System and method of communicating between trusted and untrusted

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

395800, 39520001, 39520006, 39520015, 39518801, 395186, 380 23, 380 24, 380 25, 380 30, 380 49, 34082534, G06F 1500

Patent

active

058288937

ABSTRACT:
A computer network comprising a trusted computer network (16), and an untrusted computer network (17). A plurality of firewall systems (21) provide controlled access between the trusted computer network and the first untrusted computer network. An Application layer bridge (22) establishes a transparent virtual circuit across the plurality of firewalls (21).

REFERENCES:
patent: 4584639 (1986-04-01), Hardy
patent: 4916704 (1990-04-01), Bruckert et al.
patent: 4924513 (1990-05-01), Herbison et al.
patent: 4977582 (1990-12-01), Nichols et al.
patent: 5200993 (1993-04-01), Wheeler et al.
patent: 5251205 (1993-10-01), Callon et al.
patent: 5260999 (1993-11-01), Wyman
patent: 5280529 (1994-01-01), N.o slashed.st
patent: 5313465 (1994-05-01), Perlman et al.
patent: 5313579 (1994-05-01), Chao
patent: 5329619 (1994-07-01), Page et al.
patent: 5490252 (1996-02-01), Macera et al.
"Eagle Network Isolator", User's Guide published by Raptor Systems, Inc., Wilmington, Delaware in 1992.
Casey et al., "A Secure Distributed Operating System", IEEE, May 1988, pp. 27-38.
Wong, "Issues in Secure Distributed Operating System Design," IEEE, Apr. 1989, pp. 338-341.
Vinter, "Extended Discretionary Access Controls", IEEE, 1988, pp. 39-49.
Rossen, "Network Security: Just Say `Know` at Layer 7," Data Communications, Mar. 1991, pp. 103-106.
Telstra, "Security Papers and Documents".
Bellovin, "Security Probrems in the TCP/IP Protocol Suite", Computer Communication Review, vol. 19, No. 2, pp. 32-48, Apr. 1989.
Bellovin et al., "Limitations of the Kerberos Authentication System", USENIX, Winter 1991, pp. 1-15.
Cheswick, "The Design of a Secure Internet Gateway", Apr. 20, 1990, pp. 1-5.
Bishop, "A Security Analysis of the NTP Protocol", Jun. 13, 1990, pp. 1-20.
"ICL Joins Hughes STX in US on Secure Networking", Computergram International, Jun. 16, 1992.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method of communicating between trusted and untrusted does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method of communicating between trusted and untrusted, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of communicating between trusted and untrusted will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1621956

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.