$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Application layer security method and system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0446054 (2003-05-28)
등록번호 US7882555 (2011-01-18)
발명자 / 주소
  • Ben-Itzhak, Yuval
출원인 / 주소
  • Kavado, Inc.
대리인 / 주소
    Paul, Hastings, Janofsky & Walker LLP
인용정보 피인용 횟수 : 20  인용 특허 : 70

초록

The invention provides an application layer security method and system to secure trusted computer applications from executing out of their intended and authorized scope caused by illegal or harmful operation requests received from a distrusted environment. In an embodiment of the invention, a protec

대표청구항

I claim: 1. An application layer security method comprising the steps of:receiving, at an application-level switch at least partially implemented in hardware, an operation request to be executed by an application,identifying an application attribute of said operation request,identifying an applicati

이 특허에 인용된 특허 (70)

  1. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  2. Banzhof,Carl E., Automated computer vulnerability resolution system.
  3. Royce Kevin M. ; Berry Stanley D. ; Erdmann Brian W. ; Scheetz Jeffrey P. ; Cole John D. ; Landry ; Jr. Hayes J., Autonotification system for notifying recipients of detected events in a network environment.
  4. Abadi Martin (Palo Alto CA) Goldstein Andrew C. (Hudson MA) Lampson Butler W. (Cambridge MA), Compound principals in access control lists.
  5. Shostack Adam ; Allouch David,ILX, Computer security.
  6. Duxbury Paul (Sandbach GB2), Computer system security.
  7. Lu, Leonard L.; Hsing, Deh-phone K.; Cheng, Bo-Chao; Wu, Tsong-Ho, Content-aware application switch and methods thereof.
  8. Hirsch Thomas S. (Bedford MA) Bianchi Richard S. (Billerica MA) Perry Ron B. (Wilton NH) Buck Kenneth J. (Tyngsboro MA), Copy file mechanism for transferring files between a host system and an emulated file system.
  9. Bapat Subodh (Fort Lauderdale FL), Dynamic translation of network management primitives to queries to a database.
  10. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  11. Botz Patrick Samuel ; Moskalik Thomas Michael ; Snyder Devon Daniel ; Woodbury Carol Jean, Generic user authentication for network computers.
  12. Nerlikar Virupax M. (Plano TX), Information management and security system.
  13. Hurst,Dennis Wayne; Barrall,Darrin Ray; Sima,Caleb Ikaki, Internet security analysis system and process.
  14. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  15. Daniel M. Teal, Intrusion detection system and method having dynamically loaded signatures.
  16. Teal, Daniel M., Intrusion detection system and method having dynamically loaded signatures.
  17. Curtis Bryce Allen, Method and apparatus for creating a secure connection between a java applet and a web server.
  18. Abraham Dalen M. ; Barnes Todd A. ; Bouche Paul F. ; Bougetz Thomas P. ; Gosselin Tracy A. ; Grieve Mark G. ; Langdon Brent A. ; Allison Robert C. ; Nikkel Michael S., Method and apparatus for managing internetwork and intranetwork activity.
  19. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  20. Cerrone, David Francis; Czarnecki, David Anthony; Vivier, Barbara Jean, Method and apparatus for secure data file uploading.
  21. Raanan Gil,ILX ; Moran Tal,ILX ; Galant Yoron ; El-Hanani Yuval,ILX ; Reshef Eran, Method and system for extracting application protocol characteristics.
  22. Rechef Eran,ILX ; Raanan Gil,ILX ; Solan Eilon,ILX, Method and system for maintaining restricted operating environments for application programs or operating systems.
  23. Reshef Eran,ILX ; Raanan Gil,ILX ; Solan Eilon,ILX, Method and system for protecting operations of trusted internal networks.
  24. Hodges Vernon ; O'Donnell Shawn, Method and system for providing automated updating and upgrading of antivirus applications using a computer network.
  25. Green,Stuart D.; Brown,Scott G.; Crain,Jonathan M.; Van Myers,Jeffrey; Perry,Carl A.; Yax,Marcus L., Method for communication security and apparatus therefor.
  26. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  27. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA), Method for performing group exclusion in hierarchical group structures.
  28. Bogrett, Steven W., Modular method and system for performing database queries.
  29. Nessett Danny M. ; Sherer William Paul, Multilayer firewall system.
  30. Bruno Richard Frank ; Katseff Howard Paul ; Markowitz Robert Edward ; Perea Carlos Alberto ; Robinson Bethany Scott ; Suresh Sethuraman ; Williams Hugh L., Network access to internet and stored multimedia services from a terminal supporting the H.320 protocol.
  31. Heinrich, Nicolas, Overall risk in a system.
  32. Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan ; Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Dev Roger ; Ibe Oliver ; Aggarwal Ajay ; Wohlers Todd, Policy management and conflict resolution in computer networks.
  33. Grimm Robert ; Bershad Brian N., Process for transparently enforcing protection domains and access control as well as auditing operations in software components.
  34. Ross Jay B. (Pennington NJ), Protocol converter for a secure FAX transmission system.
  35. Autrey Kevin ; Gessel Robert J., Protocol interface gateway and method of connecting an emulator to a network.
  36. Mousseau Gary P. (Waterloo CAX) Lazaridis Mihal (Waterloo CAX) Little Herb A. (Waterloo CAX) Barnstijn Michael A. (Waterloo CAX), Remote control of gateway functions in a wireless data communication network.
  37. Jacobs Dwayne C. (Austin TX) Wangler James A. (Cedar Park TX), Remote password administration for a computer network among a plurality of nodes sending a password update message to al.
  38. Subramanian, Siva; Lavian, Tal I., Routing architecture including a compute plane configured for high-speed processing of packets to provide application layer support.
  39. Bush, Eric N., Schema-based computer system health monitoring.
  40. Grantges, Jr., David R.; McGrath, Lawrence R., Secure gateway having routing feature.
  41. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  42. Golan Gilad,ILX, Security monitor.
  43. Lisa M. Lippert ; Joel M. Soderberg ; Saveen V. Reddy, Standard database queries within standard request-response protocols.
  44. Moran, Douglas B., System and method for analyzing filesystems to detect intrusions.
  45. Touboul Shlomo,ILX ; Gal Nachshon,ILX, System and method for attaching a downloadable security profile to a downloadable.
  46. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  47. Kimura Nobuko,JPX ; Onodera Takashi,JPX ; Yokoshi Noriyuki,JPX, System and method for converting communication protocols.
  48. Epstein, Jeremy; Thomas, Linda, System and method for increasing the resiliency of firewall systems.
  49. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  50. Nixon, Miles J.; Moyer, Alan R.; Moyer, Christopher A., System and method for monitoring informational resources.
  51. Touboul Shlomo,ILX, System and method for protecting a computer and a network from hostile downloadables.
  52. Deo Vinay (Redmond WA), System and method for protecting unauthorized access to data contents.
  53. Jakobson, Gabriel; Pathak, Girish, System and method for providing an internet-based correlation service.
  54. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  55. Hericourt, Olivier, System and method to manage data to a plurality of proxy servers through a router by application level protocol and an authorized list.
  56. Booth, III, Earl Hardin; Lingafelt, Charles Steven; Nguyen, Phuong Thanh; Temoshenko, Leo; Wang, Xiaogang, System and method to monitor and determine if an active IPSec tunnel has become disabled.
  57. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  58. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  59. Reshef, Eran; El-Hanany, Yuval; Raanan, Gil; Tsarfati, Tom, System for determining web application vulnerabilities.
  60. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  61. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  62. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  63. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  64. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Techniques for eliminating redundant access checking by access filters.
  65. Nakano Kazuo (Aichi JPX), Terminal control system.
  66. Beebe Todd ; Collier Mark D. ; Conyers Doug ; Hamlett Chris ; Faustino Stephen, Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities.
  67. Balasubramaniam,Chandrasekar; Kannan,Ravi; Revashetti,Siddaraya Basappa; Sampath,Srivats; Katchapalayam,Babu, Uniform resource locator (URL)-based secure download system and method.
  68. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  69. Ji Shuang (Foster City CA) Chen Eva (Cupertino CA), Virus detection and removal apparatus for computer networks.
  70. Rosenthal David S. H. (Palo Alto CA), X window security system.

이 특허를 인용한 특허 (20)

  1. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  2. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  3. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  4. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  5. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  6. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  7. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  8. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  9. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  10. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  11. Oliphant, Brett M., Multiple-path remediation.
  12. Lukas, Joshua; Ricard, Gary R.; Thompson, Timothy L., Network intrusion detection in a network that includes a distributed virtual switch fabric.
  13. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  14. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  15. Pacella, Dante J; Schiller, Harold J; Solis, Norman R, Security overlay network.
  16. Beachem, Brent; Boucher, Peter; Nault, Gabe; Rollins, Richard; Wood, Jonathan Brett; Wright, Michael, System and method for filtering access points presented to a user and locking onto an access point.
  17. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  18. Vedula, Srinivas; Morris, Cameron Craig, Techniques for credential strength analysis via failed intruder access attempts.
  19. Vedula, Srinivas; Morris, Cameron Craig, Techniques for dynamic generation and management of password dictionaries.
  20. Vedula, Srinivas; Morris, Cameron Craig, Techniques for dynamic generation and management of password dictionaries.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로