Main content

Bibliographic data

Document DE000010102979C2 (Pages: 8)

Bibliographic data Document DE000010102979C2 (Pages: 8)
INID Criterion Field Contents
54 Title TI [DE] Verfahren zur Absicherung von Rechnern mit Anschluss an ein Netzwerk zum Zweck der Kontrolle von Netzwerkverbindungen
71/73 Applicant/owner PA Valentin, Torsten, 59199 Bönen, DE
72 Inventor IN Valentin, Torsten, 59199 Bönen, DE
22/96 Application date AD Jan 23, 2001
21 Application number AN 10102979
Country of application AC DE
Publication date PUB Apr 30, 2003
33
31
32
Priority data PRC
PRN
PRD
DE
10101321
20010110
51 IPC main class ICM H04L 9/32
51 IPC secondary class ICS
IPC additional class ICA
IPC index class ICI
Cooperative patent classification CPC H04L 63/101
H04L 63/12
H04L 63/145
MCD main class MCM
MCD secondary class MCS H04L 29/06 (2006.01)
MCD additional class MCA
57 Abstract AB [EN] Computers in a computer network are often separated from public networks by firewalls. In the firewall, rules allowing specific communications are implemented. A virus or Trojan horse can disguise itself as a permitted application and use the rules of the firewall to transmit data obtained by its espionage. To prevent the potential transmission of data obtained by the espionage of viruses and Trojan horses, all clients who make requests to a network are identified by the operating system of the computer. Electronic fingerprints of all parts of the programme that are involved in the process are created and then verified in a server. The server determines the authenticity of the checksum and verifies if the client is authorised. This is then transmitted back to the operating system of the computer, which then refuses the client's request, transmits said request to the connected network or transmits the request to the server, the latter in turn making the request to the network. The invention can be used for increasing the security of computer networks.
56 Cited documents identified in the search CT DE000010008973A1
EP000000816970A2
US000006085324A
WO002001057626A2
56 Cited documents indicated by the applicant CT
56 Cited non-patent literature identified in the search CTNP DEVANBU, P. u.a.: Techniques for trusted soft- ware engineering. In: Software Engineering. IEEE Cat.Nr. 98CB36139, 1998, S. 126-135 p 0
56 Cited non-patent literature indicated by the applicant CTNP
Citing documents Determine documents
Sequence listings
Search file IPC ICP H04L 9/32