×

Method and apparatus for identifying trusted sources based on access point

  • US 8,051,474 B1
  • Filed: 09/26/2006
  • Issued: 11/01/2011
  • Est. Priority Date: 09/26/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for distinguishing sources of data, comprising:

  • defining a first set of reserved port addresses on a firewall computer;

    mapping, by the firewall computer, data comprising a first communication received at a first interface to one of the first set of reserved port addresses;

    mapping, by the firewall computer, data comprising a second communication received at a second interface to a port address not included in the first set of reserved port addresses;

    based on the mapping of the first communication to one of the first set of reserved port addresses, applying, by the firewall computer, a first type of security measures with respect to the first communication, wherein the first type of security measures are a first level of verification and authentication;

    determining that the first interface is interconnected to a trusted data source;

    in response to the determining that the first interface is interconnected to the trusted data source, establishing a rule that communications received at the first interface that are not addressed to one of the first set of reserved port addresses are mapped to one of the first set of reserved port addresses;

    based on the mapping of the second communication to a port address not included in the first set of reserved port addresses, applying, by the firewall computer, a second type of security measures with respect to the second communication received at the second interface, wherein the second type of security measures are a second level of verification and authentication, wherein the security measures of the first type are a lower level of verification and authentication than the security measures of the second type;

    determining that the second interface is interconnected to a data source that is not trusted;

    in response to the determining that the second interface is interconnected to the data source that is not trusted, establishing a rule that communications received at the second interface that are not addressed to one of the reserved port addresses are not mapped to one of the reserved port addresses.

View all claims
  • 23 Assignments
Timeline View
Assignment View
    ×
    ×