×

System and method for preventing computer malware from exfiltrating data from a user computer in a network via the internet

  • US 8,631,244 B1
  • Filed: 08/11/2011
  • Issued: 01/14/2014
  • Est. Priority Date: 08/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. A system for preventing computer malware from exfiltrating data from a user computer in a network via an internet, comprising:

  • a) a host-based network process monitor operably connected to the user computer configured to intercept network traffic information from said user computer and transmit a network request comprising user and application information including said network traffic information;

    b) an authorization server operably connected to said host-based network process monitor containing a database of users and applications, said authorization server configured to cooperate with said host-based network process monitor for i) verifying whether the user and process in said network request should have network access, and ii) cryptographically signing said intercepted network traffic information with an authorization server key, to authorize network access for said intercepted network traffic information, wherein said authorization server provides said cryptographic signing by a decision making technique, by the process of;

    i) receiving cryptographic signatures of said application and said network traffic information to provide received cryptographic signature and network traffic information;

    ii) identifying a user authentication or host machine authentication of said received network traffic information and said received cryptographic signature to provide identified intercepted network traffic information and cryptographic signature of said application;

    iii) computing a cryptographic signature of said identified traffic information including user authentication to provide computed cryptographic hash of said identified traffic information; and

    ,iv) comparing said computed cryptographic signature of said intercepted network traffic information and said cryptographic signature of said application against a whitelist and/or a blacklist database or comparing intercepted network information against a whitelist or backlist database to provide compared computed cryptographic signature of said identified intercepted information and said cryptographic signature of said application; and

    v) digitally signing the received network traffic information only if said compared computed network information and compared computed cryptographic signature are contained in said database whitelist, and not contained in said blacklist; and

    ,c) a firewall system operably connected to said user computer and said authorization server, configured to inspect said intercepted network traffic information from said user computer and reject any traffic information not signed with said authorization server key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×