Network traffic intercepting method and system
First Claim
1. A method conducted within a single computer system connected to a network for intercepting, examining, and controlling data flowing via transport connections between the transport layer of an operating system and user applications, said method comprising:
- intercepting all said data, via a dedicated transport connection connected to said transport layer, flowing between said transport layer and said user application; and
, examining said data for information content, which comprises examining said data to determine if it is scannable for information content or non-scannable for information content.
4 Assignments
0 Petitions
Accused Products
Abstract
A computer system and method for intercepting, examining, and controlling data streams flowing via transport connections between the transport layer of an operating system and the user application. All data streams that pass from an external network, through the transport layer of an operating system to the user application or from the user application to the transport layer are intercepted by a network traffic interceptor. The network traffic interceptor processes all data streams for proscribed data that may include viruses, trojan horses, worms, and other hostile algorithms. The processing used by the network traffic interceptor can include monitoring, blocking or destroying data, thereby protecting the single computer system from being infected by hostile algorithms.
40 Citations
20 Claims
-
1. A method conducted within a single computer system connected to a network for intercepting, examining, and controlling data flowing via transport connections between the transport layer of an operating system and user applications, said method comprising:
-
intercepting all said data, via a dedicated transport connection connected to said transport layer, flowing between said transport layer and said user application; and
,examining said data for information content, which comprises examining said data to determine if it is scannable for information content or non-scannable for information content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method conducted within a single computer system connected to a network for intercepting, examining, and controlling data flowing via transport connections between the transport layer of an operating system and user applications, said method comprising:
-
intercepting all said data flowing between said transport layer and said user application; and
,transmitting said data via a dedicated transport connection connected to said transport layer to a network traffic interceptor. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification