×

System and method for unified threat management with a relational rules methodology

DC
  • US 7,735,116 B1
  • Filed: 03/24/2006
  • Issued: 06/08/2010
  • Est. Priority Date: 03/24/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method of controlling access to a networked device, the method comprising:

  • receiving an incoming message packet by a security gateway coupled to said networked device;

    evaluating the received message packet to determine if the received message packet is compliant with a first test, the first test corresponding to a first level of a security hierarchy implemented by said security gateway,wherein the security hierarchy establishes a relationship between security functions from a lowest level to a highest level; and

    the received packet is rejected at the earliest possible operation in the processing of the packet in the security hierarchy;

    forwarding the received packet and an indication of its compliance with the first test for subsequent processing upon the received packet complying with the first test; and

    dropping the received packet whereby no further processing of the received packet is performed upon the received packet not complying with the first test.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×