WO2000072171A1 - Method and apparatus for remotely managed local network interface security - Google Patents
Method and apparatus for remotely managed local network interface security Download PDFInfo
- Publication number
- WO2000072171A1 WO2000072171A1 PCT/US2000/014279 US0014279W WO0072171A1 WO 2000072171 A1 WO2000072171 A1 WO 2000072171A1 US 0014279 W US0014279 W US 0014279W WO 0072171 A1 WO0072171 A1 WO 0072171A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- unit
- encryption
- security
- internet
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/24—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using dedicated network management hardware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
Definitions
- This invention relates generally to the field of network security and, more particularly, to remote configuration, management and monitoring of message traffic between local area networks and wide-area non-secure networks such as the Internet .
- the number of consumers and businesses using telecommunication for exchanging information and conducting business continues to increase.
- One technological field showing a particularly large increase in use is the Internet, both by consumers and by business of all sizes, from one- person operations without "brick and mortar" establishments, to large companies such as IBM, General Motors, and Microsoft.
- the Internet is used for exchange of data representing almost every level of conducting business, from interaction between consumers, business-to-business interaction, and interaction between businesses and consumers.
- the Internet is also used for inter-office exchanges within geographically distributed companies, and by companies utilizing off-site and out-sourced accounting and other data management services.
- the Internet continues to evolve into a vast, highly connected, very high capacity network connecting virtually any computer, anywhere in the world, having the required interface capacity with any other computer, network of computers, database servers, and other sources of digital or digitized information.
- the Internet is not a secure transmission media. Indeed, as is well known to one of ordinary skill in the art, the very complexity of the Internet has and continues to create ever- increasing opportunities for unauthorized access to, or interruption of, computer resources and data transmissions. These range from amateur acts to well-directed expert attacks from the outside into a company's internal network, exploiting the network's portal to the Internet and utilizing the newest "hacking" methods. These acts are disruptive, intrusive and costly.
- Firewall Between the company's internal or local area network (LAN) and the Internet.
- Packet filtering Based on what the packet filtering detects the packet is blocked, blocked and stored for manual inspection, passed through with a notice sent to the system administrator, or passed through without further action. Packet filtering can be simple, such as inspecting certain header fields of, for example, TCP/IP formatted packets, or can be more sophisticated, detecting specific source address features or instruction sequences within executable code.
- a difficulty with packet filters arises in selecting and updating the filter rules or criteria.
- the rule selection is done by the network administrator.
- this can be an ongoing and time consuming task, as it requires the network administrator to keep abreast of the latest security threats and risks, as well as the latest offerings from the network security vendors, in addition to updating the packet filter rules to accommodate the same.
- the network administrator must take the time to test and troubleshoot the updates.
- the testing introduces another uncertainty, as the set of test vectors selected by the network administrator may not duplicate the real word security threat adequately to locate some faults with the packet filtering program.
- firewalls In addition to the security issues arising from data packets received from the Internet, many business use firewalls to filter packets exiting their LAN onto the Internet.
- the filtering is employed to detect and block employees from inadvertently or intentionally transmitting sensitive data, without the necessary approval or without proper encryption. Encryption is frequently necessary for geographically distributed companies that must communicate sensitive information from the LAN at one of its locations to the LAN at another of its locations.
- architectures for the existing methods are usually built upon existing workstations and servers.
- Companies such as UUNet ® , the Sun/Cisco/Pilot joint venture, and services such as those offered by Technologic/Avdata target corporate clients with very sophisticated services for security and VPN tunneling.
- integration into the end user site requires significant time, personnel and hardware, which is very cost prohibitive for smaller organizations or home users.
- remote appliances such solutions may be too costly to justify, using conventional cost/risk analysis.
- many remote sites still use dedicated networks for lack of an inexpensive, monitored, secure network appliance that could utilize unsecured public networks such at the Internet.
- the present inventor has identified, based on the information identified and studies above, that a method for delivering services for security and connectivity enhancement at the level of the regular home user and small business is bother widely desired and required.
- the present inventor has also identified, as been stated in numerous publications, that many people continue to feel intimidated with computer technology and, as such, are self -proclaimed “ technophobes . "
- the present inventor has found this to be apparent from various publications, including that of U.S. Patent No. 5,875,108, which states “Significant difficulties are experienced by users when complex programmable devices having multiple commands which are infrequently used or programmed by those users . "
- end users may not exhibit timeliness in maintaining the system software - even when notified that newer code is available.
- appliance-based equipment devices such as the SonicWall and other stand-alone
- user configured equipment can be difficult to install and maintain.
- An object of the present invention is to provide a system and apparatus for secure communication between a local area network (LAN) and a larger wide area network (WAN), such as the Internet, having connectivity enhancement, and having its configuration, programming, monitoring and control performed from a remote location, and being totally transparent to the end user and easily integrated into existing connectivity devices and telecommunication providers' services.
- LAN local area network
- WAN wide area network
- a still further object of the invention is to provide an apparatus and method for immediate updating of one or more LANs' or remote Internet-accessible sites' respective interfaces to the Internet from one or more central locations remote the LANs, thereby providing Internet-wide updating of security capability.
- the centrally managed updating operation could be in response to detection at any part of the Internet of a new security threat requiring updated filter and detection parameters at each local Internet interface.
- Yet another object of the invention is provide a system and apparatus for performing encryption locally at one or more LANs ' respective interface to the Internet, with configuration and updating of the encryption being managed from a central facility.
- One embodiment of the invention is a method for controlling traffic between a first network, such as a corporate LAN, and a second network, such as the Internet, comprising steps of : connecting an interface unit between the first and the second network, said interface unit having a processor and a data storage unit; providing a management unit remote from the first network, the management unit having means for receiving criteria selection commands and means for transmitting alarm criteria commands, based on the criteria selection commands, to the interface unit over a management communication network; providing the management communication network; transferring the alarm criteria from the management unit to the interface unit over the management communication network; storing the alarm criteria in the data storage unit; receiving, at the interface unit, a digital communication between the first network and the second network; comparing a content of the digital transmission to the alarm criteria, the comparing performed by the data processor; and generating an alarm from the interface unit based on the comparing.
- the interface unit of the invention that is local to the user and which performs the described monitoring, filtering and alarm functions will be referenced hereinafter as the "Secure Universal Network Appliance", or "SUNA”.
- a further embodiment of the invention is a method according to the first embodiment further comprising a step of blocking the digital transmission from being communicated between the first network and the second network based on the comparing .
- a still further embodiment is a method according to the first or second embodiment further comprising steps of: providing an encryption unit with the SUNA, loading an encryption algorithm into the encryption unit; and selectively encrypting a digital communication from the first network to the second network, according to the encryption algorithm, based on a result of the comparing step.
- a still further embodiment of the invention is a method according to any of the above embodiments which utilizes the second network as the management communication network.
- Yet another embodiment of the invention is a method according to any of the above embodiments, further comprising a step of providing an ancillary management communication between the management control unit and the SUNA.
- the method and apparatus of the present invention is not solely based on a single device or software. Instead the invention comprises a system having a central security management unit and the SUNA, the SUNA being inserted between a user's LAN or a user's remote site, and a WAN, such as the Internet, with which the LAN or remote site communicates.
- the central security unit can be maintained and operated by specially trained and experienced computer security professionals independent from, and not requiring management and training by the user. It is envisioned that professionals in the field of computer security, due to having specialized training access to information not widely disseminated, in addition to being not burdened with day-to-day system administration tasks, can be better informed as to up-to-the-minute security issues. This includes keeping up to date as to the identity or and methods employed by those that perpetrate telecommunication ( "phreaking” ) , computer/internet-based ("hacking”) intrusions and exploitations.
- the present invention by providing centralized configuration and management of the network interface security operations of businesses and individual users, and thus providing centralized, dedicated intelligence gathering and countermeasure development, allows the system described to stay abreast of the latest techniques and enact defenses at all locations.
- Fig. 1 is a block diagram of an example system according to the invention.
- Fig. 2 is a high level circuit diagram of a remotely configurable network security appliance within the example system of Fig. 1;
- Fig. 3 is a high level circuit diagram of an alternative configurable network security appliance within the example system of Fig. 1;
- Fig. 4 is a system diagram of an example embodiment of the invention, utilizing a remotely configurable network security appliance according to Fig. 3;
- Fig. 5 is a system diagram of an example embodiment of the invention, utilizing a remotely configurable network security appliance an appliance according to Fig. 2.
- Fig. 1 depicts a high level system diagram of an example embodiment of the invention.
- the system comprises a customer network or LAN 100 which may, for example, be an Ethernet bus connecting a plurality of workstations, or standalone user end point devices 102.
- the LAN 100 includes a server (not labeled) which may be one of the workstations 102.
- the system further comprises a telecommunication provider's network connection device, or TPIC, 104 which connects to the Internet or other wide area network (WAN) 106.
- WAN wide area network
- a Secure Universal Network Appliance or SUNA 108 Inserted between the customer network 100 and the TPIC 104 is a Secure Universal Network Appliance or SUNA 108 which, as will be described hereinbelow, performs packet filtering and encryption operations on telecommunication transfers between the in accordance with a remotely loaded configuration, as will also be described.
- the example system of Fig. 1 further includes a stand- alone workstation 102 connected directly to the SUNA 108, which is optional and shown for purposes of example only.
- the system further includes a Network Security Operation Center, or NSOC, 110 which, as will be described, transfers filtering and encryption commands to the SUNA 108.
- the NSOC 110 is connected to the wide area network 106, such as the Internet, by a primary network 112, and a back-up, or ancillary network 114.
- the primary network can, for example be commercial Internet Services Provider (ISP) , such as America On Line ® .
- ISP Internet Services Provider
- the ancillary network 114 which may be another ISP, is not required but is preferred, in view of the general fault tolerance requirements for security systems.
- Fig. 1 being a first level functional breakdown of an example SUNA 108
- Fig. 3 depicting an example lower level breakdown of the Fig. 2 embodiment .
- FIG. 2 depicts the major functional components of an example SUNA apparatus 108 according to this invention.
- a high speed central processing unit (CPU) 202A connects to an input/output (I/O) processor 207.
- CPU 202A and I/O processor 207 are shown as separate units for purposes of describing the operation of the SUNA unit.
- One contemplated hardware example implements the CPU 202 and I/O processor 207 on a monolithic central processing unit 202A, as shown in the detailed depiction of the SUNA 108 shown at Fig. 3.
- the combined implementation of these functions 202 and 207 on a single chip is well known in the art .
- a memory subsystem 209 which includes volatile, non-volatile and mass storage devices (not shown), is multiply ported to the CPU 202, and to the I/O processor 207, a crypto-engine 208 and a digital signal processing (DSP) cluster 203.
- the multiple port connection allows any of the sub-systems 202, 203 and 208 access to data files, and permits communication between the subsystems as well.
- the multiple port connection also reduces bottlenecking .
- Multiple media interfaces 206 provide connection to any of the commonly used network protocols and physical media by way of the I/O processor 207.
- the network protocols and include Asynchronous Transfer Mode (ATM) , Ethernet 100/lObt, and any other network interfacing found in the commercial and consumer environments.
- ATM Asynchronous Transfer Mode
- Ethernet 100/lObt Ethernet 100/lObt
- the only limitation as to network protocol and physical media is imposed by the system speed. Currently, speeds in excess of OC3 and approaching OC12 are possible .
- the example SUNA 108 of Fig. 2 includes a crypto-engine 208.
- the crypto-engine 208 performs on-demand enciphering and deciphering of communications passed between any of the desired media interfaces 206 via the I/O processor 207 into the crypto-engine 208.
- One alternative is to load the crypto-engine 208 such as, for example, by way of the CPU subsystem 202 during manufacture or during installation.
- Another alternative is to perform a remote transfer of the encryption software, or of control parameters (not shown) to set particular characteristics of the encryption, from the Network Security Operations Center (NSOC) 110.
- NOC Network Security Operations Center
- hardware keys (not shown) and other critical encryption data can be isolated within the crypto-engine 208 to prevent access by other devices (not shown) utilizing shared system resources .
- the Fig. 2 block diagram depicts a DSP cluster 203 connected to the shared memory 209.
- the DSP cluster 103 performs data analysis , packet filter and other operations requiring high-speed computation, which the CPU 202 cannot perform at the required packet data rates, on packet data passed to the DSP cluster 209 from the media interfaces 206.
- one preferred implementation of the DSP 203 is by multiple DSPs 203A, which are collectively arbitrated by a CPU subsystem 202A.
- the DSPs 203A share memory resources and are configured by the CPU subsystem 202A.
- the software for the DSP cluster 203 are loaded either during manufacture, during installation, or by remote upload from the NSOC 110. Local support of these DSP chips is well documented by their various manufacturers, and is implied by convention.
- ancillary processor 205 System integrity and operational monitoring of the SUNA 108 are provided by an ancillary processor 205, which also allows for redundant connectivity via ancillary media interface 204.
- the ancillary connection to the NSOC 110 is achieved via outboard calls initiated by the ancillary processor 205 directly to the NSOC 110 via Public Switched Telephone Network (not shown) . Encryption and separate keyed security systems for the ancillary connection would also be used.
- FIG. 3 A more detailed example of the SUNA 108 unit technology is depicted at Fig. 3.
- the Fig. 3 system can be a stand-alone hardware unit or can be a PCI, or equivalent, plug-in for use in an existing system.
- a CPU 302 and an I/O processor 307 which are particular embodiments of the CPU 202 and I/O processor 207 of Fig. 2, are implemented by a single CPU chip labeled as 302A.
- An example chip 302A is a Motorola MPC 8260 or equivalent.
- the Fig. 3 example embodiment utilizes multiple buses, with the bus labeled BUS 60x used for the cache memory 304, the main memory 309A, and the boot memory 306.
- the boot memory 306 may be a flash or ROM based device or other small non-volatile memory.
- a second bus, labeled PCI is used for interface to mass storage devices 314, within the memory unit 309A, via the secondary interface 308 which, in the depicted example, is a PCI -to- IDE Bridge.
- the mass storage devices 314 in the Fig. 3 example include, for example, a hard disc drive and a CD-ROM (not numbered) .
- the memory unit 309A also includes a solid state flash disk 312.
- the Fig. 3 example SUNA 108 also contains PCI or equivalent expansion slots 314 and 316 for both custom and off-the-shelf expansion cards (not shown) .
- the Fig. 3 example further includes a DSP cluster 303, which corresponds to the DSP unit 203 of Fig. 2.
- the DSP cluster 303 consists of multiple DSP chips 303A such, for example, ADSP-2189, and a crypto-engine 308, which corresponds to the crypto-engine 208 of the Fig. 2 general embodiment.
- An example hardware for the crypto-engine 308 is an ADSP 214L. Interface for media, a real time clock (RTC) and diagnostic/installation are provided directly on the CPU subsystem 302A by the I/O communication processor 307.
- RTC real time clock
- Ports PI and P2 are provided for connection to an interface unit 206, corresponding to the same item on Fig. 2, having media controllers and interfaces 320 and 322.
- the interfaces 320 and 322 consist of a PM5348 transceiver and an LTX974A transceiver.
- the particular output, in terms of media and format, for each of the media transceivers 320 and 322 is determined by or configured for the particular end user.
- Connections for a real-time clock or RTC 324, a local configuration and monitoring port 326, and a stacking bus 328 are provided for by bus P3.
- the ancillary processor 305 may, for example, be Motorola MC68340. As shown in Fig. 3 the ancillary processor 305 is connected to the co-processor port COP of the CPU 302. However, as will be understood by one of ordinary skill in the art, other connection schemes between the CPU 302 and the ancillary processor 305 may be used.
- a standard "plain old telephone system" , or POTS modem 330 implements what is shown as the ancillary media interface 204 of Fig. 2.
- the POTS modem is for purposes of example, as any valid network could be used as long as it provides redundancy and, if desired, enhanced security.
- the Fig. 3 system further includes a power supply 332 and back-up batteries 334, in accordance with usual design practices .
- Fig. 4 shows an optional embodiment of the present invention, which incorporates a SUNA 408 in accordance with the examples of Figs. 2 and 3, integrated into another's third-party telecommunication system 402.
- the integrated device 402 is termed, for purposes of this description, a SUNA Enabled Device or SED.
- Example SED 402s include a SUNA 108 incorporated into connectivity devices such as xDSL modems (not shown) , cable modems (not shown) , switches and routers (not shown) .
- Advantages of the incorporated SED 402 include lower cost and transparency to the end user.
- a SUNA core 408 is placed between a telecommunication provider's interface circuitry, referenced herein as TPIC 404, and a plurality of media interfaces 406 via an optional bypass control circuit 407, under the control of the TPIC 404. Connection of the TPIC 404 to the telecommunication provider specific media interface 403, as in a standard non SED device.
- Fig. 5 shows an example system similar to the system of Fig. 1, but having the SED device 402 of Fig. 4 in place of the separate SUNA 108 and connection device 104. All other functional blocks of Fig. 5 are identical to Fig.l and, accordingly, are numbered the same. Referring to Fig. 5, connection to the customer network 100 as well as to the standalone user end point devices 102 affords the end user multiple secure ports to interface to the Internet. Connection to the ancillary network is shown separately, as would be the case in the POTS implementation of Fig. 3.
- Both the primary and ancillary connections are provided to the NSOC 110 for use in monitoring and maintaining the SED device.
- configuration of the SUNA 108, or the SED 402 is automatically performed after the connection to a service provider's demarcation point by virtue of the integration with a provider's installation procedure.
- the configuration consists of a simple notification sent manually at the time of install or, alternatively, could be fully incorporated into a service provider's interface boot-up sequence that occurs during installation.
- An SED 402 or SUNA 108 would initiate a secure session, in accordance with session rules and methodologies well known to ones of skill in the art, with the NSOC 110, using any of the various encryption methods common to those previously referenced. A valid account found in an NSOC database would cause access of subscriber configuration data and files for the subscribed services.
- Subscriber services could include but are not limited to NSOC 110 and third party derived security and management algorithms, processes, keys and key techniques, intrusion detection and automated testing of firewalls using up-to-the-minute knowledge amassed at the NSOC 110.
- Subscription services can also be tiered, allowing for customer-specified levels of interaction of an SED 402 with that of the NSOC 110 including modification of the list of services provided.
- a tiered approach affords the ability of a telecommunication providers to offer services tailored for a customer depending on the sophistication of the customer's usage.
- the operating system for the SED 402 or SUNA 108 is preferably a stable, robust, real-time operating system, having a wide installed base and having substantial third- party support, as well as large libraries of share-ware and freeware available.
- One example of such an operating system is OpenBSD.
- the NSOC opens new sessions with one or more of the subscribing end-user's SUNA 108 and/or SED 402 connection devices, transfers new and updated security instructions to each.
- each of the updated end users' SUNA units 108 and SEDs 402 updates the filtering operations performed by the CPU 302 and DSP array 203 within each, as well as the encryption algorithms performed by their respective crypto-engines 308.
- This updating does not require action on the part of the end user's network system administrator.
- each subscribing end user immediately benefits from the updated information received by the NSOC 110, at minimal cost, without the current substantial risk of the local updating being incorrect, inadequate, or out of date.
- the uniformity among the SUNA units 108 or the SED units 402 ensures that the updating received from the NSOC 110 will operate correctly, without the usual problems of integrating third party security measures into the particular hardware, and software systems, of each particular end-user.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
A remotely configurable transmission security filtering, monitoring and alarm unit (108) is installed locally between an end-user's workstation (102) or network (100) and a wide-area, non-secure network (106) like the Internet. A management unit (104) for configuring and monitoring one or more of the remotely configurable security units (108) connects to the wide-area network (106) and transfers alarm criteria and other configuration data particular to each security unit (108). The local security units (108) filter digital transmissions between their workstations (102) or network (100) and the wide-area network (106) such as the Internet, according to the alarm criteria. The management unit (110) may upload encryption parameters to the remote local security units (108). In response to new security information, such as newly discovered security threats, the management unit (104) reconfigures the alarm criteria at the local security units at their respective locations around the Internet or other wide-area network (106).
Description
METHOD AND APPARATUS FOR REMOTELY MANAGED LOCAL NETWORK INTERFACE SECURITY
DESCRIPTION
Field of the Invention
This invention relates generally to the field of network security and, more particularly, to remote configuration, management and monitoring of message traffic between local area networks and wide-area non-secure networks such as the Internet .
Description of the Related Art
The number of consumers and businesses using telecommunication for exchanging information and conducting business continues to increase. One technological field showing a particularly large increase in use is the Internet, both by consumers and by business of all sizes, from one- person operations without "brick and mortar" establishments, to large companies such as IBM, General Motors, and Microsoft. The Internet is used for exchange of data representing almost every level of conducting business, from interaction between consumers, business-to-business interaction, and interaction between businesses and consumers. The Internet is also used for inter-office exchanges within geographically distributed companies, and by companies utilizing off-site and out-sourced accounting and other data management services.
The Internet continues to evolve into a vast, highly connected, very high capacity network connecting virtually any computer, anywhere in the world, having the required interface capacity with any other computer, network of computers, database servers, and other sources of digital or digitized information. The Internet, however, is not a secure transmission media. Indeed, as is well known to one of ordinary skill in the art, the very complexity of the Internet has and continues to create ever- increasing opportunities for unauthorized access to, or interruption of, computer resources and data transmissions. These range from amateur acts to well-directed expert attacks from the outside into a company's internal network, exploiting the network's portal to the Internet and utilizing the newest "hacking" methods. These acts are disruptive, intrusive and costly.
There are various known preventative measures for countering these attacks. One is method is to construct or implement what is termed a "firewall" between the company's internal or local area network (LAN) and the Internet.
Various configurations of firewalls are known in the art, but most subject traffic between the Internet and the LAN to a filtering operation, on a packet-by-packet basis. The filtering is generally referred to as "packet filtering." Based on what the packet filtering detects the packet is blocked, blocked and stored for manual inspection, passed through with a notice sent to the system administrator, or passed through without further action. Packet filtering can be simple, such as inspecting certain header fields of, for example, TCP/IP formatted packets, or can be more
sophisticated, detecting specific source address features or instruction sequences within executable code.
A difficulty with packet filters arises in selecting and updating the filter rules or criteria. Typically the rule selection is done by the network administrator. However, this can be an ongoing and time consuming task, as it requires the network administrator to keep abreast of the latest security threats and risks, as well as the latest offerings from the network security vendors, in addition to updating the packet filter rules to accommodate the same. Further, the network administrator must take the time to test and troubleshoot the updates. Still, further, the testing introduces another uncertainty, as the set of test vectors selected by the network administrator may not duplicate the real word security threat adequately to locate some faults with the packet filtering program.
Due in part to the issues identified above, in the real business world many network administrators cannot devote the necessary time to such matters. In addition, many businesses cannot afford the continual training that such an administration task requires. The result is that many networks do not have their firewall packet filters updated often enough to block the newest virus attacks or thwart the latest hacker methodologies .
In addition to the security issues arising from data packets received from the Internet, many business use firewalls to filter packets exiting their LAN onto the Internet. The filtering is employed to detect and block employees from inadvertently or intentionally transmitting
sensitive data, without the necessary approval or without proper encryption. Encryption is frequently necessary for geographically distributed companies that must communicate sensitive information from the LAN at one of its locations to the LAN at another of its locations.
Techniques for dealing with some of the general network security issues are documented in various publications, including those found in the United States Patent and Trademark Office (USPTO) . One example is the intrusion detection disclosed by U.S. Patent No. 5,557,742. Another example is the intrusion detection disclosed by U.S. Patent No. 5,881,225, and U.S. Patent No. 5,774,650. Still another example is the firewall method and apparatus disclosed by U.S. Patent No. 5,826,014. Other examples include secure transmission and cryptography, as disclosed by U.S. Patent Nos. 4,227,253, 4,918,728, 5,864,667 and 5,872,846.
Development of these and other known network security methods and apparatus have been primarily driven by needs for secure financial transactions occurring via the Internet. These technologies have also found use in larger corporate telecommunications systems, especially in systems carrying transaction data between the corporate entity and the United States government.
None of these, however, directly address the problem of requiring network system administrators to maintain the security apparatus and software monitoring and filtering communications between their networks or workstations and the Internet .
More particularly, architectures for the existing
methods are usually built upon existing workstations and servers. Companies such as UUNet®, the Sun/Cisco/Pilot joint venture, and services such as those offered by Technologic/Avdata target corporate clients with very sophisticated services for security and VPN tunneling. But in each case, integration into the end user site requires significant time, personnel and hardware, which is very cost prohibitive for smaller organizations or home users. In the case of remote appliances such solutions may be too costly to justify, using conventional cost/risk analysis. As a result, many remote sites still use dedicated networks for lack of an inexpensive, monitored, secure network appliance that could utilize unsecured public networks such at the Internet.
In addition to cost, operation of these commercial systems requires technical ability which is frequently not available to smaller offices. Devices such as the SonicWall™, offered by Sonic Systems™, and software suites, which are pared down commercial packages, are becoming available at the consumer level for use by small office and home users. However, according to a recent installment of "Security Watch" in the January 25, 1999 issue of the periodical Info World, "most will resist the idea of complex firewall technology standing between them and the Internet . "
The present inventor has identified, based on the information identified and studies above, that a method for delivering services for security and connectivity enhancement at the level of the regular home user and small business is bother widely desired and required. However, the present inventor has also identified, as been stated in numerous
publications, that many people continue to feel intimidated with computer technology and, as such, are self -proclaimed " technophobes . " The present inventor has found this to be apparent from various publications, including that of U.S. Patent No. 5,875,108, which states "Significant difficulties are experienced by users when complex programmable devices having multiple commands which are infrequently used or programmed by those users . "
In addition, as stated above, end users may not exhibit timeliness in maintaining the system software - even when notified that newer code is available. Even further, in the case of remote sites with appliance-based equipment devices, such as the SonicWall and other stand-alone, user configured equipment can be difficult to install and maintain.
SUMMARY OF THE INVENTION
An object of the present invention is to provide a system and apparatus for secure communication between a local area network (LAN) and a larger wide area network (WAN), such as the Internet, having connectivity enhancement, and having its configuration, programming, monitoring and control performed from a remote location, and being totally transparent to the end user and easily integrated into existing connectivity devices and telecommunication providers' services.
It is a further object of the invention to provide outsourced management of communication security and connectivity between a LAN and the Internet or other WAN,
thereby relieving the LAN operator from the time and cost of maintaining updated security capability.
A still further object of the invention is to provide an apparatus and method for immediate updating of one or more LANs' or remote Internet-accessible sites' respective interfaces to the Internet from one or more central locations remote the LANs, thereby providing Internet-wide updating of security capability. The centrally managed updating operation could be in response to detection at any part of the Internet of a new security threat requiring updated filter and detection parameters at each local Internet interface.
Yet another object of the invention is provide a system and apparatus for performing encryption locally at one or more LANs ' respective interface to the Internet, with configuration and updating of the encryption being managed from a central facility.
Also, other features such as newer encryption techniques and service to enhance network connectivity are able to be applied without the need for any end user intervention or as in a remote system, any service calls.
One embodiment of the invention is a method for controlling traffic between a first network, such as a corporate LAN, and a second network, such as the Internet, comprising steps of : connecting an interface unit between the first and the second network, said interface unit having a processor and a data storage unit; providing a management unit remote from the first
network, the management unit having means for receiving criteria selection commands and means for transmitting alarm criteria commands, based on the criteria selection commands, to the interface unit over a management communication network; providing the management communication network; transferring the alarm criteria from the management unit to the interface unit over the management communication network; storing the alarm criteria in the data storage unit; receiving, at the interface unit, a digital communication between the first network and the second network; comparing a content of the digital transmission to the alarm criteria, the comparing performed by the data processor; and generating an alarm from the interface unit based on the comparing.
For consistency in reference labels used in this description, the interface unit of the invention that is local to the user and which performs the described monitoring, filtering and alarm functions will be referenced hereinafter as the "Secure Universal Network Appliance", or "SUNA".
A further embodiment of the invention is a method according to the first embodiment further comprising a step of blocking the digital transmission from being communicated between the first network and the second network based on the comparing .
A still further embodiment is a method according to the first or second embodiment further comprising steps of: providing an encryption unit with the SUNA, loading an encryption algorithm into the encryption unit; and selectively encrypting a digital communication from the first network to the second network, according to the encryption algorithm, based on a result of the comparing step.
A still further embodiment of the invention is a method according to any of the above embodiments which utilizes the second network as the management communication network.
Yet another embodiment of the invention is a method according to any of the above embodiments, further comprising a step of providing an ancillary management communication between the management control unit and the SUNA.
The method and apparatus of the present invention is not solely based on a single device or software. Instead the invention comprises a system having a central security management unit and the SUNA, the SUNA being inserted between a user's LAN or a user's remote site, and a WAN, such as the Internet, with which the LAN or remote site communicates. The central security unit can be maintained and operated by specially trained and experienced computer security professionals independent from, and not requiring management and training by the user. It is envisioned that professionals in the field of computer security, due to
having specialized training access to information not widely disseminated, in addition to being not burdened with day-to-day system administration tasks, can be better informed as to up-to-the-minute security issues. This includes keeping up to date as to the identity or and methods employed by those that perpetrate telecommunication ( "phreaking" ) , computer/internet-based ("hacking") intrusions and exploitations.
The present invention, by providing centralized configuration and management of the network interface security operations of businesses and individual users, and thus providing centralized, dedicated intelligence gathering and countermeasure development, allows the system described to stay abreast of the latest techniques and enact defenses at all locations.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, aspects, and advantages will be better understood from the following description of preferred embodiments of the invention with reference to the drawings, in which:
Fig. 1 is a block diagram of an example system according to the invention;
Fig. 2 is a high level circuit diagram of a remotely configurable network security appliance within the example system of Fig. 1;
Fig. 3 is a high level circuit diagram of an alternative configurable network security appliance within
the example system of Fig. 1;
Fig. 4 is a system diagram of an example embodiment of the invention, utilizing a remotely configurable network security appliance according to Fig. 3; and
Fig. 5 is a system diagram of an example embodiment of the invention, utilizing a remotely configurable network security appliance an appliance according to Fig. 2.
DETAILED DESCRIPTION OF THE INVENTION
The system and method of this invention will be described with reference to Figs. 1-5 herein. Fig. 1 depicts a high level system diagram of an example embodiment of the invention. The system comprises a customer network or LAN 100 which may, for example, be an Ethernet bus connecting a plurality of workstations, or standalone user end point devices 102. The LAN 100 includes a server (not labeled) which may be one of the workstations 102. The system further comprises a telecommunication provider's network connection device, or TPIC, 104 which connects to the Internet or other wide area network (WAN) 106. Inserted between the customer network 100 and the TPIC 104 is a Secure Universal Network Appliance or SUNA 108 which, as will be described hereinbelow, performs packet filtering and encryption operations on telecommunication transfers between the in accordance with a remotely loaded configuration, as will also be described.
The example system of Fig. 1 further includes a stand-
alone workstation 102 connected directly to the SUNA 108, which is optional and shown for purposes of example only. The system further includes a Network Security Operation Center, or NSOC, 110 which, as will be described, transfers filtering and encryption commands to the SUNA 108. In the Fig. 1 example system, the NSOC 110 is connected to the wide area network 106, such as the Internet, by a primary network 112, and a back-up, or ancillary network 114. The primary network can, for example be commercial Internet Services Provider (ISP) , such as America On Line®. The ancillary network 114, which may be another ISP, is not required but is preferred, in view of the general fault tolerance requirements for security systems.
An example of the SUNA unit 108 will be described in reference to Figs. 2 and 3, with Fig. 1 being a first level functional breakdown of an example SUNA 108, and Fig. 3 depicting an example lower level breakdown of the Fig. 2 embodiment .
The high level block diagram of Fig. 2 depicts the major functional components of an example SUNA apparatus 108 according to this invention. As shown, a high speed central processing unit (CPU) 202A connects to an input/output (I/O) processor 207. CPU 202A and I/O processor 207 are shown as separate units for purposes of describing the operation of the SUNA unit. One contemplated hardware example implements the CPU 202 and I/O processor 207 on a monolithic central processing unit 202A, as shown in the detailed depiction of the SUNA 108
shown at Fig. 3. The combined implementation of these functions 202 and 207 on a single chip is well known in the art .
Referring to Fig. 2, a memory subsystem 209, which includes volatile, non-volatile and mass storage devices (not shown), is multiply ported to the CPU 202, and to the I/O processor 207, a crypto-engine 208 and a digital signal processing (DSP) cluster 203. The multiple port connection allows any of the sub-systems 202, 203 and 208 access to data files, and permits communication between the subsystems as well. The multiple port connection also reduces bottlenecking . Multiple media interfaces 206 provide connection to any of the commonly used network protocols and physical media by way of the I/O processor 207. The network protocols and include Asynchronous Transfer Mode (ATM) , Ethernet 100/lObt, and any other network interfacing found in the commercial and consumer environments. The only limitation as to network protocol and physical media is imposed by the system speed. Currently, speeds in excess of OC3 and approaching OC12 are possible .
As described, the example SUNA 108 of Fig. 2 includes a crypto-engine 208. As will be described below, the crypto-engine 208 performs on-demand enciphering and deciphering of communications passed between any of the desired media interfaces 206 via the I/O processor 207 into the crypto-engine 208. There are a plurality of alternative embodiments, or options, within any given
embodiment for loading the encryption control software (not shown) into the crypto-engine 208. One alternative is to load the crypto-engine 208 such as, for example, by way of the CPU subsystem 202 during manufacture or during installation. Another alternative is to perform a remote transfer of the encryption software, or of control parameters (not shown) to set particular characteristics of the encryption, from the Network Security Operations Center (NSOC) 110. In addition, as is known in the art, hardware keys (not shown) and other critical encryption data can be isolated within the crypto-engine 208 to prevent access by other devices (not shown) utilizing shared system resources .
The Fig. 2 block diagram depicts a DSP cluster 203 connected to the shared memory 209. The DSP cluster 103 performs data analysis , packet filter and other operations requiring high-speed computation, which the CPU 202 cannot perform at the required packet data rates, on packet data passed to the DSP cluster 209 from the media interfaces 206.
As can be seen in the detailed example SUNA 108 shown at Fig. 3, one preferred implementation of the DSP 203 is by multiple DSPs 203A, which are collectively arbitrated by a CPU subsystem 202A. The DSPs 203A share memory resources and are configured by the CPU subsystem 202A. Similar to the above-described crypto-engine 208, the software for the DSP cluster 203 are loaded either during manufacture, during installation, or by remote upload from the NSOC 110.
Local support of these DSP chips is well documented by their various manufacturers, and is implied by convention.
System integrity and operational monitoring of the SUNA 108 are provided by an ancillary processor 205, which also allows for redundant connectivity via ancillary media interface 204. The ancillary connection to the NSOC 110 is achieved via outboard calls initiated by the ancillary processor 205 directly to the NSOC 110 via Public Switched Telephone Network (not shown) . Encryption and separate keyed security systems for the ancillary connection would also be used.
A more detailed example of the SUNA 108 unit technology is depicted at Fig. 3. The Fig. 3 system can be a stand-alone hardware unit or can be a PCI, or equivalent, plug-in for use in an existing system. In the Fig. 3 example a CPU 302 and an I/O processor 307, which are particular embodiments of the CPU 202 and I/O processor 207 of Fig. 2, are implemented by a single CPU chip labeled as 302A. An example chip 302A is a Motorola MPC 8260 or equivalent.
The Fig. 3 example embodiment utilizes multiple buses, with the bus labeled BUS 60x used for the cache memory 304, the main memory 309A, and the boot memory 306. The boot memory 306 may be a flash or ROM based device or other small non-volatile memory. A second bus, labeled PCI, is used for interface to mass storage devices 314, within the memory unit 309A, via the secondary interface 308 which, in the depicted example, is a PCI -to- IDE Bridge. The mass
storage devices 314 in the Fig. 3 example include, for example, a hard disc drive and a CD-ROM (not numbered) . The memory unit 309A also includes a solid state flash disk 312. The Fig. 3 example SUNA 108 also contains PCI or equivalent expansion slots 314 and 316 for both custom and off-the-shelf expansion cards (not shown) . The Fig. 3 example further includes a DSP cluster 303, which corresponds to the DSP unit 203 of Fig. 2. The DSP cluster 303 consists of multiple DSP chips 303A such, for example, ADSP-2189, and a crypto-engine 308, which corresponds to the crypto-engine 208 of the Fig. 2 general embodiment. An example hardware for the crypto-engine 308 is an ADSP 214L. Interface for media, a real time clock (RTC) and diagnostic/installation are provided directly on the CPU subsystem 302A by the I/O communication processor 307. Ports PI and P2 are provided for connection to an interface unit 206, corresponding to the same item on Fig. 2, having media controllers and interfaces 320 and 322. For the depicted example of Fig. 3 the interfaces 320 and 322 consist of a PM5348 transceiver and an LTX974A transceiver. The particular output, in terms of media and format, for each of the media transceivers 320 and 322 is determined by or configured for the particular end user. Connections for a real-time clock or RTC 324, a local configuration and monitoring port 326, and a stacking bus 328 are provided for by bus P3.
The ancillary processor 305 may, for example, be
Motorola MC68340. As shown in Fig. 3 the ancillary processor 305 is connected to the co-processor port COP of the CPU 302. However, as will be understood by one of ordinary skill in the art, other connection schemes between the CPU 302 and the ancillary processor 305 may be used. A standard "plain old telephone system" , or POTS modem 330 implements what is shown as the ancillary media interface 204 of Fig. 2. The POTS modem is for purposes of example, as any valid network could be used as long as it provides redundancy and, if desired, enhanced security.
The Fig. 3 system further includes a power supply 332 and back-up batteries 334, in accordance with usual design practices .
Fig. 4 shows an optional embodiment of the present invention, which incorporates a SUNA 408 in accordance with the examples of Figs. 2 and 3, integrated into another's third-party telecommunication system 402. The integrated device 402 is termed, for purposes of this description, a SUNA Enabled Device or SED. Example SED 402s include a SUNA 108 incorporated into connectivity devices such as xDSL modems (not shown) , cable modems (not shown) , switches and routers (not shown) . Advantages of the incorporated SED 402 include lower cost and transparency to the end user. As contemplated by this invention, the straightforward design, low size and weight of the SUNA 108 make the SUNA 108 equipped connectivity device 402 affordable enough to the end user such that the SUNA would be readily selected.
In the example SED 402 of Fig. 4, a SUNA core 408 is placed between a telecommunication provider's interface circuitry, referenced herein as TPIC 404, and a plurality of media interfaces 406 via an optional bypass control circuit 407, under the control of the TPIC 404. Connection of the TPIC 404 to the telecommunication provider specific media interface 403, as in a standard non SED device. An ancillary media interface 405, which corresponds to the interface 305 and 330 described in reference to Fig. 3, is connected to the SUNA core 408
Fig. 5 shows an example system similar to the system of Fig. 1, but having the SED device 402 of Fig. 4 in place of the separate SUNA 108 and connection device 104. All other functional blocks of Fig. 5 are identical to Fig.l and, accordingly, are numbered the same. Referring to Fig. 5, connection to the customer network 100 as well as to the standalone user end point devices 102 affords the end user multiple secure ports to interface to the Internet. Connection to the ancillary network is shown separately, as would be the case in the POTS implementation of Fig. 3.
Both the primary and ancillary connections are provided to the NSOC 110 for use in monitoring and maintaining the SED device.
Referring to Figs. 1 and 5, configuration of the SUNA 108, or the SED 402 is automatically performed after the connection to a service provider's demarcation point by virtue of the integration with a provider's installation procedure. The configuration consists of a simple
notification sent manually at the time of install or, alternatively, could be fully incorporated into a service provider's interface boot-up sequence that occurs during installation. An SED 402 or SUNA 108 would initiate a secure session, in accordance with session rules and methodologies well known to ones of skill in the art, with the NSOC 110, using any of the various encryption methods common to those previously referenced. A valid account found in an NSOC database would cause access of subscriber configuration data and files for the subscribed services. Subscriber services could include but are not limited to NSOC 110 and third party derived security and management algorithms, processes, keys and key techniques, intrusion detection and automated testing of firewalls using up-to-the-minute knowledge amassed at the NSOC 110. Subscription services can also be tiered, allowing for customer-specified levels of interaction of an SED 402 with that of the NSOC 110 including modification of the list of services provided. A tiered approach affords the ability of a telecommunication providers to offer services tailored for a customer depending on the sophistication of the customer's usage. The operating system for the SED 402 or SUNA 108 is preferably a stable, robust, real-time operating system, having a wide installed base and having substantial third- party support, as well as large libraries of share-ware and freeware available. One example of such an operating system is OpenBSD.
After initial configuration, either periodically in response to new security information provided to the NSOC 110, the NSOC opens new sessions with one or more of the subscribing end-user's SUNA 108 and/or SED 402 connection devices, transfers new and updated security instructions to each. As a result, each of the updated end users' SUNA units 108 and SEDs 402 updates the filtering operations performed by the CPU 302 and DSP array 203 within each, as well as the encryption algorithms performed by their respective crypto-engines 308. This updating does not require action on the part of the end user's network system administrator. As a result, each subscribing end user immediately benefits from the updated information received by the NSOC 110, at minimal cost, without the current substantial risk of the local updating being incorrect, inadequate, or out of date. Further, the uniformity among the SUNA units 108 or the SED units 402, even over large number of end users, ensures that the updating received from the NSOC 110 will operate correctly, without the usual problems of integrating third party security measures into the particular hardware, and software systems, of each particular end-user.
While the foregoing invention has been described with specific references to examples of its preferred embodiments, it should be understood that various substitutions, variations, and modifications may be made thereto without departing from the scope of the invention as defined in the appended claims.
Claims
1. A method for controlling traffic between a first and a second network comprising steps of: connecting an interface unit between said first and second network, said interface unit having a processor and a data storage unit; providing a management unit remote from said first network; transferring an alarm criteria from said management unit to said interface unit; storing said alarm criteria in said data storage unit; receiving, at said interface unit, a digital communication between said first network and said second network; comparing a content of said digital transmission to said alarm criteria, said comparing performed by said data processor; and generating an alarm from said interface unit based on said comparing.
2. A method according to claim 1 further comprising a step of blocking said digital transmission from being communicated between said first network and said second
network based on said comparing.
3. A method according to claim 1 further comprising steps of: providing an encryption unit with said interface unit, said encryption; loading an encryption algorithm into said encryption unit; and selectively encrypting digital communication from said first network to said second network, according to said encryption algorithm, based on a result of said comparing step.
4. A method according to claim 1 further comprising steps of providing an encryption unit with said interface unit, said encryption; loading an encryption algorithm into said encryption unit; transmitting an encryption selection criteria from said remote management unit to said encryption unit; and selectively encrypting a digital communication from said first network to said second network, according to said encryption algorithm, based on said encryption selection criteria.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13579099P | 1999-05-24 | 1999-05-24 | |
US60/135,790 | 1999-05-24 | ||
US86310100A | 2000-05-24 | 2000-05-24 | |
US11/863,101 | 2000-05-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000072171A1 true WO2000072171A1 (en) | 2000-11-30 |
Family
ID=26833663
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/014279 WO2000072171A1 (en) | 1999-05-24 | 2000-05-24 | Method and apparatus for remotely managed local network interface security |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2000072171A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1244264A2 (en) * | 2001-02-14 | 2002-09-25 | Mitsubishi Denki Kabushiki Kaisha | Illegal access data handling apparatus and method |
WO2003015369A2 (en) | 2001-08-07 | 2003-02-20 | Innominate Security Technologies Ag | Method and computer system for securing communication in networks |
EP1419462A2 (en) * | 2001-08-24 | 2004-05-19 | Bigfix, Inc. | Method to remotely query, safely measure, and securely communicate configuration information of a networked computational device |
EP1508112A1 (en) * | 2002-05-30 | 2005-02-23 | Comptel OYJ | Service provisioning method, system and computer program product |
WO2020183012A1 (en) | 2019-03-14 | 2020-09-17 | Anapur Ag | Method and communication control system for influencing communication in a communication network |
US11379601B2 (en) | 2019-12-11 | 2022-07-05 | Paypal, Inc. | Detection of sensitive database information |
US11768916B2 (en) | 2019-12-11 | 2023-09-26 | Paypal, Inc. | Detection of sensitive database information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5586260A (en) * | 1993-02-12 | 1996-12-17 | Digital Equipment Corporation | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms |
US5737333A (en) * | 1995-06-23 | 1998-04-07 | Lucent Technologies Inc. | Method and apparatus for interconnecting ATM-attached hosts with telephone-network attached hosts |
US5930359A (en) * | 1996-09-23 | 1999-07-27 | Motorola, Inc. | Cascadable content addressable memory and system |
-
2000
- 2000-05-24 WO PCT/US2000/014279 patent/WO2000072171A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5586260A (en) * | 1993-02-12 | 1996-12-17 | Digital Equipment Corporation | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms |
US5737333A (en) * | 1995-06-23 | 1998-04-07 | Lucent Technologies Inc. | Method and apparatus for interconnecting ATM-attached hosts with telephone-network attached hosts |
US5930359A (en) * | 1996-09-23 | 1999-07-27 | Motorola, Inc. | Cascadable content addressable memory and system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1244264A2 (en) * | 2001-02-14 | 2002-09-25 | Mitsubishi Denki Kabushiki Kaisha | Illegal access data handling apparatus and method |
EP1244264A3 (en) * | 2001-02-14 | 2004-07-28 | Mitsubishi Denki Kabushiki Kaisha | Illegal access data handling apparatus and method |
US7360250B2 (en) | 2001-02-14 | 2008-04-15 | Mitsubishi Denki Kabushiki Kaisha | Illegal access data handling apparatus and method for handling illegal access data |
WO2003015369A2 (en) | 2001-08-07 | 2003-02-20 | Innominate Security Technologies Ag | Method and computer system for securing communication in networks |
EP1417820B1 (en) * | 2001-08-07 | 2017-02-08 | PHOENIX CONTACT Cyber Security AG | Method and computer system for securing communication in networks |
EP1419462A2 (en) * | 2001-08-24 | 2004-05-19 | Bigfix, Inc. | Method to remotely query, safely measure, and securely communicate configuration information of a networked computational device |
EP1419462A4 (en) * | 2001-08-24 | 2006-07-12 | Bigfix Inc | Method to remotely query, safely measure, and securely communicate configuration information of a networked computational device |
EP1508112A1 (en) * | 2002-05-30 | 2005-02-23 | Comptel OYJ | Service provisioning method, system and computer program product |
WO2020183012A1 (en) | 2019-03-14 | 2020-09-17 | Anapur Ag | Method and communication control system for influencing communication in a communication network |
US11379601B2 (en) | 2019-12-11 | 2022-07-05 | Paypal, Inc. | Detection of sensitive database information |
US11768916B2 (en) | 2019-12-11 | 2023-09-26 | Paypal, Inc. | Detection of sensitive database information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7325140B2 (en) | Secure management access control for computers, embedded and card embodiment | |
US8332464B2 (en) | System and method for remote network access | |
RU2152691C1 (en) | Device for protection of connected computer networks | |
CA2623120C (en) | Network security appliance | |
US6757822B1 (en) | System, method and computer program product for secure communications using a security service provider manager | |
US6678827B1 (en) | Managing multiple network security devices from a manager device | |
US6175917B1 (en) | Method and apparatus for swapping a computer operating system | |
US20080005380A1 (en) | Integrated configuration and management of hardware devices | |
US20130111566A1 (en) | Out-of-band remote management station | |
US9030946B2 (en) | Method of securing network access radio systems | |
US9787606B2 (en) | Inline network switch having serial ports for out-of-band serial console access | |
AU2012227276A1 (en) | Global terminal management using 2-factor authentication | |
WO2000072171A1 (en) | Method and apparatus for remotely managed local network interface security | |
Cisco | Internetworking Applications: Case Studies March 1994 Vol. 1 No.1 | |
Cisco | Cisco Secure Intrusion Detection System Sensor Configuration Note Version 3.0 | |
Cisco | Security Configuration Guide Cisco IOS Release 11.3 | |
Cisco | Catalyst 6000 Intrusion Detection System Module Installation and Configuration Note Version 3.0 | |
Cisco | Cisco Intrusion Detection System Sensor Configuration Note Version 3.1 | |
Cisco | Operating the System | |
US7715414B1 (en) | Communication service provider that controls an access interface of an access provider where the access interface is located at a customer premise | |
US8291469B1 (en) | Communication access provider that allows a service provider to control an access interface at a customer premise | |
WO2005043304A2 (en) | Secure management access control for computers, embedded and card embodiment | |
Wong | Classifying and Identifying BGP Hijacking attacks on the internet | |
Guttman et al. | Implementing Internet Firewall Security Policy | |
Solutions | Hewlett-Packard A5547A Central Web Console Administrator Guide |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |