×

Enhanced Personal Firewall for Dynamic Computing Environments

  • US 20080222715A1
  • Filed: 03/09/2007
  • Published: 09/11/2008
  • Est. Priority Date: 03/09/2007
  • Status: Active Grant
First Claim
Patent Images

1. An enhanced personal firewall system comprising:

  • an inter-firewall connection listener configured to bind to a specified communications port, to listen for incoming, outgoing, or both incoming and outgoing firewall trust requests, and upon detection of a connection, to transfer firewall control to an inter-firewall controller; and

    an inter-firewall controller configured to perform logical processes for establishing trusted communications through a local firewall and a remote firewall by performing one or both of the processes of;

    (a) upon establishing an outgoing connection by an application program protected by a local firewall to a resource protected by a remote firewall, to;

    (1) initiate and transmit a handshake identification request from a local firewall to a remote firewall;

    (2) responsive to receipt of a handshake response from said remote firewall, to transmit a local firewall public encryption key to said remote firewall;

    (3) responsive to receiving a host firewall public encryption key, to generate, sign, and transmit a trusted computer request with identification information to said remote firewall;

    (4) upon receipt of a grant of trusted access from said remote firewall, to allow an application program from behind said local firewall to communicate to said remote firewall, otherwise to block said application program from communication with said remote firewall; and

    (b) upon establishing an incoming connection by an application program protected by a remote firewall to a resource protected by a local firewall, to;

    (1) transmit a firewall identification handshake response to said remote firewall upon receipt of a handshake identification request from said remote firewall;

    (2) responsive to receipt of remote firewall public encryption key, transmitting a local firewall public encryption key to said remote firewall;

    (3) responsive to receiving a signed trusted computer request from said remote firewall, if said remote firewall has previously requested a trusted access by checking a local public key store, using the signature of said trusted computer request using said received remote firewall public encryption key;

    (4) responsive to determining that said remote firewall has been previously authorized to establish trusted access, modifying local firewall rules to allow data communications to and from one or more addresses associated with said remote firewall to be transceived through said local firewall.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×