×

Methods, systems, and computer program products for automatically configuring firewalls

  • US 7,877,795 B2
  • Filed: 10/30/2006
  • Issued: 01/25/2011
  • Est. Priority Date: 10/30/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of automatically configuring a firewall, the method comprising:

  • automatically detecting an attempt by a software application executing on a user device to communicate through the firewall, wherein the firewall has blocked the communication attempt;

    automatically collecting information about the attempt detected;

    automatically assessing a danger level of allowing the software application to communicate through the firewall based upon the information collected, comprising determining at least one of the following;

    whether the software application is attempting to communicate sensitive and private data from the user device, whether the software application is using a stealth communication method, whether the software application is executing at a root directory level of the user device, whether the software application is executing at an administrator level directory of the user device, whether the software application is attempting to access sensitive memory portions of the user device, whether the software application is attempting to access hard drive portions of the user device including sensitive directories, whether the software application is attempting to execute at a highly privileged operator level of the user device, and whether the software application is attempting to communicate with a suspicious web site; and

    automatically reconfiguring the firewall to allow the software application to communicate through the firewall if the assessed danger level is below a threshold danger level, wherein the threshold danger level is variable and further comprising increasing the threshold danger level as a number of blocked software application communication attempts increases, and decreasing the threshold danger level as the number of blocked software application communication attempts decreases.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×