Intelligent firewall
First Claim
Patent Images
1. A method of preventing unauthorized access to a system, comprising:
- receiving a data packet at a firewall, where the firewall does not use a communication address;
analyzing the data packet with the firewall to determine the final disposition of the data packet; and
handling the data packet according to its final dispostion.
1 Assignment
0 Petitions
Accused Products
Abstract
An intelligent firewall that prevents unauthorized access to a system has been developed. The fire wall does not use a communication address. It receives a data packet and analyzes it to determine its final disposition. Finally, the firewall handles the data packet according to its final disposition.
-
Citations
47 Claims
-
1. A method of preventing unauthorized access to a system, comprising:
-
receiving a data packet at a firewall, where the firewall does not use a communication address;
analyzing the data packet with the firewall to determine the final disposition of the data packet; and
handling the data packet according to its final dispostion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 30, 31, 32, 33, 34, 35, 36)
-
-
29. A method of preventing unauthorized access to a system, comprising:
-
receiving a SYN request for access to a destination in the system at a firewall;
replying to the SYN request with an SYN/ACK message from the firewall, where the firewall has changed packet information within the SYN/ACK message;
receiving an ACK message in reply to the SYN/ACK message at the firewall;
authenticating the ACK message with the firewall;
recreating the SYN request; and
forwarding the recreated SYN request to the destination in the system.
-
-
37. A method of preventing unauthorized access to a system, comprising:
-
step for receiving data;
step for analyzing the data for authorization to access the system;
step for allowing access to the system for authorized data; and
step for denying access to the system for unauthorized data. - View Dependent Claims (38, 39)
-
-
40. A method of remotely managing a firewall, comprising:
-
receiving a control data packet at the firewall from a remote location;
analyzing the control data packet to determine if the control data packet is authorized to access the firewall; and
allowing an authorized control data packet to control the firewall. - View Dependent Claims (41, 42, 43, 44, 45)
-
-
46. A method of remotely managing a firewall, comprising:
-
step for receiving control data at the firewall from a remote location;
step for analyzing the control data to determine if the control data is authorized to access the firewall; and
step for allowing authorized control data to access the firewall. - View Dependent Claims (47)
-
Specification