$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Efficient evaluation of rules 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 US-0878093 (2001-06-08)
발명자 / 주소
  • Cooper,Geoffrey
  • Sherlock,Kieran G.
  • Shaw,Bob
  • Valente,Luis
출원인 / 주소
  • Security, Inc.
대리인 / 주소
    Glenn Patent Group
인용정보 피인용 횟수 : 59  인용 특허 : 10

초록

A method and apparatus uses a proprietary algorithm for organizing network security policy rules in a way that minimizes the number of rules considered when determining the set of rules applicable to a given protocol event.

대표청구항

The invention claimed is: 1. A computer-implemented method for a policy engine first to organize pre-runtime and second to select policy rules in a way to effect an efficient evaluation of a protocol event at runtime, said protocol event having an agent descriptor, a protocol name, and a protocol a

이 특허에 인용된 특허 (10)

  1. Krishnan, P.; Raz, Danny; Sugla, Binay, Adaptive re-ordering of data packet filter rules.
  2. Johnson Woodrow W. ; Atkins Christine J. ; Yoh Jon, Electronic rights management and authorization system.
  3. Shrader Theodore Jack London, Filter rule validation and administration for firewalls.
  4. Scott L. Wiegel, Graphical network security policy management.
  5. Jiyang Xu ; Rodolphe Jean Nassif ; Joan Marie Swinney ; Connie Dell Winston, Method and system for correcting customer service orders.
  6. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules.
  7. Robert T. Baum ; Edward M. Eggerl ; William R. Burton ; Leo C. Cloutier, Real time firewall security.
  8. Kloth, Axel K., Rule based IP data processing.
  9. Attwood, Kira Sterling; Godwin, James Russell; Overby, Jr., Linwood Hugh; Perry, Brian Sean; Wierbowski, David John, Security rule database searching in a network security environment.
  10. Godwin, James Russell; Jones, David Andrew; Overby, Jr., Linwood Hugh; Wenklar, Richard Allen, Security rule processing for connectionless protocols.

이 특허를 인용한 특허 (59)

  1. Osterhout, Ralph F.; Haddick, John D.; Lohse, Robert Michael; Cella, Charles; Nortrup, Robert J.; Nortrup, Edward H., AR glasses with event and sensor triggered AR eyepiece interface to external devices.
  2. Osterhout, Ralph F.; Haddick, John D.; Lohse, Robert Michael; Cella, Charles; Nortrup, Robert J.; Nortrup, Edward H., AR glasses with event and sensor triggered control of AR eyepiece applications.
  3. Osterhout, Ralph F.; Haddick, John D.; Lohse, Robert Michael; Cella, Charles; Nortrup, Robert J.; Nortrup, Edward H., AR glasses with event and user action control of external applications.
  4. Haddick, John D.; Osterhout, Ralph F.; Lohse, Robert Michael, Adjustable extension for temple arm.
  5. Poling, Robert; Pugh, Richard S., Automatic discovery of users associated with screen names.
  6. Hajost, Brian H.; Jaramillo, Fredi, Automating the creation and maintenance of policy compliant environments.
  7. Sharpe, Richard; Taylor, John Richard; Chou, Randy Yen-pang, Avoiding client timeouts in a distributed filesystem.
  8. Hill, Duncan Christopher, Cloud computing gateway, cloud computing hypervisor, and methods for implementing same.
  9. Hill, Duncan Christopher, Cloud computing gateway, cloud computing hypervisor, and methods for implementing same.
  10. Hill, Duncan Christopher, Cloud computing gateway, cloud computing hypervisor, and methods for implementing same.
  11. Veeraraghavan, Venkatesh; Huang, Lin; Tennisberg, Targo; Fink, Nathan, Content targeting with audiences.
  12. Nadalin, Anthony J.; Wesley, Ajamu A., Context-sensitive confidentiality within federated environments.
  13. Nadalin, Anthony J.; Wesley, Ajamu A., Context-sensitive confidentiality within federated environments.
  14. Nadalin, Anthony J.; Wesley, Ajamu A., Context-sensitive confidentiality within federated environments.
  15. Valente,Luis Filipe Pereira; Cooper,Geoffrey Howard; Shaw,Robert Allen; Sherlock,Kieran Gerard, Declarative language for specifying a security policy.
  16. Schneider, Kenneth; McCorkendale, Bruce, Distributed platform for testing filtering rules.
  17. Kashyap, Vivek, Dynamically defining network access rules.
  18. Kashyap, Vivek, Dynamically defining rules for network access.
  19. Osterhout, Ralph F.; Haddick, John D.; Lohse, Robert Michael; Border, John N.; Miller, Gregory D.; Stovall, Ross W., Eyepiece with uniformly illuminated reflective display.
  20. Maufer,Thomas A.; Gyugyi,Paul J.; Nanda,Sameer; Sidenblad,Paul J., Fragment processing utilizing cross-linked tables.
  21. Miller, Gregory D.; Border, John N.; Osterhout, Ralph F., Grating in a light transmissive illumination system for see-through near-eye display glasses.
  22. Border, John N.; Bietry, Joseph; Haddick, John D.; Lohse, Robert Michael, Light control in head mounted displays.
  23. Osterhout, Ralph F.; Lohse, Robert Michael, Method and apparatus for biometric data capture.
  24. Cooper, Geoffrey; Sherlock, Kieran G.; Hoy, Mark, Method and apparatus for rate limiting.
  25. Harrison, Reuven, Method and system for mapping between connectivity requests and a security rule set.
  26. Harrison, Reuven, Method and system for mapping between connectivity requests and a security rule set.
  27. Stevenson, Thomas Edward; Matyger, Jr., Allan Michael; Smith, Paul; Sachen, Sean, Method and system for providing information from third party applications to devices.
  28. Elzur, Uri, Method and system for traffic engineering in secured networks.
  29. Elzur, Uri, Method and system for traffic engineering in secured networks.
  30. Elzur, Uri, Method and system for traffic engineering in secured networks.
  31. Krig, Scott A., Method, apparatus, and device for protecting against programming attacks and/or data corruption.
  32. Cooper,Geoffrey; Shaw,Robert Allen; Valente,Luis Filipe Pereira; Sherlock,Kieran Gerard, Network monitor internals description.
  33. Miller, Gregory D.; Border, John N.; Osterhout, Ralph F., Optical imperfections in a light transmissive illumination system for see-through near-eye display glasses.
  34. Stephens, Gregory D., Passively attributing anonymous network events to their associated users.
  35. Davis, Andrew P.; Taylor, John Richard; Chou, Randy Yen-pang, Performing deduplication in a distributed filesystem.
  36. Igakura, Tomohiro, Policy processing system, method, and program.
  37. Johnson, Stephen L.; Guo, Jinhong Katherine; Park, Il-Pyung, Security architecture and mechanism to access and use security components in operating system.
  38. Border, John N.; Haddick, John D.; Lohse, Robert Michael; Osterhout, Ralph F., See-through near-eye display glasses including a modular image source.
  39. Border, John N.; Osterhout, Ralph F., See-through near-eye display glasses including an auto-brightness control for the display brightness based on the brightness in the environment.
  40. Border, John N.; Osterhout, Ralph F., See-through near-eye display glasses with a fast response photochromic film system for quick transition from dark to clear.
  41. Border, John N.; Haddick, John D.; Osterhout, Ralph F., See-through near-eye display glasses with a light transmissive wedge shaped illumination system.
  42. Border, John N.; Haddick, John D.; Osterhout, Ralph F., See-through near-eye display glasses with a small scale image source.
  43. Border, John N.; Haddick, John D.; Lohse, Robert Michael; Osterhout, Ralph F., See-through near-eye display glasses with the optical assembly including absorptive polarizers or anti-reflective coatings to reduce stray light.
  44. Thario, James E., Software vulnerability notification via icon decorations.
  45. Thario, James E., Software vulnerability notification via icon decorations.
  46. Martinez, Frank R.; Pulier, Eric, System and method for a cloud computing abstraction layer with security zone facilities.
  47. Martinez, Frank; Pulier, Eric, System and method for a cloud computing abstraction with self-service portal for publishing resources.
  48. Haddick, John D.; Osterhout, Ralph F., System and method for delivering content to a group of see-through near eye display eyepieces.
  49. Jackson, Eric S.; Song, Douglas J.; Fleis, Lawrence Benjamin; Dysart, Aidan Christopher; Malan, Gerald R., System and method for managing computer networks.
  50. Haddick, John D.; Osterhout, Ralph F.; Lohse, Robert Michael, System and method for social networking gaming with an augmented reality.
  51. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for a protocol gateway.
  52. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for authentication of target protocol screen names.
  53. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for implementing protocol enforcement rules.
  54. Poling, Robert; Nielsen, Mary; Scott, Robert, Systems and methods for implementing protocol enforcement rules.
  55. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for managing messages in an enterprise network.
  56. Miller, Randy; Poling, Robert; Pugh, Richard S.; Shapiro, Dmitry, Systems and methods for managing messages in an enterprise network.
  57. Miller,Randy; Poling,Robert; Pugh,Richard S.; Shapiro,Dmitry, Systems and methods for reflecting messages associated with a target protocol within a network.
  58. Shastri, Vijnan; Lee, Lisa; Tran, Trung, Systems and methods for remote rogue protocol enforcement.
  59. Eckert, Toerless; Wei, Liming; Farinacci, Dino, URL based communication protocol from a client computer to a network device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로