54 |
Titel |
TI |
[DE] Verfahren zur Absicherung von Rechnern mit Anschluss an ein Netzwerk zum Zweck der Kontrolle von Netzwerkverbindungen |
71/73 |
Anmelder/Inhaber |
PA |
Valentin, Torsten, 59199 Bönen, DE
|
72 |
Erfinder |
IN |
Valentin, Torsten, 59199 Bönen, DE
|
22/96 |
Anmeldedatum |
AD |
23.01.2001 |
21 |
Anmeldenummer |
AN |
10102979 |
|
Anmeldeland |
AC |
DE |
|
Veröffentlichungsdatum |
PUB |
30.04.2003 |
33 31 32 |
Priorität |
PRC PRN PRD |
DE
10101321
20010110
|
51 |
IPC-Hauptklasse |
ICM |
H04L 9/32
|
51 |
IPC-Nebenklasse |
ICS |
|
|
IPC-Zusatzklasse |
ICA |
|
|
IPC-Indexklasse |
ICI |
|
|
Gemeinsame Patentklassifikation |
CPC |
H04L 63/101
H04L 63/12
H04L 63/145
|
|
MCD-Hauptklasse |
MCM |
|
|
MCD-Nebenklasse |
MCS |
H04L 29/06
(2006.01)
|
|
MCD-Zusatzklasse |
MCA |
|
57 |
Zusammenfassung |
AB |
[EN] Computers in a computer network are often separated from public networks by firewalls. In the firewall, rules allowing specific communications are implemented. A virus or Trojan horse can disguise itself as a permitted application and use the rules of the firewall to transmit data obtained by its espionage. To prevent the potential transmission of data obtained by the espionage of viruses and Trojan horses, all clients who make requests to a network are identified by the operating system of the computer. Electronic fingerprints of all parts of the programme that are involved in the process are created and then verified in a server. The server determines the authenticity of the checksum and verifies if the client is authorised. This is then transmitted back to the operating system of the computer, which then refuses the client's request, transmits said request to the connected network or transmits the request to the server, the latter in turn making the request to the network. The invention can be used for increasing the security of computer networks. |
56 |
Entgegengehaltene Patentdokumente/Zitate, in Recherche ermittelt |
CT |
DE000010008973A1 EP000000816970A2 US000006085324A WO002001057626A2
|
56 |
Entgegengehaltene Patentdokumente/Zitate, vom Anmelder genannt |
CT |
|
56 |
Entgegengehaltene Nichtpatentliteratur/Zitate, in Recherche ermittelt |
CTNP |
DEVANBU, P. u.a.: Techniques for trusted soft- ware engineering. In: Software Engineering. IEEE Cat.Nr. 98CB36139, 1998, S. 126-135 p 0
|
56 |
Entgegengehaltene Nichtpatentliteratur/Zitate, vom Anmelder genannt |
CTNP |
|
|
Zitierende Dokumente |
|
Dokumente ermitteln
|
|
Sequenzprotokoll |
|
|
|
Prüfstoff-IPC |
ICP |
H04L 9/32
|