Method and system for detecting a communication problem in a...

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C726S034000, C713S189000, C709S224000, C709S229000, C709S238000

Reexamination Certificate

active

08001605

ABSTRACT:
A computer in a network runs a verification procedure in which it sends data packets to another computer in the network. Some or all of the data packets contain, either individually or collectively, a secret piece of information, such as a secret code. The computer then makes a determination regarding the network links between it and the other computer. If, for example, the other computer is able to respond by providing the secret piece of information back, then the computer sending the data packets concludes that the devices along the network links en route to the other computer are properly forwarding data packets.

REFERENCES:
patent: 5473691 (1995-12-01), Menezes et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5778065 (1998-07-01), Hauser et al.
patent: 5850449 (1998-12-01), McManis
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 6021403 (2000-02-01), Horvitz et al.
patent: 6151679 (2000-11-01), Friedman et al.
patent: 6233570 (2001-05-01), Horvitz et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6363056 (2002-03-01), Beigi et al.
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6418472 (2002-07-01), Mi et al.
patent: 6425004 (2002-07-01), Hardjono
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6484203 (2002-11-01), Porras et al.
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 6538997 (2003-03-01), Wang et al.
patent: 6539479 (2003-03-01), Wu
patent: 6654882 (2003-11-01), Froutan et al.
patent: 6996712 (2006-02-01), Perlman et al.
patent: 6996843 (2006-02-01), Moran
patent: 7017186 (2006-03-01), Day
patent: 7089428 (2006-08-01), Farley et al.
patent: 7096359 (2006-08-01), Agrawal et al.
patent: 7134141 (2006-11-01), Crosbie et al.
patent: 7246238 (2007-07-01), Mullen et al.
patent: 7590855 (2009-09-01), Irwin
patent: 2002/0035628 (2002-03-01), Gil et al.
patent: 2003/0018908 (2003-01-01), Mercer et al.
patent: 2003/0028803 (2003-02-01), Bunker et al.
patent: 2003/0033403 (2003-02-01), Rhodes
patent: 2003/0051026 (2003-03-01), Carter et al.
patent: 2003/0055962 (2003-03-01), Freund et al.
patent: 2003/0074357 (2003-04-01), Nielsen et al.
patent: 2003/0163569 (2003-08-01), Panasyuk et al.
patent: 2003/0163729 (2003-08-01), Buchegger
patent: 2003/0188189 (2003-10-01), Desai et al.
patent: 2004/0049585 (2004-03-01), Swander
patent: 2004/0054807 (2004-03-01), Harvey et al.
patent: 2004/0064725 (2004-04-01), Padmanabhan et al.
Padmanabhan et al., “Secure Traceroute to Detect Faulty or Malicious Routing”, ACM SIGCOMM Computer Communications Review, vol. 33, No. 1, Jan. 2003, pp. 77-82.
Mahajan, Ratual, et al., “Understanding BGP Misconfiquration”, in proceedings of SIGCOMM'02, Aug. 19-23, 2002, Pittsburgh, Pennsylvania (14 pages).
Mahajan, Ratual et al., “Towards operator fault-tolerant inter-domain routing”, Slide presentation, University of Washington, (15 pages), 2002.
Anderson, Tom, et al., “Enforceable Network Protocols”, Slide Presentation, DARPA FTN PI Meet, Jan. 16, 2002 (10 pages).
Mahajan, Ratual et al., “A study of BGP Misconfiquration”Slide presentation, University of Washington, (27 pages).
Mahajan, Ratul, et al., “A Study of BGP Origin as Changes and Partial Connectivity”, Slide Presentation, University of Washington, AstaNetworks, (ritual@cs.washington.edu) (22 pages), Oct. 2001.
Wetgerall, David, et al., “BGP: A Surprisingly Robust Distributed System”, Slide presentation, 2001 (6 pages).
Dwork, Cynthia, et al., “Pricing via Processing or Combatting Junk Mail”, In Ernest F. Brickell, editor,Advances in Cryptology '92, vol. 740 of Lecture Notes in Computer Science, Aug. 16-20, 1992, (11 pages).
Ellison, C., et al., “SPKI Certificate Theory”, Network Working Group RFC 2693, Internet Society 1999, (pp. 1-34).
Seo et al.,Public-Key Infrastructure for the Secure Border Gateway Protocol(S-BGP), Jun. 2001.
Kent et al.,Secure Border Gateway Protocol(Secure-BGP), Journal on Selected Areas in Communication, 18:4 pp. 582-592 (Apr. 2000).
Wang, et al.Tracing Based Active IntrusionResponse, North Carolina State University, University of California Davis, http://arqos.csc.ncsu.edu/papers/2001-09-sleepytracing-jiw.pdf, pp. 1-11, 2001.
Mankin et al.,On Design and Evaluation of “Intention-Driven” ICMP Traceback, Proceedings of the IEEE International Conference on Computer Communications and Networks, pp. 1-16 (Oct. 2001).
Mansfield, et al.,Towards trapping wily intruders in the large, Elsevier Science, Computer Networks 34 pp. 659-670 (2000).
Chang et al.,Dec1DUonS: DecentralizedSourceIdentification for Network-Based Intrusions, Communications Society Press, pp. 701-714 Ma 1999.
Norton,Peter Norton's Complete Guide to Networking, pp. 406-407 (Oct. 1999).
Decentralized Source Identification for Network-Based Intrusions, www.proiects.anr.mcnc.org Deciduous, pp. 1-2 (2002).
Backtracking Spoofed Packets, www.csm.ornl.gov pp. 1-3 (2002).
Hu, Yih-Chun, et al., “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks”,IEEEWMCSA 2002, Jun. 2002, (11 pages).
Hubaux, Jean-Pierre, et al., “The Quest for Security in Mobile Ad Hoc Networks”, in proceedings of theACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHOC 2001), (10 pages).
Juels, Ari, et al., “Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks”,NDSS'99 (Networks and Distributed Security Systems), Feb. 1999 (15 pages).
Kent, S., et al., “Security Architecture for the Internet Protocol” Network Working Group,RFC 2401, Internet Society 1998, (pp. 1-51).
Kent, S., et al., “Secure Border Gateway Protocol (S-BGP)—Real World Performances RFC 2401, Internet Society 1998, (pp. 1-51) and Deployment Issues”,IEEE Journal on SelectedAreasIn Communications,vol. 18., No. 4, Apr. 2000, (14 pages).
Marti, Sergio, et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”,ACMMobicom 2000, Aug. 2000, ( 11 pages).
Perlman, Radia, “Network Layer Protocols with Byzantine Robustness”, Ph.D. Thesis,Department of Electrical Engineering and Computer Science, MIT, Aug. 1988, (120 pages) (Best Copy Available).
Savage, Stefan, et al., “Practical Network Support for IP Traceback”,ACMSIGCOMM 2000, Aug. 2000, (12 pages).
Shamir, Adi, “How to Share a Secret”,Communications of the ACM, 22:612-613, 1979.
Smith, Bradley, R., et al., “Securing the Borders Gateway Routing Protocol”,Global Internet1996, Nov. 1996 (5 pages).
Syverson, P.F., et al., “Towards an Analysis of Onion Routing Security”, In H. Federrath, editor,Designing Privacy Enhancing Technologies, vol. 2009 of LNCS, 2001, (14 pages).
Perlman, Radia, Brides, Routers, Switches, and internetworking Protocols,Interconnections Second Edition, Table of Contents (1999).
Zimmermann, P., “The Official PGP User's Guide”, Table of Contents, MIT Press (1995).
The Routing Arbiter Project, http:1//www.isi.edu1/div71/ra, Accessed Jun. 1, 2005.
“Secure BGP Project(S-BGP)”, Introduction, retrieved from http://www.net-tech.bbn.com/sbgp-index.html on May 27, 2005.
Qiu, Lili, et al., “Fast Firewall Inplementations for Software and Hardware-based Routers”, (2 pages), Jun. 2001.
Qiu, Lili, et al., “Fast Firewall Inplementations for Software and Hardware-based Routers”, (pp. 1-14), 2001.
Qiu, Lili, et al., Fast Firewall Inplementations for Software and Hardware-based Routers,IEEE 2001, pp. 241-250.
Mahajan, Ratul, et al., “Understanding BGP Misconfiguration”, University of Washington, Slide Presentation, (SIGCOMM '02) (16 pages).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for detecting a communication problem in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for detecting a communication problem in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for detecting a communication problem in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2707478

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.