System for providing secure internetwork by connecting type enfo

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

39518701, 380 4, 380 25, G06F 15173

Patent

active

058646833

ABSTRACT:
A system and method for the secure transfer of data between a workstation connected to a private network and a remote computer connected to an unsecured network. A secure computer is inserted into the private network to serve as the gateway to the unsecured network and a client subsystem is added to the workstation in order to control the transfer of data from the workstation to the secure computer. The secure computer includes a private network interface connected to the private network, an unsecured network interface connected to the unsecured network, wherein the unsecured network interface includes means for encrypting data to be transferred from the first workstation to the remote computer, a server function for transferring data between the private network interface and the unsecured network interface and a filter function for filtering data transferred between the remote computer and the workstation.

REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4584639 (1986-04-01), Hardy
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4648031 (1987-03-01), Jenner et al.
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4870571 (1989-09-01), Frink
patent: 4885789 (1989-12-01), Burger et al.
patent: 4888801 (1989-12-01), Foster et al.
patent: 4914568 (1990-04-01), Kodosky et al.
patent: 4914590 (1990-04-01), Loatman et al.
patent: 5093914 (1992-03-01), Coplien et al.
patent: 5124984 (1992-06-01), Engel
patent: 5153918 (1992-10-01), Tuai
patent: 5204961 (1993-04-01), Barlow
patent: 5228083 (1993-07-01), Lozowick et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5272754 (1993-12-01), Boerbert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5303303 (1994-04-01), White
patent: 5305385 (1994-04-01), Schanning et al.
patent: 5311593 (1994-05-01), Carmi
patent: 5329623 (1994-07-01), Smith et al.
patent: 5333266 (1994-07-01), Boaz et al.
patent: 5355474 (1994-10-01), Thuraisngham et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5418951 (1995-05-01), Damashek
patent: 5455828 (1995-10-01), Zisapel
patent: 5485460 (1996-01-01), Schrier et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5550984 (1996-08-01), Gelb
patent: 5566170 (1996-10-01), Bakke et al.
patent: 5583940 (1996-12-01), Vidrascu et al.
patent: 5586260 (1996-12-01), Hu
patent: 5604490 (1997-02-01), Blakley, III et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5615340 (1997-03-01), Dai et al.
patent: 5619648 (1997-04-01), Canale et al.
patent: 5623601 (1997-04-01), Vu
patent: 5636371 (1997-06-01), Yu
patent: 5644571 (1997-07-01), Seaman
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5689566 (1997-11-01), Nguyen
J.A. Adam, "Meta-matrices," IEEE Spectrum, 26 (Oct. 1992).
J.A. Adam, "Playing on the Net," IEEE Spectrum, 29 (Oct. 1992).
N.J. Belkin et al., "Information Filtering and Information Retrieval: Two Sides of the Same Coin?", Commun. of the ACM, 35, 29 (1992).
T.F. Bowen et al., "The Datacycle Architecture," Commun. of the ACM, 35, 71 (1992).
P.W. Foltz et al., "Personalized Information Delivery: An Analysis of Information Filtering Methods," Commun of the ACM, 35, 51 (1992).
D. Goldberg et al., "Using Collaborative Filtering to Weave an Information Tapestry," Commun. of the ACM, 35, 61 (1992).
S.T. Kent, "Internet Privacy Enhanced Mail," Commun. of the ACM, 36, 48 (1993).
K. Lee et al., "A Framework for Controlling Cooperative Agents," Computer, 8 (Jul. 1993).
S. Loeb, "Architecting Personalized Delivery of Multimedia Information," Commun. of the ACM, 35, 39 (1992).
K. Obraczka et al., "Internet Resource Discovery Services," Computer, 8 (Sep. 1993).
L. Press, "The Net: Progress and Opportunity, " Commun. of the ACM, 35, 21 (1992).
M.F. Schwartz, "Internet Resource Discovery at the University of Colorado," Computer, 25 (Sep. 1993).
Commun. of the ACM, 35, 28 (Dec. 1992).
Copy of PCT Search Report dated Apr. 9, 1996 by Areste Canosa for Application No. PCT/US95/12681 (8 pages).
S.M. Bellovin et al, entitled Network Firewalls, IEEE Communications Magazine, 32, No. 9, pp. 50-57, dated Sep. 1994.
J. Bryan, entitled Firewalls For Sale, BYTE, pp. 99-100, 102, 104-105, dated Apr. 1995.
F.T. Grampp, entitled UNIX Operating System Security, AT&T Bell Laboratories Technical Journal, 63, No. 8, pp. 1649-1672, dated Oct. 1984.
Lee Badger, et al., "Practical Domain and Type Enforcement for UNIX", 1995 IEEE Symposium on Security and Privacy, pp. 66-77, (May, 1995).
William R. Bevier, et al., "Connection Policies and Controlled Interference", The Eighth IEEE Computer Security Foundations Workshop, IEEE Computer Society Technical Committee on Security and Privacy, pp. 167-176, (Jun. 1995).
B. B. Dillaway, et al., "A Practical Design For A Multilevel Secure Database Management System", American Institute of Aeronautics and Astronautics, Inc., pp. 44-57, (Dec. 1986).
Todd Fine, et al., "Assuring Distributed Trusted Mach", IEEE Computer Society Symposium on Research in Security and Privacy, pp. 206-218, (1993).
J. Thomas Haigh, et al., "Extending the Noninterference Version of MLS for SAT", IEEE Transactions on Software Engineering, vol. SE-13, No. 2, pp. 141-150, (Feb, 1987).
Yuet C. Lee, et al., "Multimedia: Full Service Impact on Business, Education, and the Home", SPIE -The International Society for Optical Engineering, vol. 2617, pp. 143-150, (Oct. 1995).
Richard E. Smith, "Sidewinder: Defense in Depth Using Type Enforcement", International Journal of Network Management, pp. 219-229, (Jul.-Aug. 1995).
"100% of Hackers Failed to Break Into One Internet Site Protected by Sidewinder", News Release, Secure Computing Corporation (Feb. 16, 1995).
"Internet Security System Given `Product of the Year` Award", News Release, Secure Computing Corporation (Mar. 28, 1995).
"SATAN No Threat to Sidewinder.TM.", News Release, Secure Computing Corporation (Apr. 26, 1995).
Ancilotti, P., et al., "Language Features for Access Control", IEEE Transactions on Software Engineering, SE-9, 16-25 (Jan. 1983).
Damashek, M., "Gauging Similarity with n-Grams: Language-Independent Categorization of Text", Science, 267, 843-848, (10 Feb. 1995).
Lampson, B.W. "Dynamic Protection Structures", AFIPS Conference Proceedings, vol. 35, 1969 Fall Joint Computer Conference, Las Vegas, NV, 27-38 (Nov. 18-20, 1969).
Schroeder, M.D., et al., "A Hardware Architecture for Implementing Protection Rings", Communications of the ACM, 15, 157-170 (Mar. 1972).
Thomsen, D., "Type Enforcement: the new security model", SPIE Proceedings, vol. 2617 from Oct. 23-24, 1995, 143-150, (1995).
Warrier, U.S., et al., "A Platform for Heterogeneous Interconnection Network Management", IEEE J. on Selected Areas in Communications, vol. 8, No. 1, 119-126, (1990).
Wolfe, A, "Honeywell Builds Hardware for Computer Security", Electronics, 14-15 (Sep. 2, 1985).
"Answers to Frequently Asked Questions About Network Security", Secure Computing Corporation, pp. 1-41 & pp. 1-16, (Sep. 25, 1994).
"Sidewinder Internals", Product Information, Secure Computing Corporation, 16 p., (Oct. 12, 1994).
"Special Report: Secure Computing Corporation and Network Security", Computer Select, 13 p., (Dec. 1995).
McCarthy, S.P., "Hey Hackers| Secure Computing Says You Can't Break into this Telnet site", Computer Select, 2 p., (Dec. 1995).
Merenbloom, P., "Network `Fire Walls` Safeguard LAN Data from Outside Intrusion", Infoworld, LAN Talk, p. 69 & add'l page, (Jul. 25, 1994).
Metzger, P., et al., "IP Authentication using Keyed MD5", Network Working Group, Request for Comment No. 1828, 6 p., (Aug. 1995).
Smith, R.E., "Constructing a High Assurance Mail Guard", Secure Computing Corporation (Appeared in the Proceedings of the National Computer Security Conference), 7 p., (Oct. 1994).
Stadnyk, I., et al., "Modeling User's Interests in Information Filters", Communications of th

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System for providing secure internetwork by connecting type enfo does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System for providing secure internetwork by connecting type enfo, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for providing secure internetwork by connecting type enfo will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1456896

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.