$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Network security device which performs MAC address translation without affecting the IP address 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0529497 (1995-09-18)
발명자 / 주소
  • Friedman Aharon
  • Levy Ben Zion
출원인 / 주소
  • Digital Secured Networks Techolognies, Inc.
대리인 / 주소
    Meltzer, Lippe Goldstein, et al.
인용정보 피인용 횟수 : 186  인용 특허 : 0

초록

A network security device is connected between a protected client and a network. The network security device negotiates a session key with any other protected client. Then, all communications between the two clients are encrypted. The inventive device is self-configuring and locks itself to the IP a

대표청구항

[ We claim:] [1.] A network security device which does no routing and is configured to protect at least one particular node, the node having a first media access control (MAC) address and an Internet address and which communicates via a network, comprising:a. a first interface connected to the at le

이 특허를 인용한 특허 (186)

  1. Marchetti, Fabio Marco; Pillai, Krishnakumar; Weeresinghe, Ranjith; Jahani, Farshideh Ghazi; Boray, Giridhar K.; Abu-Amara, Hosame, Address resolution for internet protocol sub-networks in asymmetric wireless networks.
  2. Dholakia, Mehul; Talmor, Ron, Authentication techniques.
  3. Dholakia, Mehul; Talmor, Ron, Authentication techniques.
  4. Dholakia, Mehul; Talmor, Ron, Authentication techniques.
  5. Shu,Li; Weinstein,William, Camouflage of network traffic to resist attack.
  6. Pollan, C. Evan; Prager, Neal R.; Jagtap, Sameer S., Capacity pooling for application reservation and delivery.
  7. Shima, Hisato; Nakano, Takehiko, Communication apparatus and associated method of controlling distribution of content to network devices.
  8. Teraoka Fumio,JPX, Communication method and communication apparatus.
  9. Mahalingaiah, Rupaka, Communication network having packetized security codes and a system for detecting security breach locations within the network.
  10. Kivinen, Tero; Ylonen, Tatu, Communications across a network address translator.
  11. Kivinen, Tero; Ylonen, Tatu, Communications across a network address translator.
  12. Woolston, Thomas G., Computer-implement method and system for conducting auctions on the internet.
  13. Maufer, Thomas A.; Gyugl, Paul J.; Nanda, Sameer; Sidenblad, Paul J., Data structures and state tracking for network protocol processing.
  14. Maufer, Thomas A.; Gyugyi, Paul J.; Nanda, Sameer; Sidenblad, Paul J., Data structures and state tracking for network protocol processing.
  15. Maufer, Thomas A.; Gyugyi, Paul J.; Nanda, Sameer; Sidenblad, Paul J., Data structures and state tracking for network protocol processing.
  16. Maufer,Thomas Albert; Nanda,Sameer; Sidenblad,Paul J., Detection of support for security protocol and address translation integration.
  17. Feldman Nancy Karen ; Viswanathan Arun ; Woundy Richard M. ; Boivie Richard H., Determining and maintaining hop-count for switched networks.
  18. Kivinen, Tero; Ylonen, Tatu, Determining occurrence of a network address translation.
  19. Wilkinson,Mark L.; Miller,Ronald J.; McDaniels,Michael J., Deterring network incursion.
  20. Van A. Hunter ; Milan Momirov, Efficient search and organization of a forwarding database or the like.
  21. Cohen Joshua L. ; Dean Cecil A. ; du Breuil Thomas L. ; Heer Daniel Nelson ; Maher David P. ; Poteat Vance Eugene ; Rance Robert John, Electronic identifiers for network terminal devices.
  22. Hu, Cheng Hong; Yuan, Chin; Liu, Kuo Hui, Enhanced H-VPLS service architecture using control word.
  23. Liu, Kuo-Hui; Hu, Cheng-Hong; Yuan, Chin; Pok, Chou Lan, Ethernet architecture with data packet encapsulation.
  24. Johansson, Mathias; Beming, Per; Roobol, Christiaan; Rathonyi, Bela; Sachs, Joachim; Meyer, Michael; Kalden, Roger, Flexible radio link control protocol.
  25. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Gateway device having an XML interface and associated method.
  26. Redlich, Jens-Peter, IP network access for portable devices.
  27. Xiong,Bo; Li,Chuang, Information routing device having an auto-configuration feature.
  28. Wilkinson, Mark L.; Miller, Ronald J.; McDaniels, Michael J., Logical / physical address state lifecycle management.
  29. Wilkinson, Mark L.; Miller, Ronald J.; McDaniels, Michael J., Logical / physical address state lifecycle management.
  30. Kivinen, Tero; Ylonen, Tatu, Maintaining network address translations.
  31. Kivinen, Tero; Ylonen, Tatu, Maintaining network address translations.
  32. Woolston, Thomas G., Marketing goods with bar codes.
  33. Woolston, Thomas G., Marketplace payments.
  34. Litvin, Moshe, Media access control address translation in virtualized environments.
  35. Litvin, Moshe, Media access control address translation in virtualized environments.
  36. Litvin, Moshe, Media access control address translation in virtualized environments.
  37. Litvin, Moshe, Media access control address translation in virtualized environments.
  38. Swales, Andrew G.; Papadopoulos, A. Dean; Tanzman, Allan, Messaging application layer over ethernet to transport layer (TCP) communications method and apparatus for a modular terminal input/output system.
  39. Fink, Russell A.; Bubnis, Jr., Edward A.; Keller, Thomas E., Method and apparatus for anonymous IP datagram exchange using dynamic network address translation.
  40. Hickman, Paul L., Method and apparatus for controlling a computer over a TCP/IP protocol network.
  41. Dean, Michael Anthony, Method and apparatus for dynamic mapping.
  42. Lingafelt,Charles Steven; McKenna,John Joseph; Sisk,Robert Barry, Method and apparatus for protecting a web server against vandals attacks without restricting legitimate access.
  43. Fink,Russell Andrew; Brannigan,Matthew Aloysius; Evans,Shelby Alana; Almeida,Aswin Morgan; Ferguson,Shelley Anne, Method and apparatus for providing adaptive self-synchronized dynamic address translation.
  44. Fink, Russell Andrew; Brannigan, Matthew Aloysius; Evans, Shelby Alana; Almeida, Aswin Morgan, Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor.
  45. Fink, Russell Andrew; Brannigan, Matthew Aloysius; Evans, Shelby Alana; Almeida, Aswin Morgan, Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor.
  46. Mahalingaiah, Rupaka, Method and apparatus for providing continuous user verification in a packet-based network.
  47. Droms, Ralph; Schnizlein, John M., Method and apparatus for registering auto-configured network addresses based on connection authentication.
  48. Droms, Ralph; Schnizlein, John M., Method and apparatus for registering auto-configured network addresses based on connection authentication.
  49. Droms,Ralph; Schnizlein,John M., Method and apparatus for registering auto-configured network addresses based on connection authentication.
  50. Mahalingaiah, Rupaka, Method and apparatus for securing communication over public network.
  51. Brantley W. Coile ; Richard A. Howes ; William M. LeBlanc, Method and apparatus for transparently proxying a connection.
  52. Coile,Brantley W.; Howes,Richard A.; LeBlanc,William M., Method and apparatus for transparently proxying a connection.
  53. Maria Arturo ; Owens Leslie Dale, Method and apparatus for updating address lists for a packet filter processor.
  54. Ichikawa Takeo,JPX ; Kayama Hidetoshi,JPX ; Yamamoto Hiroyuki,JPX ; Takanashi Hitoshi,JPX ; Morikura Masahiro,JPX, Method and base station for packet transfer.
  55. Jardin, Cary A., Method and system for managing secure client-server transactions.
  56. Woolston, Thomas G., Method and system for retrieving information regarding an item posted for sale.
  57. Fraser, Neil R., Method and system for securely displaying and confirming request to perform operation on host computer.
  58. Fielder, Guy, Method and system for securing communication.
  59. Fielder, Guy, Method and system for securing communication.
  60. Fielder, Guy, Method and system for securing communication.
  61. Fielder, Guy, Method and system for securing communication.
  62. Fielder, Guy, Method and system for securing communication.
  63. Fielder, Guy, Method and system for securing communication.
  64. Fielder, Guy, Method and system for securing communication.
  65. Fielder, Guy, Method and system for securing communication.
  66. Wurch,Donald L.; Le,Liem Q.; Becker,Carey B.; Qaddoura,Emad A.; Coffin,Russ C., Method and system for switching between two network access technologies without interrupting active network applications.
  67. Jaenicke, Lutz, Method and system for the transparent transmission of data traffic between data processing devices, corresponding computer program product, and corresponding computer-readable storage medium.
  68. Sigaud, Alain, Method enabling secure access by a station to at least one server, and device using same.
  69. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  70. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  71. Woolston, Thomas G., Method for facilitating commerce at an internet-based auction.
  72. Duncan Alex,IEX ; Farrell Stephan,IEX ; Scott Cedric,IEX, Method for granting accesses to information in a distributed computer system.
  73. Aravamudan Murali ; Tzeng Hong-Yi, Method for network address translation.
  74. Ruutu,Jussi; Ma,Jian, Method for optimizing of data transmission.
  75. Yoon Chang Woo,KRX ; Kim Young Hoon,KRX ; Kim Dae Ung,KRX, Method of authenticating and charging a client using a web infoshop service system.
  76. Holtz, Eric; James, David; Healy, Michael, Method, system and apparatus for managing computer identity.
  77. Woolston, Thomas G., Methods and systems for searching for goods.
  78. Woolston, Thomas G., Methods and systems for searching for goods and services.
  79. Woolston, Thomas G., Methods and systems for searching for goods in a virtual marketplace.
  80. Doyle,Ronald P.; Hind,John R.; Narten,Thomas; Peters,Marcia L., Methods, systems and computer program products for detecting a spoofed source address in IP datagrams.
  81. Kuehr-McLaren, David; Shoriak, Timothy G., Methods, systems and computer program products for multi-packet message authentication for secured SSL-based communication sessions.
  82. Tripunitara, Mahesh V.; Dutta, Partha, Middle approach to asynchronous and backward-compatible detection and prevention of ARP cache poisoning.
  83. Aoki Takayasu,JPX, Mobile communication system with access function to computer network.
  84. Peterson, Christopher D., Mobile device identify factor for access control policies.
  85. Peterson, Christopher D.; Gautam, Venkatesh N., Mobile device identify factor for access control policies.
  86. Petkus, Eric Edmond; Yancy, Bruce Wayne; Dellmo, Russell Wayne; Hyland, Gregory Andrew; Newland, Scott Richard; Bolick, David Anthony; Waldo, Lawrence Richard; Bricher, Daniel John, Modular cryptographic device and related methods.
  87. Yancy, Bruce Wayne; Waldo, Lawrence Richard, Modular cryptographic device providing enhanced communication control features and related methods.
  88. Dellmo, Russell Wayne; Yancy, Bruce Wayne, Modular cryptographic device providing enhanced interface protocol features and related methods.
  89. Dellmo, Russell Wayne; Petkus, Eric Edmond; Yancy, Bruce Wayne, Modular cryptographic device providing multi-mode wireless LAN operation features and related methods.
  90. Bricher, Daniel John; Dellmo, Russell Wayne; Yancy, Bruce Wayne; Waldo, Lawrence Richard, Modular cryptographic device providing status determining features and related methods.
  91. Wolf, Bryan, Multi-party encryption systems and methods.
  92. Reamer, Douglas Alan, Multiconfigurable device masking shunt and method of use.
  93. Kwan, Philip; Ho, Chi-Jui, Multiple tiered network security system, method and apparatus using dynamic user policy assignment.
  94. Kwan, Philip; Ho, Chi-Jui, Multiple tiered network security system, method and apparatus using dynamic user policy assignment.
  95. Johnson, Scott C.; McCrory, Dave D., Network abstraction and isolation layer for masquerading machine identity of a computer.
  96. Johnson, Scott C.; McCrory, Dave D., Network abstraction and isolation layer for masquerading machine identity of a computer.
  97. Willman, Charles A.; Johnson, Scott C.; McCrory, Dave D.; Hirschfeld, Robert A., Network abstraction and isolation layer rules-based federation and masquerading.
  98. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  99. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  100. Mahalingaiah, Rupaka, Network packet transmission mechanism.
  101. Friedman Aharon ; Bozoki Eva, Network security device.
  102. Fujita Naoyuki,JPX, Network unauthorized access analysis method, network unauthorized access analysis apparatus utilizing the method, and computer-readable recording medium having network unauthorized access analysis pr.
  103. Seki, Yoshinaga; Hasei, Shinji; Uotani, Miho; Makino, Tatsuya, Network unauthorized access preventing system and network unauthorized access preventing apparatus.
  104. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  105. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  106. Lee,Young ji, Return routability method for secure communication.
  107. Kivinen, Tero; Ylonen, Tatu, Revealing address information in systems where network address translations occur.
  108. Kivinen, Tero; Ylonen, Tatu, Revealing occurrence of network address translations.
  109. Moran Paul J.,GBX, Search apparatus.
  110. Subramaniam Anand ; Ebrahimi Hashem M., Secure intranet access.
  111. Subramaniam, Anand; Ebrahimi, Hashem M, Secure intranet access.
  112. Subramaniam, Anand; Ebrahimi, Hashem M, Secure intranet access.
  113. Fielder, Guy, Secure island computing system and method.
  114. Fielder, Guy, Secure island computing system and method.
  115. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  116. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  117. Whitaker,David J; Anspach,Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  118. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  119. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  120. Mayes,John C.; Coile,Brantley W., Security system for network address translation systems.
  121. Hutchinson,Scott H.; Hanka,Gregory M., Software-implemented method for identifying nodes on a network.
  122. Kwan, Philip, System and method for ARP anti-spoofing security.
  123. Kwan, Philip, System and method for ARP anti-spoofing security.
  124. Kwan, Philip, System and method for ARP anti-spoofing security.
  125. Kwan, Philip, System and method for ARP anti-spoofing security.
  126. Pagel, Ezra U.; Babbitt, David A.; Jagtap, Sameer S., System and method for aggregating communications and for translating between overlapping internal network addresses and unique external network addresses.
  127. Fielder, Guy, System and method for authenticating users.
  128. Fielder, Guy, System and method for authenticating users.
  129. Fielder, Guy, System and method for authenticating users.
  130. Fielder, Guy, System and method for authenticating users.
  131. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  132. Leonardo C. Massarani, System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks.
  133. Retana, Alvaro E.; Cook, David A.; White, Russell I.; Yang, Yi; Chandra, Madhavi W., System and method for controlling the flooding of information in a network environment.
  134. Retana,Alvaro E.; Cook,David A.; White,Russell I.; Yang,Yi; Chandra,Madhavi W., System and method for controlling the flooding of information in a network environment.
  135. Alvermann, John M.; Babich, David D.; Black, William T., System and method for creating a security application for programmable cryptography module.
  136. Fielder, Guy, System and method for creating and protecting secrets for a plurality of groups.
  137. Boden, Edward B., System and method for dynamic micro placement of IP connection filters.
  138. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  139. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  140. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection with unknown network and/or user device.
  141. David Robert Wray GB; David John Blanchfield GB, System and method for extensible positive client identification.
  142. Kwan, Philip, System and method for flexible authentication in a data communications network.
  143. Ye,Feng; Zhang,Kui; Claise,Benoit, System and method for generating a traffic matrix in a network environment.
  144. Tawil, Ahmad H.; Cherian, Jacob, System and method for generating world wide names.
  145. Sasvari,Gyorgy, System and method for management of memory access in a communication network by use of a hyperbolic mapping function.
  146. Wilkinson, Mark L.; Miller, Ronald J.; McDaniels, Michael J., System and method for managing network communications.
  147. Boden,Edward B.; Gruber,Franklin A., System and method for network address translation integration with IP Security.
  148. Boden, Edward B.; Gruber, Franklin A., System and method for network address translation integration with IP security.
  149. Boden, Edward B.; Monroe, Tod A., System and method for network address translation integration with IP security.
  150. Boden,Edward B.; Melville,Mark J.; Monroe,Tod A.; Paxhia,Frank V., System and method for network address translation integration with IP security.
  151. Szeto, Ronald W.; Kwan, Philip; Kwong, Raymond Wai-Kit, System and method for protecting CPU against remote access attacks.
  152. Szeto, Ronald W.; Kwan, Philip; Kwong, Raymond Wai-Kit, System and method for protecting CPU against remote access attacks.
  153. Fielder, Guy, System and method for protecting secrets file.
  154. Fielder, Guy, System and method for protecting secrets file.
  155. Gabber, Eran; Gibbons, Phillip B.; Kristol, David Morris; Matias, Yossi; Mayer, Alain J., System and method for providing anonymous remailing and filtering of electronic mail.
  156. Kwan, Philip, System and method for source IP anti-spoofing security.
  157. Kwan, Philip, System and method for source IP anti-spoofing security.
  158. Szeto, Ronald W.; Jain, Nitin; Suresh, Ravindran; Kwan, Philip, System and method for source IP anti-spoofing security.
  159. Szeto, Ronald W.; Jain, Nitin; Suresh, Ravindran; Kwan, Philip, System and method for source IP anti-spoofing security.
  160. Chandra,Madhavi W.; Cook,David A.; Retana,Alvaro E.; White,Russell I.; Yang,Yi, System and method for synchronizing link state databases in a network environment.
  161. Cook, David A.; Ng, James L.; Retana, Alvaro E.; White, Russell I., System and method for verifying the validity of a path in a network environment.
  162. Gorman, David B.; Catherine, Gregory J.; Peragine, Richard; Conrad, Beverly; Gearhart, G. Duane; Moy, David, System for intrusion detection and vulnerability analysis in a telecommunications signaling network.
  163. Kwan, Philip, System, method and apparatus for providing multiple access modes in a data communications network.
  164. Kwan, Philip, System, method and apparatus for providing multiple access modes in a data communications network.
  165. Kwan, Philip, System, method and apparatus for providing multiple access modes in a data communications network.
  166. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  167. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  168. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  169. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  170. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  171. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  172. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  173. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  174. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  175. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  176. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  177. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  178. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  179. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  180. Ebrahimi, Hashem M.; Carter, Stephen R; Oyler, Mel J, Techniques for managing secure communications.
  181. Wang, Sheng-Yih; Talmor, Ron, Techniques for preventing attacks on computer systems and networks.
  182. Ebrahimi, Hashem Mohammad; Ackerman, Mark D.; Oyler, Mel J, Techniques for securely managing and accelerating data delivery.
  183. Fielder, Guy, Token for securing communication.
  184. Pullela, Venkateshwar Rao; Kaluve, Shyamasundar, Translating native medium access control (MAC) addresses to hierarchical MAC addresses and their use.
  185. Arrow Leslie J. ; Bots Henk J. ; Hoke Mark R. ; Hunt William E. ; Huntley Bruce T., Translating packet addresses based upon a user identifier.
  186. Choi, Jin-hyeon; Shin, Sang-hyun, Wireless network apparatus storing authentication information in multiple formats and areas and authentication method of the same.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로