
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5548649 (1996-08-01), Jacobson
patent: 5548721 (1996-08-01), Denslow
patent: 5550984 (1996-08-01), Gelb
patent: 5555346 (1996-09-01), Gross et al.
patent: 5566170 (1996-10-01), Bakke et al.
patent: 5583940 (1996-12-01), Vidrascu et al.
patent: 5586260 (1996-12-01), Hu
patent: 5604490 (1997-02-01), Blakley, III et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5615340 (1997-03-01), Dai et al.
patent: 5619648 (1997-04-01), Canale et al.
patent: 5623601 (1997-04-01), Vu
patent: 5632011 (1997-05-01), Landfield et al.
patent: 5636371 (1997-06-01), Yu
patent: 5644571 (1997-07-01), Seaman
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5720035 (1998-02-01), Allegre et al.
patent: 5781550 (1998-07-01), Templin et al.
patent: 5828833 (1998-10-01), Belville et al.
patent: 5828893 (1998-10-01), Wied et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5867647 (1999-02-01), Haigh et al.
patent: 5896499 (1999-04-01), McKelvey
patent: 5898830 (1999-04-01), Wesinger, Jr. et al.
patent: 5918018 (1999-06-01), Gooderum et al.
patent: 5950195 (1999-09-01), Stockwell et al.
patent: 5958016 (1999-09-01), Chang et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 6219707 (2001-04-01), Gooderum et al.
patent: 6453419 (2002-09-01), Flint et al.
patent: 6772332 (2004-08-01), Boebert et al.
patent: 0420779 (1991-04-01), None
patent: 0554182 (1993-04-01), None
patent: 0653862 (1995-05-01), None
patent: 2287619 (1995-09-01), None
patent: WO-96/13113 (1996-05-01), None
patent: WO-96/35994 (1996-11-01), None
Hoffman et al., “Security Pipeline Interface (SPI)”, 1990, IEEE, pp. 349-355.
Thomsen et al., “A Comparison of Type Enforcement and Unix Setuid Implementation of Well-Formed Transactions”, 1990, IEEE, pp. 304-312.
News Release: “100% of Hackers Failed to Break Into One Internet Site Protected by Sidewinder(tm)”, Secure Computing Corporation,(Feb. 16, 1995), 2pgs.
News Release: “Internet Security System Given ‘Product of the Year’ Award”, Secure Computing Corporation,(Mar. 28, 1995), 2pgs.
News Release: “SATAN No Threat to Sidewinder(tm)”, Secure Computing Corporation,(Apr. 26, 1995), 2pgs.
International Search Report, PCT Application No. PCT/US 95/12681,(mailed Apr. 9, 1996), 8 pgs.
“Answers to Frequently Asked Questions About Network Security”,Secure Computing Corporation,(Sep. 25, 1994), pp. 1-41 & p. 1-16.
“Sidewinder Internals”, Product information, Secure Computing Corporation,(Oct. 1994), 16 pgs.
“Special Report: Secure Computing Corporation and Network Security”,Computer Select,(Dec. 1995), 13 pgs.
Adam, J.A., “Meta-Matrices”,IEEE Spectrum,(Oct. 1992), pp. 26-27.
Adam, J.A., “Playing on the Net”,IEEE Spectrum,(Oct. 1992), p. 29.
Ancilotti, P., et al., “Language Features for Access Control”,IEEE Transactions on Software Engineering,SE-9, (Jan. 1983), pp. 16-25.
Badger, Lee, et al., “Practical Domain and Type Enforcement for UNIX”,Proceedings of the 1995 IEEE Symposium on Security and Privacy,(May 1995), pp. 66-77.
Belkin, N. J., et al., “Information Filtering and Information Retrieval: Two Sides of the Same Coin?”,Communications of the ACM,35, (Dec. 1992), pp. 29-38.
Bellovin, S. M., et al., “Network Firewalls”,IEEE Communications Magazine,32, (Sep. 1994), pp. 50-57.
Bevier, William R., et al., “Connection Policies and Controlled Interference”,Proceedings of the Eighth IEEE Computer Security Foundations Workshop,Kenmare, Ireland,(Jun. 13-15, 1995), pp. 167-176.
Boebert, W. E., “Secure Ada Target: Issues, System Design, and Verification”,Proceedings of the IEEE Symposium on Security and Privacy,Oakland, California,(Apr. 22-24, 1985), pp. 59-66.
Boebert, W. E., et al., “Secure Computing: The Secure Ada Target Approach”,Scientific Honeyweller,6 (2), (Jul. 1985), pp. 42-58.
Bowen, T. F., et al., “The Datacycle Architecture”,Communications of the ACM,35, (Dec. 1992), pp. 71-81.
Bryan, J., “Firewalls For Sale”,BYTE,(Apr. 1995), pp. 99-100, 102, 104.
Damashek, Marc, “Gauging Similarity with n-Grams: Language-Independent Categorization of Text”,Science,267, (Feb. 10, 1995), pp. 843-848.
Dillaway, B. B., et al., “A Practical Design For A Multilevel Secure Database Management System”,American Institute of Aeronautics and Astronautics, Inc.,(Dec. 1986), pp. 44-57.
Fine, Todd, et al., “Assuring Distributed Trusted Mach”,Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy,(1993), pp. 206-218.
Foltz, P. W., et al., “Personalized Information Delivery: An Analysis of Information Filtering Methods”,Communications of the ACM,35, (Dec. 1992), pp. 51-60.
Goldberg, D., et al., “Using Collaborative Filtering to Weave an Information Tapestry”,Communications of the ACM,35, (Dec. 1992), pp. 61-70.
Grampp, F.T., “UNIX Operating System Security”,AT&T Bell Laboratories Technical Journal,63, (Oct. 1984), 1649-1672.
Haigh, J.T., et al., “Extending the Noninterference Version of MLS for SAT”,Proceedings of the 1986 IEEE Symposium on Security and Privacy,Oakland

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for providing secure internetwork services... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for providing secure internetwork services..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for providing secure internetwork services... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3864270

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.