×

System and method for preventing a computing device from obtaining unauthorized access to a secure network or trusted computing environment

  • US 9,059,853 B1
  • Filed: 02/22/2012
  • Issued: 06/16/2015
  • Est. Priority Date: 02/22/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system for preventing a computing device from obtaining unauthorized access to a secure network, comprising:

  • a) a network client agent operably connected to a computing device configured to intercept network traffic information from applications running on said computing device and transmit a network request comprising application information and said network traffic information;

    b) a network token broker operably connected to said network client agent and containing a database of application information, said network token broker configured to receive said network request and cooperate with said network client agent for i) verifying whether said network request should be granted access to said secure network, and ii) generating a network authorization token by cryptographically signing the intercepted network traffic information to provide a cryptographic signature, to authorize network access for said intercepted network traffic information, wherein said network authorization token is returned to said network client agent, said network client agent attaching the network authorization token to the network traffic information; and

    ,c) a guard system operably connected to said computing device, configured to receive said network traffic information and the attached network authorization token, and to inspect said network traffic information from said network client agent on said computing device and reject any traffic information not signed with said network authorization token, wherein said guard system is configured to provide inspection of said network traffic information by the process of;

    i) receiving said network request and said network authorization token;

    ii) testing the validity of said network authorization token to provide a validated said network request;

    iii) stripping said network authorization token to restore said network request to provide original state prior to interception by said network client agent, andiv) forwarding said intercepted network traffic information to a secure network destination only if said network authorization token is valid.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×