SYSTEM AND METHOD FOR MANAGING A DATA TRANSFER CHANNEL BETWEEN COMMUNICATION DEVICES
First Claim
1. A system for managing a data transfer channel between communication devices, the system comprising:
- a storage device configured for storing security definitions; and
a data manager comprising;
a monitoring module configured for monitoring the data transfer channel for a data transfer;
an analyzing module configured for waiting for the data transfer by communicating with the monitoring module, and for detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions;
an intercepting module configured for intercepting data packets of the data transfer channel if the data transfer is detected;
a data processing module configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not comprise sensitive/confidential data; and
a data controlling module configured for releasing the intercepted data packets if the reassembled data do not comprise sensitive/confidential data, and for preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for managing a data transfer channel between communication devices includes: monitoring the data transfer channel for a data transfer; intercepting data packets of the data transfer channel if the data transfer is detected; reassembling intercepted data packets into reassembled data; detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions; preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data. A related system is also disclosed.
-
Citations
6 Claims
-
1. A system for managing a data transfer channel between communication devices, the system comprising:
-
a storage device configured for storing security definitions; and a data manager comprising; a monitoring module configured for monitoring the data transfer channel for a data transfer; an analyzing module configured for waiting for the data transfer by communicating with the monitoring module, and for detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions; an intercepting module configured for intercepting data packets of the data transfer channel if the data transfer is detected; a data processing module configured for reassembling intercepted data packets into the reassembled data, and for formatting the reassembled data into the intercepted data packets if the reassembled data do not comprise sensitive/confidential data; and a data controlling module configured for releasing the intercepted data packets if the reassembled data do not comprise sensitive/confidential data, and for preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data. - View Dependent Claims (2, 3)
-
-
4. A method for managing a data transfer channel between communication devices, the method comprising the steps of:
-
monitoring the data transfer channel for a data transfer; intercepting data packets of the data transfer channel if the data transfer is detected; reassembling intercepted data packets into reassembled data; detecting whether reassembled data include sensitive/confidential data corresponding to the security definitions; preventing detected data from transferring through the data transfer channel to the communication devices if the reassembled data comprise sensitive/confidential data; and formatting the reassembled data into the intercepted data packets and releasing the intercepted data packets, if the reassembled data do not comprise sensitive/confidential data. - View Dependent Claims (5, 6)
-
Specification