Circumstantial blocking of incoming network traffic containing code
First Claim
1. A computer-implemented method for circumstantially blocking incoming network traffic containing code, the method comprising the steps of:
- monitoring incoming network traffic of a protocol and being addressed to a target computer, the protocol comprising a transmission protocol, and the incoming network traffic being transmitted using the transmission protocol;
detecting incoming network traffic containing code; and
blocking incoming network traffic containing code from reaching the target computer, responsive to the incoming network traffic being traffic that should never contain code according to the protocol.
2 Assignments
0 Petitions
Accused Products
Abstract
An incoming network traffic manager circumstantially blocks incoming network traffic (103) containing code (107). The incoming network traffic manager (101) monitors (201) incoming network traffic (103) addressed to a target computer (105). The network traffic manager (101) detects (203) incoming network traffic (103) containing code (107). The network manager (101) blocks (205) incoming traffic (103) containing code (107) from reaching the target computer (105), responsive to circumstances being such that it is undesirable to allow incoming traffic (103) containing code (107) to reach the target computer (105).
-
Citations
26 Claims
-
1. A computer-implemented method for circumstantially blocking incoming network traffic containing code, the method comprising the steps of:
-
monitoring incoming network traffic of a protocol and being addressed to a target computer, the protocol comprising a transmission protocol, and the incoming network traffic being transmitted using the transmission protocol; detecting incoming network traffic containing code; and blocking incoming network traffic containing code from reaching the target computer, responsive to the incoming network traffic being traffic that should never contain code according to the protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 22, 24)
-
-
14. A non-transitory computer readable storage medium containing an executable computer program product for circumstantially blocking incoming network traffic containing code, the computer program product comprising:
-
program code for monitoring incoming network traffic of a protocol and being addressed to a target computer, the protocol comprising a transmission protocol, and the incoming network traffic being transmitted using the transmission protocol; program code for detecting incoming network traffic containing code; and program code for blocking incoming network traffic containing code from reaching the target computer, responsive to the incoming network traffic being traffic that should never contain code according to the protocol. - View Dependent Claims (15, 16, 17, 18, 19, 23, 25)
-
-
20. A computer system for circumstantially blocking incoming network traffic containing code, the computer system comprising:
-
a computer processor for executing computer program code; and a computer-readable storage medium storing executable computer program code comprising; a network traffic monitoring module configured to monitor incoming network traffic of a protocol and being addressed to a target computer, the protocol comprising a transmission protocol, and the incoming network traffic being transmitted using the transmission protocol; a code detection module, configured to detect incoming network traffic containing code, the code detection module being communicatively coupled to the network traffic monitoring module; and a code blocking module, configured to block incoming network traffic containing code from reaching the target computer, responsive to the incoming network traffic being traffic that should never contain code according to the protocol, the code blocking module being communicatively coupled to the code detection module. - View Dependent Claims (21, 26)
-
Specification