METHOD AND DEVICE FOR GAINING ACCESS TO COMPUTER RESOURCES THROUGH FIRE WALL Russian patent published in 2002 - IPC

Abstract RU 2178583 C2

FIELD: protective means such as fire walls isolating computer and network resources residing behind fire walls from networks, computers, and application programs beyond the latter. SUBSTANCE: internal resources are usually private data bases and local computer networks; peripheral objects are users and computer application programs operating in public communication networks such as Internet. Fire wall usually enables internal users and objects to establish communication with peripheral objects or networks but makes it impossible to do so in reverse direction, that is, from outside. Novelty is introduction of tunneling system enabling communication either side of fire wall from outside upon request for said communication from authorized persons, users, objects, or computer application programs residing beyond fire wall. Provision is made for minimizing number of resources engaged in establishing such tunnel connections (that is, communications through fire wall upon request of peripherals) and for minimizing risk of unauthorized intervention through fire wall. Method and device use application programs executed by means of interface servers mounted behind and beyond fire wall; they also use special table of authorized sockets whose generation and operation is conducted by internal application program for tunneling. Items of said table of authorized sockets determine objects residing behind fire wall and identify special internal port, data transmission protocol used for each port, and host object coupled with each port. EFFECT: provision for establishing communications either side of fire wall on request of authorized objects or users. 6 cl, 6 dwg

Similar patents RU2178583C2

Title Year Author Number
ARCHITECTURAL MODE CONFIGURATION IN COMPUTING SYSTEM 2015
  • Gshvind Mikhael Karl
RU2664413C2
METHOD AND DEVICE FOR CONFIDENTIAL IDENTIFICATION OF MOBILE USER IN COMMUNICATION NETWORK 1994
  • Tsudik Dzhin
RU2150790C1
METHOD AND DEVICE FOR CONNECTION OF WIRELESS LAN TO WIRED LAN 1995
  • Rodzher I.M.Cheung
  • Piter I.Rejssner
  • Dehnni N.Makkej
RU2121762C1
METHOD FOR HIGH SPEED CONTROL OVER BLOCKS FOR INSTANT COPYING IN DATA STORAGE SYSTEMS WITH JOINT USAGE OF MEMORY BY N UNITS 2003
  • F'Junt Karlos Fransisko
  • Skejles Uill'Jam Dzhejms
RU2297662C2
DIRECT-ACCESS STORAGE DEVICE, WHICH CAPACITY IS GREATER THAN 528 MB, AND METHOD FOR ITS EMBODIMENT IN PERSONAL COMPUTERS 1994
  • Dehniehl Dzhejms Kolgrouv
RU2155369C2
TRANSFORMATION OF INSTRUCTION DISCRETE IDENTIFIERS INTO CONTINUOUS INSTRUCTION IDENTIFIERS 2012
  • Majkl Karl Gshvind
RU2568241C2
VECTOR TYPE COMMAND AT FIELD OF GALOIS MULTIPLICATION, ADDITION AND ACCUMULATION 2014
  • Bredberi Dzhonatan Dejvid
RU2613726C2
SYSTEM FOR TRANSMITTING DATA STREAM OVER DATA TRANSMISSION NETWORKS 1995
  • Ljudger Shefers
RU2121761C1
LOAD BALANCING USING SERVER COMPUTER PROCESSORS 1996
  • Ehndrju Dzhejms Stehnford-Klark
  • Sin Dzhejms Martin
RU2156546C2
METHOD OF PERFORMANCE OF READING OPERATION IN MULTIPROCESSOR COMPUTER SYSTEM 1998
  • Arimilli Ravi Kumar
  • Dodson Dzhon Stiven
  • Kejzer Dzhon Majkl
  • Luis Dzherri Don
RU2183850C2

RU 2 178 583 C2

Authors

Jade Prashant

Mor Viktor Stjuart

Rao Arun Mokhan

Uolters Glen Robert

Dates

2002-01-20Published

1997-10-02Filed