Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods of operating portable computerized device with network security

a computerized device and network security technology, applied in digital transmission, wireless communication, instruments, etc., can solve problems such as host not being able to handle video data, access may be denied, and limited vslan to users on a local area network

Inactive Publication Date: 2007-10-25
ROUND ROCK RES LLC
View PDF26 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention provides a network security apparatus and method for ensuring security policy enforcement, controlled communication release, controlled communication flow, and secure session protocols through each computer unit interface. The invention includes a secure network interface unit (SNIU) that can be placed between two networks, providing a global security perimeter for end-to-end communications. The SNIU is capable of communicating with other like SNIU devices creating a secure network. The invention allows for a separation of the host / network interface from the rest of the software, ensuring the underlying security of the system as a whole. The SNIU contains an association and session manager to handle host computer and peer SNIU identification, audit, and maintenance of sealer keys. The software SNIU is also contained within a communications stack of a portable computer device operating at a user layer communications protocol."

Problems solved by technology

For instance, a host might not be able to handle video data, and, therefore, the separation function would prevent the host from receiving video data.
For instance, access may be denied if the user is not identified as an authorized participant on a particular project.
VSLAN is limited to users on a local area network (LAN) as is the Boeing MLS Lan.
However, these protocols lack user accountability since they do not identify which user of the host is using the network, nor are they capable of preventing certain users from accessing the network.
Such computer devices often include valuable information, which may be lost or stolen due to these computers being accessed through the non-secured network.
A problem with the above described products is that none are based upon the use of highly trusted software.
Veil is an off-line encryption utility, which cannot prevent the inadvertent release of non-encrypted information.
While Raptor Eagle and Raptor Remote are based on software instantiations and thus cannot be verified at the same level of assurance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods of operating portable computerized device with network security
  • Methods of operating portable computerized device with network security
  • Methods of operating portable computerized device with network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention is directed to a secure network interface unit (SNIU), which is utilized to control communications between a user such as a computer host and a network. The SNIU intercepts Internet Protocol (IP) datagrams as they are transmitted between the user and the network. The SNIU determines whether each datagram from the user is releasable to the network and if and how it should be encrypted. The SNIU decrypts each datagram from the network and determines whether it is releasable to the user. When a SNIU releases a datagram from a lower classification user or network to a higher classification user or network (i.e., a write up), the datagram is used to predict the expected response. When a datagram is received from the higher classification user or network, the SNIU compares the datagram to the response which was predicted during the write up and, only if they match, releases it (i.e., allows the write down) to the lower classification user or network. The SNIU ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A multi-level network security system is disclosed for a computer host device coupled to at least one computer network. The system including a secure network interface Unit (SNIU) contained within a communications stack of the computer device that operates at a user layer communications protocol. The SNIU communicates with other like SNIU devices on the network by establishing an association, thereby creating a global security perimeter for end-to-end communications and wherein the network may be individually secure or non-secure without compromising security of communications within the global security perimeter. The SNIU includes a host / network interface for receiving messages sent between the computer device and network. The interface operative to convert the received messages to and from a format utilized by the network. A message parser for determining whether the association already exists with another SNIU device. A session manager coupled to said network interface for identifying and verifying the computer device requesting access to said network. The session manager also for transmitting messages received from the computer device when the message parser determines the association already exists. An association manager coupled to the host / network interface for establishing an association with other like SNIU devices when the message parser determines the association does not exist.

Description

RELATED APPLICATIONS [0001] The present application is a continuation of U.S. patent application Ser. No. 09 / 924,214, filed on Aug. 7, 2001, now U.S. Pat. No. 6,760,768, issued on Jul. 6, 2004, which is a continuation of U.S. patent application Ser. No. 09 / 127,280, filed on Jul. 31, 1998, now U.S. Pat. No. 6,272,538, issued on Aug. 7, 2001, which is a continuation-in-part of U.S. application Ser. No. 08 / 688,543, filed Jul. 30, 1996, now U.S. Pat. No. 5,832,228, issued on Nov. 3, 1998; and related to U.S. Pat. No. 5,577,209, entitled APPARATUS AND METHOD FOR PROVIDING MULTI-LEVEL SECURITY FOR COMMUNICATION AMONG COMPUTERS AND TERMINALS ON A NETWORK, issued to Boyle et al., Nov. 19, 1996. These references are hereby incorporated herein by reference in their entireties.BACKGROUND OF THE INVENTION [0002] 1. Field of the Invention [0003] The present invention relates in general to secure and multi-level secure (MLS) networks and in particular to a system and method for providing security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00G06F1/00H04L29/06
CPCG06F21/31H04L2209/76G06F21/85G06F2211/001G06F2211/005G06F2211/007G06F2211/009G06F2221/2101G06F2221/2107G06F2221/2113G06F2221/2141G06F2221/2149G06F2221/2153H04L29/06H04L63/02H04L63/0218H04L63/0442H04L63/061H04L63/0869H04L63/101H04L63/105H04L63/126H04L63/14H04W12/06H04L9/3247H04L9/3268H04L9/3273G06F21/606H04L67/141H04W12/069H04L67/563H04L9/40
Inventor HOLDEN, JAMESLEVIN, STEPHENNICKEL, JAMESWRENCH, EDWIN
Owner ROUND ROCK RES LLC