Data scanning network security technique
First Claim
1. A data security apparatus for use in a computer network for checking data received from an external source, comprising:
- a multiprotocol rule set data scanner capable of scanning the data received for acceptable content and format as determined by a rule set established by a recognized protocol, such that the data is scanned in subdivisions set by the recognized protocol as the data is received;
a data translator for translating the data;
a data network transmitter for transmitting the translated data to a destination node on the computer network;
a mail connection detector for detecting if an external source is attempting to establish a mail connection with the computer network wherein the computer network is receptive to one or more recognized protocols; and
a data receiver for receiving data from the external source.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network'"'"'s mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols. This is done at the same time as the data is received by the data scanning device. It is then determined whether the data should be sent to its destination on the computer network. If necessary, the data is translated before being passed to its destination on the computer network.
44 Citations
12 Claims
-
1. A data security apparatus for use in a computer network for checking data received from an external source, comprising:
-
a multiprotocol rule set data scanner capable of scanning the data received for acceptable content and format as determined by a rule set established by a recognized protocol, such that the data is scanned in subdivisions set by the recognized protocol as the data is received;
a data translator for translating the data;
a data network transmitter for transmitting the translated data to a destination node on the computer network;
a mail connection detector for detecting if an external source is attempting to establish a mail connection with the computer network wherein the computer network is receptive to one or more recognized protocols; and
a data receiver for receiving data from the external source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A data security apparatus for use in a computer network for checking data received from an external source, comprising:
-
means for scanning the data received for acceptable content and format as determined by a rule set established by a recognized protocol, such that the data is scanned in subdivisions set by the recognized protocol as the data is received;
means for translating the data;
means for transmitting the translated data to a destination node on the computer network;
means for detecting if an external source is attempting to establish a mail connection with the computer network wherein the computer network is receptive to one or more recognized protocols; and
means for receiving data from the external source.
-
-
10. A data security apparatus for use in a computer network for checking data received from an external source, comprising:
-
a processor; and
a memory, at least one of the processor and the memory being adapted for;
scanning the data received for acceptable content and format as determined by a rule set established by a recognized protocol, such that the data is scanned in subdivisions set by the recognized protocol as the data is received;
translating the data;
transmitting the translated data to a destination node on the computer network;
detecting if an external source is attempting to establish a mail connection with the computer network wherein the computer network is receptive to one or more recognized protocols; and
receiving data from the external source.
-
-
11. A method for implementing a data security system for use in a computer network for checking data received from an external source, comprising:
-
scanning the data received for acceptable content and format as determined by a rule set established by a recognized protocol, such that the data is scanned in subdivisions set by the recognized protocol as the data is received;
translating the data;
transmitting the translated data to a destination node on the computer network;
detecting if an external source is attempting to establish a mail connection with the computer network wherein the computer network is receptive to one or more recognized protocols; and
receiving data from the external source.
-
-
12. A computer-readable medium storing thereon computer-readable instructions for implementing a data security system for use in a computer network for checking data received from an external source, comprising:
-
instructions for scanning the data received for acceptable content and format as determined by a rule set established by a recognized protocol, such that the data is scanned in subdivisions set by the recognized protocol as the data is received;
instructions for translating the data;
instructions for transmitting the translated data to a destination node on the computer network;
instructions for detecting if an external source is attempting to establish a mail connection with the computer network wherein the computer network is receptive to one or more recognized protocols; and
instructions for receiving data from the external source.
-
Specification