×

Security System with Methodology Providing Verified Secured Individual End Points

  • US 20050273850A1
  • Filed: 03/29/2005
  • Published: 12/08/2005
  • Est. Priority Date: 06/07/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling access to a particular application, the method comprising:

  • defining firewall rules specifying filtering conditions for incoming network traffic, said firewall rules including an application attribute that allows individual rules to be associated with specific applications, said firewall rules also including extended attributes that allow specification of additional conditions that a given end point is required to meet;

    intercepting incoming network traffic destined for a particular application for which a particular application-specific firewall rule has been created;

    examining the extended attributes for said particular application-specific firewall rule, for determining what additional conditions the given end point must comply with in order to communicate with the particular application;

    if the given end point complies with said additional conditions, allowing the end point to communicate with the particular application; and

    otherwise blocking the end point to prevent communication with the particular application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×