1
William E Boebert, Thomas R Markham, Robert A Olmsted: Data enclave and trusted path system. Secure Computing Corporation, Merchant Gould Smith Edell Welter and Schmidt, January 4, 1994: US05276735 (385 worldwide citation)

A data communication system providing for the secure transfer and sharing of data via a local area network and/or a wide area network. The system includes a secure processing unit which communicates with a personal keying device and a crypto media controller attached to a user's Workstation. The com ...


2
Irving Reid, Spencer Minear: System and method for controlling interactions between networks. Secure Computing Corporation, Schwegman Lundberg Woessner & Kluth P A, January 30, 2001: US06182226 (366 worldwide citation)

A firewall is used to achieve network separation within a computing system having a plurality of network interfaces. A plurality of regions is defined within the firewall and a set of policies is configured for each of the plurality of regions. The firewall restricts communication to and from each o ...


3
Edward B Stockwell, Paula Budig Greve: System and method of electronic mail filtering using interconnected nodes. Secure Computing Corporation, Schwegman Lundberg Woessner & Kluth P A, June 6, 2000: US06072942 (298 worldwide citation)

A system and method for filtering electronic mail messages is described. A message is received an processed through a one or more filter flows. Each filter flow is comprised of one or more self-contained nodes which can be combined in whatever order is required to enforce a given security policy. No ...


4
Spence Minear, Edward B Stockwell, Troy de Jongh: Secure firewall supporting different levels of authentication based on address or encryption status. Secure Computing Corporation, Schwegman Lundberg Woessner & Kluth P A, November 9, 1999: US05983350 (280 worldwide citation)

A system and method for regulating the flow of messages through a firewall having a network protocol stack, wherein the network protocol stack includes an Internet Protocol (IP) layer, the method comprising establishing a security policy, determining, at the IP layer, if a message is encrypted, if t ...


5
Edward B Stockwell, Alan E Klietz: Generalized security policy management system and method. Secure Computing Corporation, Schwegman Lundberg Woessner & Kluth P A, September 7, 1999: US05950195 (267 worldwide citation)

A system and method for regulating the flow of internetwork connections through a firewall having a network protocol stack which includes an Internet Protocol (IP) layer. A determination is made of the parameters characteristic of a connection request, including a netelement parameter characteristic ...


6
William E Boebert, Thomas R Markham, Robert A Olmsted: Data enclave and trusted path system. Secure Computing Corporation, Schwegman Lundberg & Woessner, March 26, 1996: US05502766 (265 worldwide citation)

A data communication system providing for the secure transfer and sharing of data via a local area network and/or a wide area network. The system includes a secure processing unit which communicates with a personal keying device and a crypto media controller attached to a user's Workstation. The com ...


7
Richard R Viets, David G Motes, Paula Budig Greve, Wayne W Herberg: System and method for controlling access to documents stored on an internal network. Secure Computing Corporation, Schwegman Lundberg Woesnner & Kluth P A, March 12, 2002: US06357010 (210 worldwide citation)

A system and method of limiting access from an external network to documents stored on an internal network. A client list is built in which each client is assigned to one or more roles. Each role has access to one or more documents as defined on a document list. A request from an external network is ...


8
Michael W Green, Ricky Ronald Kruse: Secure network proxy for connecting entities. Secure Computing Corporation, Schwegman Lundberg Woessner and Kluth, December 14, 1999: US06003084 (193 worldwide citation)

A proxy which is part of a firewall program controls exchanges of information between two application entities. The proxy interrogates attempts to establish a communication session by requesting entities with a server entity in lower layers in accordance with defined authentication procedures. The p ...


9
John Applegate, Jeff Romatoski: System and method for redirecting network traffic to provide secure communication. Secure Computing Corporation, Schwegman Lundberg Woessner & Kluth P A, November 20, 2001: US06321336 (172 worldwide citation)

A communication security system is described which uses a server to communicate to an unprotected network, such as the Internet. The system intercepts an IP packet prior to stack incursion and replaces the destination address with that of a firewall's network interface address. Because of the m ...


10
Paul Judge: Systems and methods for upstream threat pushback. Secure Computing Corporation, Fish & Richardson P C, May 1, 2007: US07213260 (152 worldwide citation)

The present invention is directed to systems and methods for detecting and preventing the delivery of unsolicited communications. A communication transmitted over a communications network is received and analyzed by a system processor. The system processor can extract attributes from the communicati ...



Click the thumbnails below to visualize the patent trend.