Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography
Reexamination Certificate
2007-02-20
2007-02-20
Luu, Le Hien (Department: 2141)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular node for directing data and applying cryptography
C713S152000, C713S164000, C709S229000
Reexamination Certificate
active
10854602
ABSTRACT:
A system and method for the secure transfer of data between a workstation connected to a private network and a remote computer connected to an unsecured network. A secure computer is inserted into the private network to serve as the gateway to the unsecured network and a client subsystem is added to the workstation in order to control the transfer of data from the workstation to the secure computer. The secure computer includes a private network interface connected to the private network, an unsecured network interface connected to the unsecured network, wherein the unsecured network interface includes means for encrypting data to be transferred from the first workstation to the remote computer and a server function for transferring data between the private network interface and the unsecured network interface.
REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4584639 (1986-04-01), Hardy
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4648031 (1987-03-01), Jenner
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4870571 (1989-09-01), Frink
patent: 4885789 (1989-12-01), Burger et al.
patent: 4888801 (1989-12-01), Foster et al.
patent: 4914568 (1990-04-01), Kodosky et al.
patent: 4914590 (1990-04-01), Loatman et al.
patent: 4933971 (1990-06-01), Bestock et al.
patent: 5056140 (1991-10-01), Kimbell
patent: 5077658 (1991-12-01), Bendert et al.
patent: 5093914 (1992-03-01), Coplien et al.
patent: 5124984 (1992-06-01), Engel
patent: 5153918 (1992-10-01), Tuai
patent: 5204961 (1993-04-01), Barlow
patent: 5228083 (1993-07-01), Lozowick et al.
patent: 5251131 (1993-10-01), Masand et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5268962 (1993-12-01), Abadi et al.
patent: 5272754 (1993-12-01), Boebert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5276789 (1994-01-01), Besaw et al.
patent: 5303303 (1994-04-01), White
patent: 5305385 (1994-04-01), Schanning et al.
patent: 5311593 (1994-05-01), Carmi
patent: 5329623 (1994-07-01), Smith et al.
patent: 5333266 (1994-07-01), Boaz et al.
patent: 5355474 (1994-10-01), Thuraisngham et al.
patent: 5386471 (1995-01-01), Bianco
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5418951 (1995-05-01), Damashek
patent: 5455828 (1995-10-01), Zisapel
patent: 5485460 (1996-01-01), Schrier et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5548507 (1996-08-01), Martino et al.
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5548649 (1996-08-01), Jacobson
patent: 5548721 (1996-08-01), Denslow
patent: 5550984 (1996-08-01), Gelb
patent: 5555346 (1996-09-01), Gross et al.
patent: 5566170 (1996-10-01), Bakke et al.
patent: 5583940 (1996-12-01), Vidrascu et al.
patent: 5586260 (1996-12-01), Hu
patent: 5604490 (1997-02-01), Blakley, III et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5615340 (1997-03-01), Dai et al.
patent: 5619648 (1997-04-01), Canale et al.
patent: 5623601 (1997-04-01), Vu
patent: 5632011 (1997-05-01), Landfield et al.
patent: 5636371 (1997-06-01), Yu
patent: 5644571 (1997-07-01), Seaman
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5720035 (1998-02-01), Allegre et al.
patent: 5781550 (1998-07-01), Templin et al.
patent: 5828833 (1998-10-01), Belville et al.
patent: 5828893 (1998-10-01), Wied et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5867647 (1999-02-01), Haigh et al.
patent: 5896499 (1999-04-01), McKelvey
patent: 5898830 (1999-04-01), Wesinger, Jr. et al.
patent: 5918018 (1999-06-01), Gooderum et al.
patent: 5950195 (1999-09-01), Stockwell et al.
patent: 5958016 (1999-09-01), Chang et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 6219707 (2001-04-01), Gooderum et al.
patent: 6453419 (2002-09-01), Flint et al.
patent: 6772332 (2004-08-01), Boebert et al.
patent: 0420779 (1991-04-01), None
patent: 0554182 (1993-04-01), None
patent: 0653862 (1995-05-01), None
patent: 2287619 (1995-09-01), None
patent: WO-96/13113 (1996-05-01), None
patent: WO-96/35994 (1996-11-01), None
Hoffman et al., “Security Pipeline Interface (SPI)”, 1990, IEEE, pp. 349-355.
Thomsen et al., “A Comparison of Type Enforcement and Unix Setuid Implementation of Well-Formed Transactions”, 1990, IEEE, pp. 304-312.
News Release: “100% of Hackers Failed to Break Into One Internet Site Protected by Sidewinder(tm)”, Secure Computing Corporation,(Feb. 16, 1995), 2pgs.
News Release: “Internet Security System Given ‘Product of the Year’ Award”, Secure Computing Corporation,(Mar. 28, 1995), 2pgs.
News Release: “SATAN No Threat to Sidewinder(tm)”, Secure Computing Corporation,(Apr. 26, 1995), 2pgs.
International Search Report, PCT Application No. PCT/US 95/12681,(mailed Apr. 9, 1996), 8 pgs.
“Answers to Frequently Asked Questions About Network Security”,Secure Computing Corporation,(Sep. 25, 1994), pp. 1-41 & p. 1-16.
“Sidewinder Internals”, Product information, Secure Computing Corporation,(Oct. 1994), 16 pgs.
“Special Report: Secure Computing Corporation and Network Security”,Computer Select,(Dec. 1995), 13 pgs.
Adam, J.A., “Meta-Matrices”,IEEE Spectrum,(Oct. 1992), pp. 26-27.
Adam, J.A., “Playing on the Net”,IEEE Spectrum,(Oct. 1992), p. 29.
Ancilotti, P., et al., “Language Features for Access Control”,IEEE Transactions on Software Engineering,SE-9, (Jan. 1983), pp. 16-25.
Badger, Lee, et al., “Practical Domain and Type Enforcement for UNIX”,Proceedings of the 1995 IEEE Symposium on Security and Privacy,(May 1995), pp. 66-77.
Belkin, N. J., et al., “Information Filtering and Information Retrieval: Two Sides of the Same Coin?”,Communications of the ACM,35, (Dec. 1992), pp. 29-38.
Bellovin, S. M., et al., “Network Firewalls”,IEEE Communications Magazine,32, (Sep. 1994), pp. 50-57.
Bevier, William R., et al., “Connection Policies and Controlled Interference”,Proceedings of the Eighth IEEE Computer Security Foundations Workshop,Kenmare, Ireland,(Jun. 13-15, 1995), pp. 167-176.
Boebert, W. E., “Secure Ada Target: Issues, System Design, and Verification”,Proceedings of the IEEE Symposium on Security and Privacy,Oakland, California,(Apr. 22-24, 1985), pp. 59-66.
Boebert, W. E., et al., “Secure Computing: The Secure Ada Target Approach”,Scientific Honeyweller,6 (2), (Jul. 1985), pp. 42-58.
Bowen, T. F., et al., “The Datacycle Architecture”,Communications of the ACM,35, (Dec. 1992), pp. 71-81.
Bryan, J., “Firewalls For Sale”,BYTE,(Apr. 1995), pp. 99-100, 102, 104.
Damashek, Marc, “Gauging Similarity with n-Grams: Language-Independent Categorization of Text”,Science,267, (Feb. 10, 1995), pp. 843-848.
Dillaway, B. B., et al., “A Practical Design For A Multilevel Secure Database Management System”,American Institute of Aeronautics and Astronautics, Inc.,(Dec. 1986), pp. 44-57.
Fine, Todd, et al., “Assuring Distributed Trusted Mach”,Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy,(1993), pp. 206-218.
Foltz, P. W., et al., “Personalized Information Delivery: An Analysis of Information Filtering Methods”,Communications of the ACM,35, (Dec. 1992), pp. 51-60.
Goldberg, D., et al., “Using Collaborative Filtering to Weave an Information Tapestry”,Communications of the ACM,35, (Dec. 1992), pp. 61-70.
Grampp, F.T., “UNIX Operating System Security”,AT&T Bell Laboratories Technical Journal,63, (Oct. 1984), 1649-1672.
Haigh, J.T., et al., “Extending the Noninterference Version of MLS for SAT”,Proceedings of the 1986 IEEE Symposium on Security and Privacy,Oakland
Andreas Glenn
Boebert William E.
Gooderum Mark P.
Hammond Scott W.
Rogers Clyde O.
Luu Le Hien
Schwegman Lundberg Woessner & Kluth P.A.
Secure Computing Corporation
LandOfFree
System and method for providing secure internetwork services... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for providing secure internetwork services..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for providing secure internetwork services... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3864270