$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Stand alone security device for computer networks 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G09C-001/06
출원번호 US-0086367 (1998-05-28)
발명자 / 주소
  • Holden James M.
  • Levin Stephen E.
  • Nickel James O.
  • Wrench Edwin H.
인용정보 피인용 횟수 : 80  인용 특허 : 6

초록

A secured network interface unit (SNIU) for providing multi-level security on a network having a plurality of secured and unsecured users including: network interface means for communicating on the network; identifying the source and destination of a message intercepted on the network; determining t

대표청구항

[ What is claimed is:] [1.] A secured network interface unit (SNIU) for providing multi-level security on a network having a plurality of secured and unsecured users comprising:network interface means for communicating with other SNIUs, and intercepting and retransmitting packets on said network, wh

이 특허에 인용된 특허 (6)

  1. Kimbell Blanton (27 Hastings Rd. Marlboro NJ 07746), Communication security accessing system and process.
  2. Wirstrom Peter (Pepper Pike OH) Cork William H. (Lake Bluff IL), Computer communications security control system.
  3. Schlesinger Artie (825 E. 9th St. Brooklyn NY 11230), Computer security system having remote location recognition and remote location lock-out.
  4. Orita Yukio (Tokyo JPX), Computer system with file security function.
  5. Hann J. David (Vienna VA) Holdahl Theodore S. (Bethesda MD) Lum James C. P. (Herndon VA), Method and apparatus for enhancing security of communications in a packet-switched data communications system.
  6. Ankney Richard C. (Chantilly VA) Bonica Ronald P. (Falls Church VA) Kay Douglas E. (Chevy Chase MD) Pashayan Patricia A. (Herndon VA) Spitzer Roy L. (Vienna VA), Telecommunication access management system for a packet switching network.

이 특허를 인용한 특허 (80)

  1. Lingafelt,C. Steven; McConnell,Daniel Edward; Noel, Jr.,Francis E.; Sannipoli,Charles J., Apparatus and method for using a network processor to guard against a "denial-of-service" attack on a server or server cluster.
  2. Oscar S. Alonso ; John S. Calabrese ; Herbert C. Morris ; Rodelito L. Victa, Authentication and authorization mechanisms for Fortezza passwords.
  3. Walmsley,Simon Robert, Authentication chip for authenticating an untrusted chip.
  4. Watanabe,Isao, Authentication method, apparatus, and system.
  5. Brownlie Michael,CAX ; Hillier Stephen,CAX ; Van Oorschot Paul C.,CAX, Computer network security system and method having unilateral enforceable security policy provision.
  6. Brownlie,Michael; Hillier,Stephen; Van Oorschot,Paul C., Computer network security system and method having unilateral enforceable security policy provision.
  7. Challener, David Carroll; Cromer, Daryl Carvis; Desai, Dhruv M.; Ellison, Brandon Jon; Locker, Howard; Trotter, Andy Lloyd; Ward, James Peter, Data processing system and method including a network access connector for limiting access to the network.
  8. Harp, Steven Alex; Haigh, J Thomas; Gohde, Johnathan A; O'Brien, Richard C; Payne, Jr., Charles N; VanRiper, Ryan A, Device for preventing, detecting and responding to security threats.
  9. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  10. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with aggregation and integrated display of related messages.
  11. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with functionality to include both private and public messages in a communication.
  12. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with functionally for senders to control actions performed by message recipients.
  13. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with pre-message-retrieval display of message metadata.
  14. Kunzinger, Charles A., Establishing consistent, end-to-end protection for a user datagram.
  15. Reece,Richard W., Global encryption system.
  16. Gospodarek, Andrew; Horman, Neil, Identifying frames.
  17. Felsher, David Paul, Information record infrastructure, system and method.
  18. Strom, Marius; Olarig, Sompong Paul; Lionetti, Chris, Instruction cards for storage devices.
  19. Kunzinger,Charles A., Integrated system for network layer security and fine-grained identity-based access control.
  20. Kim,Young Il, MAC address-based communication restricting method.
  21. Hwu,Nan Shan, Method and apparatus for an active standby control system on a network.
  22. Tanzman,Allan; Dube,Dennis J. W.; Mooney,Stephen, Method and apparatus for an active standby control system on a network.
  23. Galovich, David J., Method and apparatus for the transfer of sensitive card data over an unsecure computer network.
  24. Shamsaasef, Rafie; Manglore, Geetha; Peterka, Petr; Medvinsky, Alexander, Method and system for providing third party authentication of authorization.
  25. Swiler,Laura Painton; Phillips,Cynthia A., Method and tool for network vulnerability analysis.
  26. Edwards, John, Method for the provision of a network service.
  27. Hersent,Olivier, Method of transporting packets between an access interface of a subscriber installation and a shared network, and access interface implementing such method.
  28. Douglas C. Barlow, Methods and arrangements for mapping widely disparate portable tokens to a static machine concentric cryptographic environment.
  29. Holden James M. ; Levin Stephen E. ; Snow David W. ; Wrench Edwin H., Mixed enclave operation in a computer network.
  30. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  31. Holden, James M.; Levin, Stephen E.; Snow, David W.; Wrench, Edwin H., Mixed enclave operation in a computer network.
  32. Holden,James M.; Levin,Stephen E.; Snow, legal representative,Mary; Wrench,Edwin H.; Snow, deceased,David W., Mixed enclave operation in a computer network.
  33. Weller, Michael K.; Mangra, Tarachrand A.; Litzinger, Joseph A.; Shah, Sanket J., Multi-level secure (MLS) information network.
  34. Hoffberg, Steven M., Multifactorial optimization system and method.
  35. Price, Darrel J., Multiple independent levels of security containing multi-level security interface.
  36. Edwards, John, Network communications.
  37. Miglani, Jitender; Thattai, Vijayan, Network switch with hierarchical security.
  38. Madoukh, Ashraf T., Object-based security system.
  39. Lamotte, Thierry, Portable device for securing packet traffic in a host platform.
  40. Slavin,Keith R, Public key cryptography using matrices.
  41. Slavin,Keith R, Public key cryptography using matrices.
  42. Sadovsky, Vladimir; Olarig, Sompong Paul; Lionetti, Chris; Hamilton, James Robert, Remote access control of storage devices.
  43. Sadovsky, Vladimir; Olarig, Sompong Paul; Lionetti, Chris; Hamilton, James Robert, Remote access control of storage devices.
  44. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  45. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  46. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  47. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  48. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  49. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Secure electronic mail system.
  50. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Secure electronic mail system with configurable cryptographic engine.
  51. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system with for your eyes only features.
  52. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Wilson, Alex; Yee, Tina, Secure electronic mail system with thread/conversation opt out.
  53. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronics mail system.
  54. Weller, Michael K.; Canter, Jeffrey B., Secure network interface device.
  55. Still, David N.; Calabrese, John S., Selectively forced redirection of network traffic.
  56. Still, David N.; Calabrese, John S., Selectively forced redirection of network traffic.
  57. Still,David N.; Calabrese,John S., Selectively forced redirection of network traffic.
  58. Still,David N.; Deng,Mingqi; Roden,Thomas A., Selectively passing network addresses through a server.
  59. Hotra, Jonathan N.; Luecke, Kenn R., Statically partitioning into fixed and independent systems with fixed processing core.
  60. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  61. Hoffberg, Steven M., System and method for determining contingent relevance.
  62. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for generating fictitious content for a computer.
  63. Jemes,Brian; Brawn,John Melvin; Garcia,Joseph; Milligan,Michael; Pape,John M.; Hansell,Jeff, System and method for implementing network security policies on a common network infrastructure.
  64. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  65. Vance, Eric P., System and method for machines to communicate over the internet.
  66. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for preventing detection of a selected process running on a computer.
  67. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  68. Callas, Jonathan D.; Price, III, William F.; Allen, David E., System and method for secure electronic communication in a partially keyless environment.
  69. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  70. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  71. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  72. Carmeli, Haim Baruch, System and method for securing a computer communication network.
  73. Lyle, Michael P.; Maricondo, James R., System and method for tracking the source of a computer attack.
  74. Moran, Douglas B., System and method for using timestamps to detect attacks.
  75. Sutterfield, Brian D.; Atwater, Bradley T., System and method of protecting a system that includes unprotected computer devices.
  76. Mark James McArdle ; Steven Blair Schoenfeld, System and methodology for messaging server-based management and enforcement of crypto policies.
  77. Freund, Gregor P., System and methodology for protecting new computers by applying a preconfigured security update policy.
  78. Herrmann, Conrad K.; Baharestan, Kaveh; Bentley, Joseph E.; Leroy, Jess A., System and methods providing anti-virus cooperative enforcement.
  79. Fisher, Gerald B.; Nesse, Theodore Arthur; Murthy, Perali Venkata Seshu Sathyanarayana; Neckaraje, Sunil Kumar, Systems and methods for communicating messages.
  80. Sidana, Ashmeet; Kolte, Priyadarshan; Lin, Calvin, Systems and processes for executing private programs on untrusted computers.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로