Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2011-06-21
2011-06-21
Dinh, Minh (Department: 2432)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S024000
Reexamination Certificate
active
07966660
ABSTRACT:
Wireless devices, such as field devices or repeater/relay nodes, detect the presence of anomalies in data packets that suggest intrusion. Upon detection of an anomaly, a wireless device sends a notification to a sentinel device, which determines if intrusion may be occurring. If so, the sentinel device downloads a spy routine to at least one of the wireless devices, which enables further investigation into and/or isolation of the intrusion. Since the spy routine is downloaded to the wireless devices, the spy routine can be used in conjunction with memory-constrained wireless devices. Memory-constrained wireless devices may lack adequate memory for storing both a main application executed during normal operation and the spy routine. The spy routine could overwrite one or more modules of the main application. Once executed, the spy routine could itself be overwritten by the one or more modules, allowing the wireless device to return to normal operation.
REFERENCES:
patent: 5915119 (1999-06-01), Cone
patent: 6052778 (2000-04-01), Hagy et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 7143441 (2006-11-01), Rygaard
patent: 7246156 (2007-07-01), Ginter et al.
patent: 2001/0021176 (2001-09-01), Mimura et al.
patent: 2003/0217289 (2003-11-01), Ammon et al.
patent: 2004/0028016 (2004-02-01), Bitthartz
patent: 2004/0037423 (2004-02-01), Ghanea-Hercock
patent: 2004/0107219 (2004-06-01), Rosenberger
patent: 2004/0162995 (2004-08-01), Muaddi et al.
patent: 2006/0053491 (2006-03-01), Khuti et al.
patent: 2006/0150250 (2006-07-01), Lee et al.
patent: 2006/0272025 (2006-11-01), Mononen
patent: 2007/0021140 (2007-01-01), Keyes et al.
patent: 2007/0192862 (2007-08-01), Vermeulen et al.
patent: 2007/0199060 (2007-08-01), Touboul
patent: 2007/0217371 (2007-09-01), Sinha
patent: 2007/0271614 (2007-11-01), Capalik
patent: 2009/0320132 (2009-12-01), Sheymov et al.
patent: WO 03/088532 (2003-10-01), None
patent: WO 03/101023 (2003-12-01), None
Meik Felser et al., “Dynamic Software Update of Resource-Constrained Distributed Embedded Systems,” 13 pages.
Dunkels, et al, “Run-Time Dynamic Linking for Reprogramming Wireless Sensor Networks,” Swedish Institute of Computer Science, 14 pages.
U.S. Appl. No. 11/752,308 entitled “Intrusion Detection System for Wireless Networks,” 25 pages and six (6) sheets of drawings as filed.
Ramanathan Kartikeya S.
Singh Abhishek K.
Yermal Sudarshan
Dinh Minh
Honeywell International , Inc.
Munck Carter, LLP
Perungavoor Venkat
LandOfFree
Apparatus and method for deploying a wireless network... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Apparatus and method for deploying a wireless network..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Apparatus and method for deploying a wireless network... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2706436