Data scanning network security technique
First Claim
1. In a computer network configured to receive data, a method of checking data as the data is received and before the data is transmitted to a node on the computer network, the method including the steps of:
- determining whether an external source is attempting to establish a mail connection with a computer network wherein the computer network is receptive to one or more recognized protocols;
receiving the data from the external source;
determining whether the data from the external source is formatted according to one of the recognized protocols;
scanning the data for acceptable content and format as determined by a rule set established by one of the recognized protocols such that the data is scanned in subdivisions set by a recognized protocol as the data is received by the computer network;
determining whether the data is passed to a node on the computer network;
translating the data before transmitting it to the node on the computer network; and
transmitting the data to the node on the computer network soon after the data is scanned.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network'"'"'s mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols. This is done at the same time as the data is received by the data scanning device. It is then determined whether the data should be sent to its destination on the computer network. If necessary, the data is translated before being passed to its destination on the computer network.
-
Citations
46 Claims
-
1. In a computer network configured to receive data, a method of checking data as the data is received and before the data is transmitted to a node on the computer network, the method including the steps of:
-
determining whether an external source is attempting to establish a mail connection with a computer network wherein the computer network is receptive to one or more recognized protocols; receiving the data from the external source; determining whether the data from the external source is formatted according to one of the recognized protocols; scanning the data for acceptable content and format as determined by a rule set established by one of the recognized protocols such that the data is scanned in subdivisions set by a recognized protocol as the data is received by the computer network; determining whether the data is passed to a node on the computer network; translating the data before transmitting it to the node on the computer network; and transmitting the data to the node on the computer network soon after the data is scanned. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A data security apparatus for use in a computer network for checking data as the data is received and before the data is transmitted to a node on the computer network, the apparatus comprising:
-
a mail detector for determining whether an external source is attempting to establish a mail connection with a computer network wherein the computer network is receptive to one or more recognized protocols; a data receiver for receiving data from the external source; a protocol evaluator for evaluating the protocol used by the external source in sending the data and for determining whether the data from the external source is formatted based on one or more of the recognized protocols; a data scanner for scanning the data for acceptable content and format as determined by a rule set established by one of the recognized protocols wherein the data is scanned in subdivisions set by the recognized protocol as the data is received by the computer network; a data translator for translating the data before it is passed to the node on the computer network; a device for determining whether the data should be transmitted to the node on the computer network; and a network data transmitter for transmitting the data to the node on the computer network soon after the data is scanned. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A data security apparatus for use in a computer network for checking data as the data is received and before the data is transmitted to a node on the computer network, the apparatus comprising:
-
means for determining whether an external source is attempting to establish a mail connection with a computer network wherein the computer network is receptive to one or more recognized protocols; means for receiving the data from the external source; means for determining whether the data from the external source is formatted according to one of the recognized protocols; means for scanning the data for acceptable content and format as determined by a rule set established by one of the recognized protocols such that the data is scanned in subdivisions set by a recognized protocol as the data is received by the computer network; means for determining whether the data is passed to a node on the computer network; means for translating the data before transmitting the data to the node on the computer network; and means for transmitting the data to the node on the computer network such that the data is transmitted soon after the data is scanned. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer-readable medium containing programmed instructions arranged to check data as the data is received and before the data is transmitted to a node in a computer network configured to receive data, the computer-readable medium including programmed instructions for:
-
determining whether an external source is attempting to establish a mail connection with a computer network wherein the computer network is receptive to one or more recognized protocols; receiving the data from the external source; determining whether the data from the external source is formatted according to one of the recognized protocols; scanning the data for acceptable content and format as determined by a rule set established by one of the recognized protocols such that the data is scanned in subdivisions set by a recognized protocol as the data is received by the computer network; determining whether the data is passed to a node on the computer network; translating the data before transmitting it to a node on the computer network; and transmitting the data to the node on the computer network soon after the data is scanned. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46)
-
Specification