×

Method and apparatus to secure a computing environment

  • US 7,797,752 B1
  • Filed: 12/17/2003
  • Issued: 09/14/2010
  • Est. Priority Date: 12/17/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A surround security system embodied on a tangible and non-transitory computer readable storage medium including instructions executable by a processor associated with a computer system, the surround security system comprising:

  • a packet enforcement engine to screen packets, using at least one of a plurality of packet enforcement evaluators comprising a network firewall, a network intrusion detection system, a packet filter, and a session monitor, to and from a network and a TCP/IP stack of the computer system and to transmit acceptable packets to and from the network and the TCP/IP stack;

    an application enforcement engine to screen packets, using at least one of a plurality of application enforcement evaluators comprising an application firewall, an application intrusion detection system, a content filter, and a URL blocking engine, to and from the TCP/IP stack and an applications programming interface on the computer system and to transmit acceptable packets to and from the TCP/IP stack and applications;

    a smart packet forwarder integrally coupled with both the packet enforcement engine and the application enforcement engine to forward only the acceptable packets through the TCP/IP stack to the application programming interface or network;

    wherein the smart packet forwarder is configured to determine which of the plurality of packet enforcement evaluators and application enforcement evaluators should evaluate a packet;

    the plurality of packet enforcement evaluators and application enforcement evaluators evaluate the packet and discard the packet if the packet meets certain criteria;

    an application controller integrally coupled to the smart packet forwarder to prohibit certain applications from running based on the results of the packets screened by the packet enforcement engine and the application enforcement engine;

    a file monitor to verify integrity of operating system files on the computer system; and

    a vulnerability scanner to ensure that, the operating system installed on the computer system complies with a set level of security;

    the surround security system providing security which protects accesses through the TCP/IP stack for applications, and operating system of the computer system;

    wherein the packet enforcement engine, application enforcement engine, file monitor and vulnerability scanner are configured to operate at one or more layers below an applications layer of the computer system.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×