54 |
Title |
TI |
[DE] Verfahren zur Absicherung von Rechnern mit Anschluss an ein Netzwerk zum Zweck der Kontrolle von Netzwerkverbindungen |
71/73 |
Applicant/owner |
PA |
Valentin, Torsten, 59199 Bönen, DE
|
72 |
Inventor |
IN |
Valentin, Torsten, 59199 Bönen, DE
|
22/96 |
Application date |
AD |
Jan 23, 2001 |
21 |
Application number |
AN |
10102979 |
|
Country of application |
AC |
DE |
|
Publication date |
PUB |
Apr 30, 2003 |
33 31 32 |
Priority data |
PRC PRN PRD |
DE
10101321
20010110
|
51 |
IPC main class |
ICM |
H04L 9/32
|
51 |
IPC secondary class |
ICS |
|
|
IPC additional class |
ICA |
|
|
IPC index class |
ICI |
|
|
Cooperative patent classification |
CPC |
H04L 63/101
H04L 63/12
H04L 63/145
|
|
MCD main class |
MCM |
|
|
MCD secondary class |
MCS |
H04L 29/06
(2006.01)
|
|
MCD additional class |
MCA |
|
57 |
Abstract |
AB |
[EN] Computers in a computer network are often separated from public networks by firewalls. In the firewall, rules allowing specific communications are implemented. A virus or Trojan horse can disguise itself as a permitted application and use the rules of the firewall to transmit data obtained by its espionage. To prevent the potential transmission of data obtained by the espionage of viruses and Trojan horses, all clients who make requests to a network are identified by the operating system of the computer. Electronic fingerprints of all parts of the programme that are involved in the process are created and then verified in a server. The server determines the authenticity of the checksum and verifies if the client is authorised. This is then transmitted back to the operating system of the computer, which then refuses the client's request, transmits said request to the connected network or transmits the request to the server, the latter in turn making the request to the network. The invention can be used for increasing the security of computer networks. |
56 |
Cited documents identified in the search |
CT |
DE000010008973A1 EP000000816970A2 US000006085324A WO002001057626A2
|
56 |
Cited documents indicated by the applicant |
CT |
|
56 |
Cited non-patent literature identified in the search |
CTNP |
DEVANBU, P. u.a.: Techniques for trusted soft- ware engineering. In: Software Engineering. IEEE Cat.Nr. 98CB36139, 1998, S. 126-135 p 0
|
56 |
Cited non-patent literature indicated by the applicant |
CTNP |
|
|
Citing documents |
|
Determine documents
|
|
Sequence listings |
|
|
|
Search file IPC |
ICP |
H04L 9/32
|