$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for extracting application protocol characteristics 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0345920 (1999-07-01)
발명자 / 주소
  • Raanan Gil,ILX
  • Moran Tal,ILX
  • Galant Yoron
  • El-Hanani Yuval,ILX
  • Reshef Eran
출원인 / 주소
  • Sanctum Ltd., ILX
대리인 / 주소
    Brown Raysman Millstein Felder & Steiner, LLP
인용정보 피인용 횟수 : 88  인용 특허 : 29

초록

A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message

대표청구항

[ What is claimed is:] [1.]1. A method for defining a set of allowable actions for an application program residing on a server, the method comprising:receiving a message transmitted by the server addressed to one or more clients;extracting application protocol data from the server message to thereby

이 특허에 인용된 특허 (29)

  1. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  2. Abadi Martin (Palo Alto CA) Goldstein Andrew C. (Hudson MA) Lampson Butler W. (Cambridge MA), Compound principals in access control lists.
  3. Duxbury Paul (Sandbach GB2), Computer system security.
  4. Hirsch Thomas S. (Bedford MA) Bianchi Richard S. (Billerica MA) Perry Ron B. (Wilton NH) Buck Kenneth J. (Tyngsboro MA), Copy file mechanism for transferring files between a host system and an emulated file system.
  5. Botz Patrick Samuel ; Moskalik Thomas Michael ; Snyder Devon Daniel ; Woodbury Carol Jean, Generic user authentication for network computers.
  6. Nerlikar Virupax M. (Plano TX), Information management and security system.
  7. Curtis Bryce Allen, Method and apparatus for creating a secure connection between a java applet and a web server.
  8. Abraham Dalen M. ; Barnes Todd A. ; Bouche Paul F. ; Bougetz Thomas P. ; Gosselin Tracy A. ; Grieve Mark G. ; Langdon Brent A. ; Allison Robert C. ; Nikkel Michael S., Method and apparatus for managing internetwork and intranetwork activity.
  9. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  10. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  11. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA), Method for performing group exclusion in hierarchical group structures.
  12. Bruno Richard Frank ; Katseff Howard Paul ; Markowitz Robert Edward ; Perea Carlos Alberto ; Robinson Bethany Scott ; Suresh Sethuraman ; Williams Hugh L., Network access to internet and stored multimedia services from a terminal supporting the H.320 protocol.
  13. Ross Jay B. (Pennington NJ), Protocol converter for a secure FAX transmission system.
  14. Autrey Kevin ; Gessel Robert J., Protocol interface gateway and method of connecting an emulator to a network.
  15. Mousseau Gary P. (Waterloo CAX) Lazaridis Mihal (Waterloo CAX) Little Herb A. (Waterloo CAX) Barnstijn Michael A. (Waterloo CAX), Remote control of gateway functions in a wireless data communication network.
  16. Jacobs Dwayne C. (Austin TX) Wangler James A. (Cedar Park TX), Remote password administration for a computer network among a plurality of nodes sending a password update message to al.
  17. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  18. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  19. Kimura Nobuko,JPX ; Onodera Takashi,JPX ; Yokoshi Noriyuki,JPX, System and method for converting communication protocols.
  20. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  21. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  22. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  23. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  24. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  25. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  26. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  27. Nakano Kazuo (Aichi JPX), Terminal control system.
  28. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  29. Rosenthal David S. H. (Palo Alto CA), X window security system.

이 특허를 인용한 특허 (88)

  1. Ben-Itzhak, Yuval, Application layer security method and system.
  2. Novoselsky, Alexander; Rubinstein, Dmitry; Genshaft, Igor, Application level gateway for request verification.
  3. Chess, Brian V.; Ragoler, Iftach; Hamer, Philip Edward; Spitler, Russell Andrew; Fay, Sean Patrick; Jagdale, Prajakta Subbash, Application security testing.
  4. Chess, Brian V.; Ragoler, Iftach; Hamer, Philip Edward; Spitler, Russell Andrew; Fay, Sean Patrick; Jagdate, Prajakta Subbash, Application security testing.
  5. Ben Itzhak,Yuval, Application-layer security method and system.
  6. Gallagher,Thomas P., Automated detection of cross site scripting vulnerabilities.
  7. Bromwich, Adam, Automatic training of a database intrusion detection system.
  8. Nachenberg,Carey, Computer code intrusion detection system based on acceptable retrievals.
  9. Kimmel, Gerald D.; Adamouski, Francis J.; Domangue, Ersin L.; Kimmel, Wayne R.; Lightburn, James G.; Viola, Leonard R., Cryptographic key management.
  10. Prahlad, Anand; Gokhale, Parag; Kottomtharayil, Rajiv; Lu, Jun; Pawar, Rahul S., Data mining systems and methods for heterogeneous data sources.
  11. Shulman, Amichai; Be'ery, Tal Arieh, Dealing with web attacks using cryptographically signed HTTP cookies.
  12. Spielman, Chaim, Detecting anomalous web proxy activity.
  13. Nachenberg,Carey S.; Yung,Pak Wai, Detecting code injection attacks against databases.
  14. Bromwich, Adam; Wilhelm, Jeffrey, Determining origins of queries for a database intrusion detection system.
  15. Nachenberg, Carey; Wawda, Abu; Bromwich, Adam; Lee, On; Sanders, Darren, Effective aggregation and presentation of database intrusion incidents.
  16. Seymour, Harlan; Satish, Sourabh; Yeh, Anne; Yeung, Benjamin, Empirical database access adjustment.
  17. Leavy, Penny C.; Hoglund, Michael Gregory; Gary, Jonathan Walter; Eller, Riley Dennis, Fault injection methods and apparatus.
  18. Leavy,Penny C.; Hoglund,Michael Gregory; Gary,Jonathan Walter; Eller,Riley Dennis, Fault injection methods and apparatus.
  19. Levesque,Gilbert; Naik,Dharmendra J.; Shinde,Mandar A.; Arora,Avaneesh C.; Haq,Syed F., Filtering network management messages.
  20. Hartmann, Alfred C., Filtering training data for machine learning.
  21. Hidalgo, Llius Mora; Lleonart, Xabier Panadero, Firewalls for providing security in HTTP networks and applications.
  22. Ho, Thuanan; Mishra, Rahul; Pedroza, Miguel; Pomerantz, Ori, Identification of web form parameters for an authorization engine.
  23. Kimmel, Gerald D.; Domangue, Ersin L.; Adamouski, Francis J., Information-centric security.
  24. Zuk, Nir, Intelligent integrated network security device.
  25. Zuk, Nir, Intelligent integrated network security device.
  26. Zuk, Nir, Intelligent integrated network security device.
  27. Zuk, Nir, Intelligent integrated network security device.
  28. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  29. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  30. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  31. Zuk, Nir; Mao, Yuming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  32. Parnafes, Itzhak; Mohaban, Shai; McCloghrie, Keith, Method and apparatus for communicating COPS protocol policies to non-COPS-enabled network devices.
  33. Parnafes, Itzhak; Mohaban, Shai; McCloghrie, Keith, Method and apparatus for communicating cops protocol policies to non-cops-enabled network devices.
  34. Schejter, Lior; Gilboa, Yuval, Method and apparatus for graphically constructing applications utilizing information from multiple sources.
  35. Shulman, Amichai; Shatz, Gur; Yellin, Ido, Method and security system for indentifying and blocking web attacks by enforcing read-only parameters.
  36. Groskop, Michael; Zisapel, Roy, Method and system for generating an enforceable security policy based on application sitemap.
  37. Lau, Leo Tat Man; Milek, Marko; Sardar, Adil M., Method for increasing system resource availability in database management systems.
  38. Glaser-Seidnitzer, Karlheinz; Mangold, Thomas; Seeberger, Elmar, Method for providing updated protocols in a medical radiology information system.
  39. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  40. Moyle, Stephen Anthony; Thwaites, Graham Kenneth, Method, a computer program and apparatus for processing a computer message.
  41. Moyle, Stephen Anthony, Method, computer program and apparatus for analysing symbols in a computer system.
  42. Moyle, Stephen Anthony, Method, computer program and apparatus for analyzing symbols in a computer system.
  43. Moyle, Stephen Anthony, Method, computer program and apparatus for analyzing symbols in a computer system.
  44. Moyle, Stephen Anthony; Galwas, Paul Anthony, Method, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor.
  45. Moyle, Stephen Anthony; Galwas, Paul Anthony, Method, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor.
  46. Jain, Amit; Martynenko, Konstantin; Costlow, Jeff; Holmes, David, Methods for dynamically constructing a service principal name and devices thereof.
  47. Walker, Anthony; Bellhart, Michael, Methods for optimizing service of content requests and devices thereof.
  48. Amdahl, Saxon; Majee, Sumandra; Shukla, Rajendra, Methods for traffic rate control and devices thereof.
  49. Sum, Sam Ng Ming; Madou, Matias, Modify execution of application under test so user is power user.
  50. Zuk, Nir; Guruswamy, Kowsik, Multi-method gateway-based network security systems and methods.
  51. Zuk, Nir; Guruswamy, Kowsik, Multi-method gateway-based network security systems and methods.
  52. Zuk, Nir; Guruswamy, Kowsik, Multi-method gateway-based network security systems and methods.
  53. North, Jr.,Paul R., Network communications analysis.
  54. Lyon,Barrett, Network overload detection and mitigation system and method.
  55. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  56. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  57. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  58. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  59. Leavy, Penny C.; Hoglund, Michael Gregory; Gary, Jonathan Walter; Eller, Riley Dennis, Pattern generation, IDS signature conversion, and fault detection.
  60. Nachenberg, Carey; Barajas, Frank, Real-time training for a computer code intrusion detection system.
  61. Movshovitz, David, Security for WAP servers.
  62. Mowshowitz,David, Security for WAP servers.
  63. Burckart, Erik J.; Fontes, Stephen M.; Lanzen, Craig A., Server-side protocol configuration of accessing clients.
  64. Burckart, Erik J.; Fontes, Stephen M.; Lanzen, Craig A., Server-side protocol configuration of accessing clients.
  65. Burckart, Erik J.; Fontes, Stephen M.; Lanzen, Craig A., Server-side protocol configuration of accessing clients.
  66. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  67. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
  68. Lin, YeeJang James, System and method for identifying real users behind application servers.
  69. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpoie, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  70. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  71. Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Walpole, Thomas Paul, System and method for interfacing with heterogeneous network data gathering tools.
  72. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  73. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  74. Cole, David M.; Hanzlik, Dennis J.; Caso, Erik, System and method for network vulnerability detection and reporting.
  75. Cole,David M.; Hanzlik,Dennis J.; Caso,Erik, System and method for network vulnerability detection and reporting.
  76. Keir,Robin M.; Ecker,Stephen A., System and method for network vulnerability detection and reporting.
  77. Kurtz, George R.; Cole, David M.; Caso, Erik; Kuykendall, Dan, System and method for network vulnerability detection and reporting.
  78. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  79. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  80. McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
  81. Yago, Paul C.; Wu, Miles; Zhang, Kaiwang, System and method for organizing objects of a voice call in a tree representation.
  82. Russ, Fernando Federico; Weil, Alejandro David; Eissler, Matias Ernesto; Dibar, Francisco Javier; Manrique, Hector Adrian, System and method for providing network penetration testing.
  83. Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
  84. Bates, Cary Lee; Day, Paul Reuben, System for collecting and storing email addresses with associated descriptors in a bookmark list in association with network addresses of electronic documents using a browser program.
  85. Reshef, Eran; El-Hanany, Yuval; Raanan, Gil; Tsarfati, Tom, System for determining web application vulnerabilities.
  86. Reshef,Eran; El Hanany,Yuval; Raanan,Gil; Tsarfati,Tom, System for determining web application vulnerabilities.
  87. Yago, Paul C.; Sangisetti, Ravi; Zhang, Kaiwang, System, method and computer program product for monitoring voice application calls over a network.
  88. Sajina, Anna; Zhang, Kaiwang, Voice protocol filtering system and method.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로