WO1999029082A1 - Method and system for enforcing a communication security policy - Google Patents
Method and system for enforcing a communication security policy Download PDFInfo
- Publication number
- WO1999029082A1 WO1999029082A1 PCT/IL1998/000084 IL9800084W WO9929082A1 WO 1999029082 A1 WO1999029082 A1 WO 1999029082A1 IL 9800084 W IL9800084 W IL 9800084W WO 9929082 A1 WO9929082 A1 WO 9929082A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- workstation
- security agent
- data packet
- gateway
- security
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Communication Control (AREA)
- Small-Scale Networks (AREA)
- Storage Device Security (AREA)
- Multi Processors (AREA)
Abstract
Description
Claims
Priority Applications (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU62277/98A AU757668B2 (en) | 1997-11-27 | 1998-02-23 | Method and system for enforcing a communication security policy |
KR1020007005470A KR20010024658A (en) | 1997-11-27 | 1998-02-23 | Method and system for enforcing a communication security policy |
AT98904352T ATE268967T1 (en) | 1997-11-27 | 1998-02-23 | METHOD AND SYSTEM FOR ENFORCEMENT OF A COMMUNICATIONS SECURITY PROCEDURES |
DE69824444T DE69824444T2 (en) | 1997-11-27 | 1998-02-23 | METHOD AND SYSTEM FOR IMPLEMENTING A COMMUNICATION SECURITY PROCESS |
BR9815066-9A BR9815066A (en) | 1997-11-27 | 1998-02-23 | Process and system for applying a communication security policy |
JP2000523788A JP2001525585A (en) | 1997-11-27 | 1998-02-23 | Method and system for complying with communication security policies |
CA002312061A CA2312061A1 (en) | 1997-11-27 | 1998-02-23 | Method and system for enforcing a communication security policy |
EP98904352A EP1034646B1 (en) | 1997-11-27 | 1998-02-23 | Method and system for enforcing a communication security policy |
US09/184,871 US6098173A (en) | 1997-11-27 | 1998-11-03 | Method and system for enforcing a communication security policy |
HK01101488A HK1030702A1 (en) | 1997-11-27 | 2001-02-28 | Method and system for enforcing a communication security policy. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL12231497A IL122314A (en) | 1997-11-27 | 1997-11-27 | Method and system for enforcing a communication security policy |
IL122314 | 1997-11-27 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/184,871 Continuation US6098173A (en) | 1997-11-27 | 1998-11-03 | Method and system for enforcing a communication security policy |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999029082A1 true WO1999029082A1 (en) | 1999-06-10 |
Family
ID=11070898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL1998/000084 WO1999029082A1 (en) | 1997-11-27 | 1998-02-23 | Method and system for enforcing a communication security policy |
Country Status (13)
Country | Link |
---|---|
US (3) | US6098173A (en) |
EP (1) | EP1034646B1 (en) |
JP (1) | JP2001525585A (en) |
KR (1) | KR20010024658A (en) |
CN (1) | CN1119003C (en) |
AT (1) | ATE268967T1 (en) |
AU (1) | AU757668B2 (en) |
BR (1) | BR9815066A (en) |
CA (1) | CA2312061A1 (en) |
DE (1) | DE69824444T2 (en) |
ES (1) | ES2223121T3 (en) |
IL (2) | IL122314A (en) |
WO (1) | WO1999029082A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6449723B1 (en) * | 1997-03-10 | 2002-09-10 | Computer Associates Think, Inc. | Method and system for preventing the downloading and execution of executable objects |
JP2008512958A (en) * | 2004-09-13 | 2008-04-24 | ユーティースターコム,インコーポレイテッド | Dynamic firewall function for wireless access gateway |
JP2009009601A (en) * | 2001-01-17 | 2009-01-15 | Contentguard Holdings Inc | System and method for secure distribution of content |
Families Citing this family (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6317868B1 (en) * | 1997-10-24 | 2001-11-13 | University Of Washington | Process for transparently enforcing protection domains and access control as well as auditing operations in software components |
IL122314A (en) * | 1997-11-27 | 2001-03-19 | Security 7 Software Ltd | Method and system for enforcing a communication security policy |
US7673323B1 (en) * | 1998-10-28 | 2010-03-02 | Bea Systems, Inc. | System and method for maintaining security in a distributed computer network |
US6158010A (en) | 1998-10-28 | 2000-12-05 | Crosslogix, Inc. | System and method for maintaining security in a distributed computer network |
IL143592A0 (en) | 1998-12-07 | 2002-04-21 | Network Ice Corp | A method and apparatus for remote installation of network drivers and software |
IL143573A0 (en) | 1998-12-09 | 2002-04-21 | Network Ice Corp | A method and apparatus for providing network and computer system security |
JP2000347866A (en) * | 1999-06-04 | 2000-12-15 | Nec Corp | Decentralized system and unit and method for access control, and recording medium where program for access control is recorded |
US7346929B1 (en) | 1999-07-29 | 2008-03-18 | International Business Machines Corporation | Method and apparatus for auditing network security |
US8006243B2 (en) | 1999-12-07 | 2011-08-23 | International Business Machines Corporation | Method and apparatus for remote installation of network drivers and software |
US6405319B1 (en) * | 2000-01-27 | 2002-06-11 | Buildpoint Corporation | Verification system for information transfers over a computer network |
US7921459B2 (en) | 2000-04-28 | 2011-04-05 | International Business Machines Corporation | System and method for managing security events on a network |
JP4700884B2 (en) | 2000-04-28 | 2011-06-15 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Method and system for managing computer security information |
US6907531B1 (en) | 2000-06-30 | 2005-06-14 | Internet Security Systems, Inc. | Method and system for identifying, fixing, and updating security vulnerabilities |
US7093239B1 (en) * | 2000-07-14 | 2006-08-15 | Internet Security Systems, Inc. | Computer immune system and method for detecting unwanted code in a computer system |
US7051069B2 (en) * | 2000-09-28 | 2006-05-23 | Bea Systems, Inc. | System for managing logical process flow in an online environment |
US9027121B2 (en) | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
US20020147803A1 (en) | 2001-01-31 | 2002-10-10 | Dodd Timothy David | Method and system for calculating risk in association with a security audit of a computer network |
EP1233333A1 (en) * | 2001-02-19 | 2002-08-21 | Hewlett-Packard Company | Process for executing a downloadable service receiving restrictive access rights to al least one profile file |
US7499948B2 (en) | 2001-04-16 | 2009-03-03 | Bea Systems, Inc. | System and method for web-based personalization and ecommerce management |
US20030041050A1 (en) * | 2001-04-16 | 2003-02-27 | Greg Smith | System and method for web-based marketing and campaign management |
WO2002097587A2 (en) * | 2001-05-31 | 2002-12-05 | Internet Security Systems, Inc. | Method and system for implementing security devices in a network |
US7392546B2 (en) | 2001-06-11 | 2008-06-24 | Bea Systems, Inc. | System and method for server security and entitlement processing |
US7657419B2 (en) | 2001-06-19 | 2010-02-02 | International Business Machines Corporation | Analytical virtual machine |
US7590684B2 (en) * | 2001-07-06 | 2009-09-15 | Check Point Software Technologies, Inc. | System providing methodology for access control with cooperative enforcement |
US7546629B2 (en) * | 2002-03-06 | 2009-06-09 | Check Point Software Technologies, Inc. | System and methodology for security policy arbitration |
US20040107360A1 (en) * | 2002-12-02 | 2004-06-03 | Zone Labs, Inc. | System and Methodology for Policy Enforcement |
KR100430611B1 (en) * | 2001-08-21 | 2004-05-10 | 와이더덴닷컴 주식회사 | A securing method for communication protocol |
KR20030016733A (en) * | 2001-08-21 | 2003-03-03 | 아르파(주) | Method of protecting dynamic service in the telecommunication system |
US7472342B2 (en) * | 2001-10-24 | 2008-12-30 | Bea Systems, Inc. | System and method for portal page layout |
US20030126464A1 (en) * | 2001-12-04 | 2003-07-03 | Mcdaniel Patrick D. | Method and system for determining and enforcing security policy in a communication session |
US7350226B2 (en) * | 2001-12-13 | 2008-03-25 | Bea Systems, Inc. | System and method for analyzing security policies in a distributed computer network |
AU2003202876A1 (en) | 2002-01-04 | 2003-07-24 | Internet Security Systems, Inc. | System and method for the managed security control of processes on a computer system |
KR100432236B1 (en) * | 2002-01-28 | 2004-05-22 | 김미희주 | Objected oriented information security system providing integrated control and management functions |
US20040010598A1 (en) * | 2002-05-01 | 2004-01-15 | Bea Systems, Inc. | Portal setup wizard |
WO2003093964A1 (en) | 2002-05-01 | 2003-11-13 | Bea Systems, Inc. | Enterprise application platform |
US7725560B2 (en) | 2002-05-01 | 2010-05-25 | Bea Systems Inc. | Web service-enabled portlet wizard |
JP4786116B2 (en) | 2002-09-06 | 2011-10-05 | ソニー株式会社 | Information processing apparatus and method, and program |
US6850943B2 (en) * | 2002-10-18 | 2005-02-01 | Check Point Software Technologies, Inc. | Security system and methodology for providing indirect access control |
KR20040038168A (en) * | 2002-10-31 | 2004-05-08 | 한국전자통신연구원 | The method and system of internet security service by using packet marking |
KR100484488B1 (en) * | 2002-10-31 | 2005-04-20 | 한국전자통신연구원 | A method and system for the security service in the internet service provider network including distributed network resources |
US7913303B1 (en) | 2003-01-21 | 2011-03-22 | International Business Machines Corporation | Method and system for dynamically protecting a computer system from attack |
US6917975B2 (en) * | 2003-02-14 | 2005-07-12 | Bea Systems, Inc. | Method for role and resource policy management |
US7591000B2 (en) | 2003-02-14 | 2009-09-15 | Oracle International Corporation | System and method for hierarchical role-based entitlements |
US7653930B2 (en) | 2003-02-14 | 2010-01-26 | Bea Systems, Inc. | Method for role and resource policy management optimization |
US7483904B2 (en) * | 2003-02-20 | 2009-01-27 | Bea Systems, Inc. | Virtual repository content model |
US7840614B2 (en) | 2003-02-20 | 2010-11-23 | Bea Systems, Inc. | Virtual content repository application program interface |
US20040167880A1 (en) * | 2003-02-20 | 2004-08-26 | Bea Systems, Inc. | System and method for searching a virtual repository content |
US7293286B2 (en) | 2003-02-20 | 2007-11-06 | Bea Systems, Inc. | Federated management of content repositories |
US20040167871A1 (en) * | 2003-02-20 | 2004-08-26 | Bea Systems, Inc. | Content mining for virtual content repositories |
US7415478B2 (en) | 2003-02-20 | 2008-08-19 | Bea Systems, Inc. | Virtual repository complex content model |
US7562298B2 (en) | 2003-02-20 | 2009-07-14 | Bea Systems, Inc. | Virtual content repository browser |
US20040230917A1 (en) * | 2003-02-28 | 2004-11-18 | Bales Christopher E. | Systems and methods for navigating a graphical hierarchy |
US7810036B2 (en) | 2003-02-28 | 2010-10-05 | Bea Systems, Inc. | Systems and methods for personalizing a portal |
US20040230557A1 (en) * | 2003-02-28 | 2004-11-18 | Bales Christopher E. | Systems and methods for context-sensitive editing |
US8136155B2 (en) * | 2003-04-01 | 2012-03-13 | Check Point Software Technologies, Inc. | Security system with methodology for interprocess communication control |
KR100479345B1 (en) * | 2003-05-06 | 2005-03-31 | 한국전자통신연구원 | Method and apparatus for network security and management |
US7788726B2 (en) * | 2003-07-02 | 2010-08-31 | Check Point Software Technologies, Inc. | System and methodology providing information lockbox |
US7603547B2 (en) * | 2003-10-10 | 2009-10-13 | Bea Systems, Inc. | Security control module |
US7644432B2 (en) | 2003-10-10 | 2010-01-05 | Bea Systems, Inc. | Policy inheritance through nested groups |
US20050097352A1 (en) * | 2003-10-10 | 2005-05-05 | Bea Systems, Inc. | Embeddable security service module |
US20050097353A1 (en) * | 2003-10-10 | 2005-05-05 | Bea Systems, Inc. | Policy analysis tool |
US20050262362A1 (en) * | 2003-10-10 | 2005-11-24 | Bea Systems, Inc. | Distributed security system policies |
US7657938B2 (en) | 2003-10-28 | 2010-02-02 | International Business Machines Corporation | Method and system for protecting computer networks by altering unwanted network data traffic |
US20050188295A1 (en) * | 2004-02-25 | 2005-08-25 | Loren Konkus | Systems and methods for an extensible administration tool |
US7774601B2 (en) | 2004-04-06 | 2010-08-10 | Bea Systems, Inc. | Method for delegated administration |
US7236990B2 (en) * | 2004-04-13 | 2007-06-26 | Bea Systems, Inc. | System and method for information lifecycle workflow integration |
US20050240714A1 (en) * | 2004-04-13 | 2005-10-27 | Bea Systems, Inc. | System and method for virtual content repository deployment |
US20050228816A1 (en) * | 2004-04-13 | 2005-10-13 | Bea Systems, Inc. | System and method for content type versions |
US7580953B2 (en) * | 2004-04-13 | 2009-08-25 | Bea Systems, Inc. | System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories |
US20050228784A1 (en) * | 2004-04-13 | 2005-10-13 | Bea Systems, Inc. | System and method for batch operations in a virtual content repository |
US7236989B2 (en) | 2004-04-13 | 2007-06-26 | Bea Systems, Inc. | System and method for providing lifecycles for custom content in a virtual content repository |
US7246138B2 (en) * | 2004-04-13 | 2007-07-17 | Bea Systems, Inc. | System and method for content lifecycles in a virtual content repository that integrates a plurality of content repositories |
US7240076B2 (en) * | 2004-04-13 | 2007-07-03 | Bea Systems, Inc. | System and method for providing a lifecycle for information in a virtual content repository |
US7236975B2 (en) * | 2004-04-13 | 2007-06-26 | Bea Systems, Inc. | System and method for controlling access to anode in a virtual content repository that integrates a plurality of content repositories |
US7475091B2 (en) * | 2004-04-13 | 2009-01-06 | Bea Systems, Inc. | System and method for viewing a virtual content repository |
US7540013B2 (en) * | 2004-06-07 | 2009-05-26 | Check Point Software Technologies, Inc. | System and methodology for protecting new computers by applying a preconfigured security update policy |
FR2872983A1 (en) * | 2004-07-09 | 2006-01-13 | Thomson Licensing Sa | FIREWALL PROTECTION SYSTEM FOR A COMMUNITY OF APPLIANCES, APPARATUS PARTICIPATING IN THE SYSTEM AND METHOD FOR UPDATING FIREWALL RULES WITHIN THE SYSTEM |
US20060203815A1 (en) * | 2005-03-10 | 2006-09-14 | Alain Couillard | Compliance verification and OSI layer 2 connection of device using said compliance verification |
US7818344B2 (en) | 2005-09-26 | 2010-10-19 | Bea Systems, Inc. | System and method for providing nested types for content management |
US7953734B2 (en) | 2005-09-26 | 2011-05-31 | Oracle International Corporation | System and method for providing SPI extensions for content management system |
US7917537B2 (en) | 2005-09-26 | 2011-03-29 | Oracle International Corporation | System and method for providing link property types for content management |
US7752205B2 (en) * | 2005-09-26 | 2010-07-06 | Bea Systems, Inc. | Method and system for interacting with a virtual content repository |
US7483893B2 (en) | 2005-09-26 | 2009-01-27 | Bae Systems, Inc. | System and method for lightweight loading for managing content |
US7581004B2 (en) * | 2006-02-15 | 2009-08-25 | Gabriel Jakobson | System and method for alerting on open file-share sessions on a user's electronic device |
US7725922B2 (en) * | 2006-03-21 | 2010-05-25 | Novell, Inc. | System and method for using sandboxes in a managed shell |
US7743414B2 (en) * | 2006-05-26 | 2010-06-22 | Novell, Inc. | System and method for executing a permissions recorder analyzer |
US7805707B2 (en) * | 2006-07-21 | 2010-09-28 | Novell, Inc. | System and method for preparing runtime checks |
US7739735B2 (en) * | 2006-07-26 | 2010-06-15 | Novell, Inc. | System and method for dynamic optimizations using security assertions |
US7856654B2 (en) * | 2006-08-11 | 2010-12-21 | Novell, Inc. | System and method for network permissions evaluation |
US7823186B2 (en) * | 2006-08-24 | 2010-10-26 | Novell, Inc. | System and method for applying security policies on multiple assembly caches |
US8607336B2 (en) * | 2006-09-19 | 2013-12-10 | The Invention Science Fund I, Llc | Evaluation systems and methods for coordinating software agents |
US8984579B2 (en) * | 2006-09-19 | 2015-03-17 | The Innovation Science Fund I, LLC | Evaluation systems and methods for coordinating software agents |
US8627402B2 (en) | 2006-09-19 | 2014-01-07 | The Invention Science Fund I, Llc | Evaluation systems and methods for coordinating software agents |
US8601530B2 (en) * | 2006-09-19 | 2013-12-03 | The Invention Science Fund I, Llc | Evaluation systems and methods for coordinating software agents |
US7730478B2 (en) * | 2006-10-04 | 2010-06-01 | Salesforce.Com, Inc. | Method and system for allowing access to developed applications via a multi-tenant on-demand database service |
US8463852B2 (en) | 2006-10-06 | 2013-06-11 | Oracle International Corporation | Groupware portlets for integrating a portal with groupware systems |
US8195939B2 (en) | 2007-01-12 | 2012-06-05 | Sap Ag | Systems and methods for protecting sensitive data |
US8887249B1 (en) * | 2008-05-28 | 2014-11-11 | Zscaler, Inc. | Protecting against denial of service attacks using guard tables |
US8302189B2 (en) * | 2009-11-30 | 2012-10-30 | At&T Intellectual Property I, L.P. | Methods, devices, systems, and computer program products for edge driven communications network security monitoring |
WO2012085232A1 (en) * | 2010-12-23 | 2012-06-28 | Koninklijke Kpn N.V. | Method, gateway device and network system for configuring a device in a local area network |
US9560078B2 (en) * | 2015-02-04 | 2017-01-31 | Intel Corporation | Technologies for scalable security architecture of virtualized networks |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0776112A2 (en) * | 1995-10-26 | 1997-05-28 | Sun Microsystems, Inc. | Secure network protocol system and method |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5699513A (en) * | 1995-03-31 | 1997-12-16 | Motorola, Inc. | Method for secure network access via message intercept |
US5757914A (en) * | 1995-10-26 | 1998-05-26 | Sun Microsystems, Inc. | System and method for protecting use of dynamically linked executable modules |
US5692047A (en) * | 1995-12-08 | 1997-11-25 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
US5928323A (en) * | 1996-05-30 | 1999-07-27 | Sun Microsystems, Inc. | Apparatus and method for dynamically generating information with server-side software objects |
US5903732A (en) * | 1996-07-03 | 1999-05-11 | Hewlett-Packard Company | Trusted gateway agent for web server programs |
IL120420A (en) * | 1997-03-10 | 1999-12-31 | Security 7 Software Ltd | Method and system for preventing the downloading and execution of executable objects |
US6282581B1 (en) * | 1997-03-27 | 2001-08-28 | Hewlett-Packard Company | Mechanism for resource allocation and for dispatching incoming calls in a distributed object environment |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US5940590A (en) * | 1997-05-31 | 1999-08-17 | International Business Machines Corporation | System and method for securing computer-executable program code using task gates |
US5983348A (en) * | 1997-09-10 | 1999-11-09 | Trend Micro Incorporated | Computer network malicious code scanner |
US6317868B1 (en) * | 1997-10-24 | 2001-11-13 | University Of Washington | Process for transparently enforcing protection domains and access control as well as auditing operations in software components |
IL122314A (en) * | 1997-11-27 | 2001-03-19 | Security 7 Software Ltd | Method and system for enforcing a communication security policy |
WO2000019324A1 (en) * | 1998-09-28 | 2000-04-06 | Argus Systems Group, Inc. | Trusted compartmentalized computer operating system |
US6219706B1 (en) * | 1998-10-16 | 2001-04-17 | Cisco Technology, Inc. | Access control for networks |
US6405319B1 (en) * | 2000-01-27 | 2002-06-11 | Buildpoint Corporation | Verification system for information transfers over a computer network |
US20030126464A1 (en) * | 2001-12-04 | 2003-07-03 | Mcdaniel Patrick D. | Method and system for determining and enforcing security policy in a communication session |
-
1997
- 1997-11-27 IL IL12231497A patent/IL122314A/en not_active IP Right Cessation
-
1998
- 1998-02-23 JP JP2000523788A patent/JP2001525585A/en active Pending
- 1998-02-23 AU AU62277/98A patent/AU757668B2/en not_active Ceased
- 1998-02-23 CN CN98811601A patent/CN1119003C/en not_active Expired - Fee Related
- 1998-02-23 EP EP98904352A patent/EP1034646B1/en not_active Expired - Lifetime
- 1998-02-23 WO PCT/IL1998/000084 patent/WO1999029082A1/en active IP Right Grant
- 1998-02-23 DE DE69824444T patent/DE69824444T2/en not_active Expired - Lifetime
- 1998-02-23 AT AT98904352T patent/ATE268967T1/en not_active IP Right Cessation
- 1998-02-23 ES ES98904352T patent/ES2223121T3/en not_active Expired - Lifetime
- 1998-02-23 CA CA002312061A patent/CA2312061A1/en not_active Abandoned
- 1998-02-23 BR BR9815066-9A patent/BR9815066A/en not_active IP Right Cessation
- 1998-02-23 KR KR1020007005470A patent/KR20010024658A/en active IP Right Grant
- 1998-11-03 US US09/184,871 patent/US6098173A/en not_active Expired - Lifetime
-
2000
- 2000-07-26 US US09/625,927 patent/US6553498B1/en not_active Expired - Lifetime
- 2000-12-07 IL IL14016100A patent/IL140161A0/en unknown
-
2003
- 2003-03-14 US US10/388,727 patent/US7305703B2/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0776112A2 (en) * | 1995-10-26 | 1997-05-28 | Sun Microsystems, Inc. | Secure network protocol system and method |
Non-Patent Citations (1)
Title |
---|
SHARON MACHLIS: "Screening for applets", COMPUTERWORLD, vol. 31, no. 6, 10 February 1997 (1997-02-10), USA, pages 51 - 52, XP002069848 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6449723B1 (en) * | 1997-03-10 | 2002-09-10 | Computer Associates Think, Inc. | Method and system for preventing the downloading and execution of executable objects |
US6918043B2 (en) | 1997-03-10 | 2005-07-12 | Computer Associates Think, Inc. | Method and system for preventing the downloading and execution of executable objects |
JP2009009601A (en) * | 2001-01-17 | 2009-01-15 | Contentguard Holdings Inc | System and method for secure distribution of content |
JP4512153B2 (en) * | 2001-01-17 | 2010-07-28 | コンテントガード ホールディングズ インコーポレイテッド | System for distributing content securely |
JP2008512958A (en) * | 2004-09-13 | 2008-04-24 | ユーティースターコム,インコーポレイテッド | Dynamic firewall function for wireless access gateway |
Also Published As
Publication number | Publication date |
---|---|
DE69824444D1 (en) | 2004-07-15 |
ES2223121T3 (en) | 2005-02-16 |
JP2001525585A (en) | 2001-12-11 |
BR9815066A (en) | 2000-10-03 |
US6553498B1 (en) | 2003-04-22 |
CN1119003C (en) | 2003-08-20 |
DE69824444T2 (en) | 2005-06-23 |
CN1280733A (en) | 2001-01-17 |
EP1034646B1 (en) | 2004-06-09 |
US6098173A (en) | 2000-08-01 |
EP1034646A1 (en) | 2000-09-13 |
US20030177355A1 (en) | 2003-09-18 |
AU757668B2 (en) | 2003-02-27 |
US7305703B2 (en) | 2007-12-04 |
IL140161A0 (en) | 2002-02-10 |
AU6227798A (en) | 1999-06-16 |
IL122314A (en) | 2001-03-19 |
KR20010024658A (en) | 2001-03-26 |
ATE268967T1 (en) | 2004-06-15 |
CA2312061A1 (en) | 1999-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6098173A (en) | Method and system for enforcing a communication security policy | |
US6918043B2 (en) | Method and system for preventing the downloading and execution of executable objects | |
CA2138058C (en) | Method for controlling computer network security | |
US7882229B2 (en) | Security checking program for communication between networks | |
EP1018254B1 (en) | Method and system for the identification and the suppression of executable objects | |
US8011000B2 (en) | Public network access server having a user-configurable firewall | |
EP0986229A2 (en) | Method and system for monitoring and controlling network access | |
JP2003173301A (en) | Network, server and policy server of storage | |
KR100439177B1 (en) | Method for representing, storing and editing network security policy | |
EP1121792B1 (en) | Method and system for the prevention of undesirable activities of executable objects | |
IL140161A (en) | Method and system for enforcing a communication security policy | |
US20090158386A1 (en) | Method and apparatus for checking firewall policy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 98811601.4 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09184871 Country of ref document: US |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1020007005470 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 62277/98 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 2312061 Country of ref document: CA Ref document number: 2312061 Country of ref document: CA Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998904352 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1998904352 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007005470 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 62277/98 Country of ref document: AU |
|
WWG | Wipo information: grant in national office |
Ref document number: 1998904352 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020007005470 Country of ref document: KR |