ApplicationNo. 09/457494 filed on 12/08/1999
US Classes:379/189, Fraud or improper use mitigating or indication (e.g., "blue box", "black box")379/145, Fraud or interference prevention379/196, At switching center707/9, Privileged access709/225, Computer network access regulating726/11Firewall
ExaminersPrimary: Tsang, Fan
Assistant: Bui, Bing Q.
Attorney, Agent or Firm
International ClassesH04M 3/38 (20060101)
H04L 29/06 (20060101)
H04M 3/22 (20060101)
H04M 3/436 (20060101)
H04M 3/42 (20060101)
H04M 003/00 ()
AbstractA system and method for implementing a fully integrated and cooperative telecommunications firewall/scanner that can be deployed either as a standalone device, or over a large-scale distributed client-server architecture is described. In addition to providing enhanced telecommunications firewall and scanner security capabilities, the integrated telecommunications firewall/scanner provides the capability to ensure implementation of a corporate-dictated security structure, and event visibility and report consolidation requirements, across a globally-distributed enterprise, using policy-based enforcement of a Security Policy. In the most basic configuration, the integrated firewall/scanner performs continuous security access monitoring and control functions, keyword and content monitoring and control functions, and remote access authentication, initiating coordinated vulnerability assessments, as well as automatic synchronous adjustments to the Security Policy in response to the vulnerability assessment results. Additionally, firewall and scanner actions, assessment results, and responses can be consolidated in detailed or summary reports for use by security administrators for trend analysis and security posture decision-making. The same Security Policy is used by both the firewall and the scanner components of the integrated firewall/scanner during both their cooperative and independent operations.