The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 16, 2015

Filed:

Feb. 22, 2012
Applicants:

Mark A. Bortz, Robins, IA (US);

James N. Potts, Cedar Rapids, IA (US);

Gregory W. Rice, Cedar Rapids, IA (US);

Karl F. Hoech, Cedar Rapids, IA (US);

Inventors:

Mark A. Bortz, Robins, IA (US);

James N. Potts, Cedar Rapids, IA (US);

Gregory W. Rice, Cedar Rapids, IA (US);

Karl F. Hoech, Cedar Rapids, IA (US);

Assignee:

Rockwell Collins, Inc., Cedar Rapids, IA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/32 (2006.01); H04L 29/12 (2006.01); G06F 21/00 (2013.01);
U.S. Cl.
CPC ...
H04L 9/32 (2013.01); H04L 29/06 (2013.01); H04L 61/203 (2013.01); G06F 21/00 (2013.01);
Abstract

A system for preventing a computing device from obtaining unauthorized access to a secure network includes a client agent operably connected to the computing device configured to intercept network traffic information from applications running on the computing device and transmit a network request including application information and the network traffic information. A network token broker operably connected to the network client agent contains a database of application information. The network token broker is configured to cooperate with the network client agent for i) verifying whether the network request should be granted access to the secure network, and ii) cryptographically signing the intercepted network traffic information with a network authorization token, to authorize network access for the intercepted network traffic information. A guard system is configured to inspect the network traffic information from the computing device and reject any traffic information not signed with the network authorization token.


Find Patent Forward Citations

Loading…