PREVENTIVE INTRUSION DEVICE AND METHOD FOR MOBILE DEVICES
First Claim
1. A computerized system for preventing network attacks on a communication device which receive a plurality of network packets in a wireless communication network, said system comprising:
- a) a computer readable firmware comprising;
i) a Pattern Detector module configured to inspect the received packets and mark the received packets as suspicious or normal packets according to filtering settings;
ii) a packet filter module configured to filter the packets at a kernel level and transmit the received packets to the Pattern Detector module; and
b) a computer readable kernel extension module configure to receive the packets from the firmware module at an application level, detect the pattern of the marked packets and if the packets are not marked further examine the packets at the next lower software layer.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for providing an intrusion prevention system to prevent hacking into files located on enterprise users'"'"' endpoint devices functioning as mobile computing platforms. The method includes filtering low-level network packets for each of a plurality of received network packets, offloading the received packets to an inspecting processing module and marking suspicious packets based on at least one of a header and pattern of each of said received packets. The method also includes taking preventive measures by the system to ensure protection of the device and network, taking active steps by the system to block suspicious traffic and disconnecting the current connection by the system, when it detects suspicious traffic.
-
Citations
36 Claims
-
1. A computerized system for preventing network attacks on a communication device which receive a plurality of network packets in a wireless communication network, said system comprising:
-
a) a computer readable firmware comprising; i) a Pattern Detector module configured to inspect the received packets and mark the received packets as suspicious or normal packets according to filtering settings; ii) a packet filter module configured to filter the packets at a kernel level and transmit the received packets to the Pattern Detector module; and b) a computer readable kernel extension module configure to receive the packets from the firmware module at an application level, detect the pattern of the marked packets and if the packets are not marked further examine the packets at the next lower software layer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for preventing network attacks on a communication device comprising:
-
a. receiving a network packet at a computerized readable firmware module comprised in said communication device; b. filtering the received packet at said firmware module by a packet filter module; c. marking the received packets as ‘
normal’
or ‘
suspicious’
packet by a pattern detector according to filtering settings criteria;d. offloading the received packet to a computerized readable zCore kernel extension module at a next software layer; e. detecting the pattern of the marked packets by said zCore kernel module; and f. offloading the normal packets to the next software layer. - View Dependent Claims (14, 15, 16)
-
-
17. A communication device comprising:
a computer readable intrusion prevention firmware configured to prevent hacking into said device computing platforms, said firmware comprising;
;a) a WiFi firmware module configured to receive a plurality of network packets; b) a packet filter module configured to filter said received packets; c) a pattern detector module configured to detect the pattern of said received packets according to filtering settings criteria; and d) a secure storage module configured to store said filtering settings criteria. - View Dependent Claims (18, 19, 20, 21)
-
22. A method for providing an intrusion prevention system to prevent threats or attacks on mobile computing platforms which transmit information in a communication network, the method comprising:
-
filtering network packets for each of a plurality of received network packets; offloading the received packets to an inspecting processing module; marking suspicious packets based on at least one of;
a header; and
pattern of each of said received packets;taking preventive measures by the system to ensure protection of the mobile computing platforms. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification