Network adapter firewall system and method
First Claim
Patent Images
1. A network adapter, comprising:
- a plurality of designated trusted and untrusted ports; and
a processor provisioned in the network adapter, configured for providing firewall capabilities, and coupled within a computer, the network adapter coupled to a network via the ports, wherein network traffic from the trusted ports bypasses the processor, wherein the network adapter processor is configured for;
assembling the network traffic into packets, wherein a subset of the packets greater than a threshold for a maximum size of packets are stored in random access memory of the computer;
performing an initial determination whether certain assembled incoming packets are of interest for screening activities based on, at least, determining a source of the certain assembled incoming packets, a protocol of the certain assembled incoming packets, a timing of the certain assembled incoming packets and content within the certain assembled incoming packets;
determining whether the certain assembled incoming packets of interest violate a plurality of predetermined rules for packet transmissions;
denying access to certain areas of the computer based on a violation of the predetermined rules, wherein the violation is associated with remote access to the computer using an authentication certificate;
granting access to the certain areas of the computer if no violation occurs; and
communicating an alert that signals the violation, wherein the alert is provided using an indicator on the network adapter and the alert includes a plurality of options for addressing the violation.
11 Assignments
0 Petitions
Accused Products
Abstract
A network adapter system and associated method are provided. Included is a network adapter having a plurality of designated trusted and untrusted ports. The network adapter includes a processor coupled to a computer. Such processor is further coupled to a network via the ports. In use, the processor is configured for conditionally preventing network traffic from accessing the computer from the network via the untrusted ports and/or preventing unauthorized software from accessing the network in an untrusted manner from the computer.
-
Citations
14 Claims
-
1. A network adapter, comprising:
-
a plurality of designated trusted and untrusted ports; and a processor provisioned in the network adapter, configured for providing firewall capabilities, and coupled within a computer, the network adapter coupled to a network via the ports, wherein network traffic from the trusted ports bypasses the processor, wherein the network adapter processor is configured for; assembling the network traffic into packets, wherein a subset of the packets greater than a threshold for a maximum size of packets are stored in random access memory of the computer; performing an initial determination whether certain assembled incoming packets are of interest for screening activities based on, at least, determining a source of the certain assembled incoming packets, a protocol of the certain assembled incoming packets, a timing of the certain assembled incoming packets and content within the certain assembled incoming packets; determining whether the certain assembled incoming packets of interest violate a plurality of predetermined rules for packet transmissions; denying access to certain areas of the computer based on a violation of the predetermined rules, wherein the violation is associated with remote access to the computer using an authentication certificate; granting access to the certain areas of the computer if no violation occurs; and communicating an alert that signals the violation, wherein the alert is provided using an indicator on the network adapter and the alert includes a plurality of options for addressing the violation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification