×

Methods and systems for network security using a cryptographic firewall

  • US 10,848,313 B2
  • Filed: 09/27/2019
  • Issued: 11/24/2020
  • Est. Priority Date: 01/27/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for accessing network resources protected by a security device, comprising:

  • at a security device having one or more processors and memory storing one or more programs for execution by the one or more processors;

    establishing a network connection with a client system;

    after establishing the network connection, receiving from the client system a first packet, the first packet including;

    an identifier,a first counter value, wherein the first counter value is one of a plurality of incremental counts generated by a system counter, anda first one-time password hash generated by the client system based on the identifier, the first counter value, and a seed;

    based on the identifier received from the client system, retrieving from a trusted data store the seed and a second counter value;

    based on the first counter value being larger than the second counter value;

    generating a second one-time password hash based on the identifier, the first counter value, and the seed;

    determining whether the first one-time password hash and the second one-time password hash match; and

    in accordance with a determination that the first one-time password hash and the second one-time password hash match, granting, to the client system, access to one or more network resources protected by the security device via the network connection,wherein establishing the network connection with the client system comprises;

    prior to receiving the first packet from the client system;

    receiving a SYN packet from the client system;

    based on receiving the SYN packet, sending a SYN-ACK packet to the client system; and

    after sending the SYN-ACK packet, receiving, from the client system, an ACK packet, thereby establishing the network connection and permitting receipt of the first packet from the client system.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×