Systems and methods for distributed network protection

Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network monitoring

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S172000

Reexamination Certificate

active

07089303

ABSTRACT:
By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographical area serving, for example, a wide variety of commercial and public sites, an organizational structure, or the like, for alarms. Upon analyzing an alarm for various characteristics, the Level 1 monitoring center can refer the unauthorized access attempt to an appropriate Level 2 center for, for example, possible retaliatory and/or legal action. Then, a Level 3 monitoring center can record and maintain an overall picture of the security of one or more networks, the plurality of monitoring centers and information about one or more hacking attempts.

REFERENCES:
patent: 5550551 (1996-08-01), Alesio
patent: 5694335 (1997-12-01), Hollenberg
patent: 5796952 (1998-08-01), Davis et al.
patent: 5825283 (1998-10-01), Camhi
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5969433 (1999-10-01), Maggiora et al.
patent: 6275942 (2001-08-01), Bernard et al.
patent: 6363489 (2002-03-01), Comay et al.
patent: 6405318 (2002-06-01), Rowland
patent: 6519703 (2003-02-01), Joyce
patent: 6735702 (2004-05-01), Yavatkar et al.
patent: 6738909 (2004-05-01), Cheng et al.
patent: 6748540 (2004-06-01), Canestaro et al.
patent: 6886102 (2005-04-01), Lyle
patent: 6981146 (2005-12-01), Sheymov
patent: 2002/0023227 (2002-02-01), Sheymov et al.
patent: WO 00/42742 (2000-07-01), None
patent: WO 01/84270 (2001-11-01), None
patent: WO 01/95590 (2001-12-01), None
White G. B. et al. “Cooperating Security Managers: A Peer-Based Intrusion Detection System” IEEE Network, IEEE Inc. New York, US, vol. 10, No. 1, 1996, pp. 20-23, XP000580083, pp. 20-23.
Talpade R., Kim G., Khurana S.: “NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection” Proceedings IEEE International Symposium On Computers And Communications, Jul. 6-8, 1999, pp. 442-451.
Copy of International Search Report dated Feb. 13, 2002, 4 pages.
Dahlia Malkhi, et al.; “Secure Execution of Java Applets Using a Remote Playground”; AT&T Labs Research, Florham Park, NJ; 1988 IEEE; pp. 40-51.
John Pescatore; “Secure Use of the World Wide Web: Keeping Browsers and Servers From Getting Snared”; Trusted Information System; ISBN# 0-7803-3277-6; pp. 36-38.
RSA Security; “Are Passwords Really Free? A Closer Look at the Hidden Costs of Password Security”; pp. 1-8.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods for distributed network protection does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods for distributed network protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for distributed network protection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3624678

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.