Apparatus for verifying the integrity of computer networks...

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000, C726S006000, C726S015000, C726S023000, C726S024000, C726S025000, C709S208000, C709S209000, C709S223000, C709S224000, C709S225000, C709S226000, C709S227000, C709S228000, C709S229000

Reexamination Certificate

active

11647660

ABSTRACT:
A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is connected to at least some of the devices in the network. The security subsystem is configured to monitor activities of the at least some devices on the network and detect attacks on the at least some devices. The master system monitors the integrity of the security subsystem and registers information pertaining to attacks detected by the security subsystem. The secure link is connected between the security subsystem and the master system. The master system monitors the integrity of the security subsystem and receives the information pertaining to the attacks through the secure link.

REFERENCES:
patent: 4759592 (1988-07-01), Dahnert
patent: 5764887 (1998-06-01), Kells et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5909493 (1999-06-01), Motoyama
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6185689 (2001-02-01), Todd, Sr. et al.
patent: 6205551 (2001-03-01), Grosse
patent: 6205552 (2001-03-01), Fudge
patent: 6226372 (2001-05-01), Beebe et al.
patent: 6269447 (2001-07-01), Maloney et al.
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6304973 (2001-10-01), Williams
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6343362 (2002-01-01), Ptacek et al.
patent: 6738911 (2004-05-01), Hayes
patent: 6850497 (2005-02-01), Sigler et al.
patent: 6865596 (2005-03-01), Barber et al.
patent: 7181769 (2007-02-01), Keanini et al.
patent: 7215637 (2007-05-01), Ferguson et al.
patent: 7260844 (2007-08-01), Tidwell et al.
patent: 8-204736 (1996-08-01), None
patent: 9-160876 (1997-06-01), None
Rutrell Yasin, “GTE Probes for Network Holes.” 1998, InternetWeek, n 440, p. 23 (1 page).
Ann Harrison, “Pilot Guides CorporateNets' Security Needs.” Jun. 7, 1999, ComputerWorld, p. 86 (2 pages).
NetRanger User's Guide, version 2.1.1, Copyright © 1998 Cisco Systems, Inc., downloaded from web site: http://www.broadbandbuilders.com/application/pdf/en/us/guest/products/ps6038/c1676/ccmigration—09186a00800ee98e.pdf, printout date: Jun. 22, 2005, 334 pages.
Livenmore, Dec. 1996, National Info-Sec Technical Baseline, p. 1-23.
Carver, May 2000, p. 1-2.
AccessGuard, 2003, http://accessguard.nl.
Turner, E-Commerce Sites Under Heavy Attack From Hackers, Dec. 8, 1997, vol. 11, issue 24.
Rutrell, Managed Security Gets Sophisticated, 2001, Internet Week, p. 23.
Schnackenberg, Jun. 2000, Infrastruction for Instrusion Detection and Response.
Emigh, IBM Wheelgroup Partner to Thwart Net Hackers, Jul. 28, 1997, Newsbytes, p. 1-2.
Violino, Collapsing the Fortress Walls, 1997, Information Week, n. 635, p. 104.
Newton, Newton's Telecom Dictionary, Mar. 1998, Flatiron Publishing, p. 636.
Higgins, Call in the Guards, Communications Week, 1997, p. 48.
Messmer, Cultivating Managed Security Outsourced Security can Ease Admin., Jun. 10, 2002, Network World, p. 19.
Shipley, Enterprise-Class ISPs, 1998, Network Computing, p. 116.
Yasin, Managed Security Gets Sophisticated, 2001, Internet Week, p. 1-2.
Messmer, Security Needs Spawn Services, Apr. 3, 2000, Network World.
Electronic Commerce News, Phillips Business Information, Nov. 24, 1997, vol. 2, p. 1-2.
Giles, Internet Security, Mar. 1997, vol. 5, p. 22.
IBM Making E-Commerce Safer, More Reliable, PC Week, Dec. 1, 1997, vol. 14, n50, p. 34.
Claderbank, 1996, Internet Security to Ship Realsecure, n714.
Johna Till Johnson, “Simulated Attack for Real Network Security,” Proceedings of Data Communication, pp. 31-32, Nov. 21, 1995 (4 pages).
“Learning frequently overlooked points: Taking care of temporary files management system, and mainly premising observance of the basics,” Proceedings of Journal of Nikkei Internet Technology, vol. 39, pp. 140-145, Japan, Nikkei Business Publication, Inc., Sep. 22, 2000 (9 pages).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Apparatus for verifying the integrity of computer networks... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Apparatus for verifying the integrity of computer networks..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Apparatus for verifying the integrity of computer networks... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3923511

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.