System and method for regulating messages between networks
First Claim
Patent Images
1. A method for interconnecting networks, said method comprising:
- receiving a message from a first network to be communicated to a target device of a second network;
identifying data within the message;
determining whether the data is allowable based on a policy;
communicating the message to the target device of the second network in response to determining the data is allowed.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for interconnecting networks. In one embodiment, a message is received from a first network to be communicated to a target device of a second network. Data within the message is identified. A determination is made whether the data is allowable based on a policy. The message is communicated to the target device of the second network in response to determining the data is allowed.
-
Citations
21 Claims
-
1. A method for interconnecting networks, said method comprising:
-
receiving a message from a first network to be communicated to a target device of a second network; identifying data within the message; determining whether the data is allowable based on a policy; communicating the message to the target device of the second network in response to determining the data is allowed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A profiler for regulating messages between networks, said profiler comprising:
-
a queue for receiving the messages from a remote network; a parser for identifying data within the messages; and a comparator for determining whether that the data is allowed to be communicated to a target device in a host network based on a policy, wherein the messages are allowed if the messages conform to the policy. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method for establishing a policy for regulating access between a remote network and a host network said method comprising:
-
designating a target device and port access for the remote network; establishing authorized commands for the remote network; and specifying message thresholds for the remote network. - View Dependent Claims (19, 20, 21)
-
Specification