Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2008-09-09
2008-09-09
Kincaid, Kristine (Department: 2139)
Information security
Monitoring or scanning of software or data including attack...
C726S002000, C726S003000, C726S006000, C726S015000, C726S023000, C726S024000, C726S025000, C709S208000, C709S209000, C709S223000, C709S224000, C709S225000, C709S226000, C709S227000, C709S228000, C709S229000
Reexamination Certificate
active
11647660
ABSTRACT:
A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is connected to at least some of the devices in the network. The security subsystem is configured to monitor activities of the at least some devices on the network and detect attacks on the at least some devices. The master system monitors the integrity of the security subsystem and registers information pertaining to attacks detected by the security subsystem. The secure link is connected between the security subsystem and the master system. The master system monitors the integrity of the security subsystem and receives the information pertaining to the attacks through the secure link.
REFERENCES:
patent: 4759592 (1988-07-01), Dahnert
patent: 5764887 (1998-06-01), Kells et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5909493 (1999-06-01), Motoyama
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6185689 (2001-02-01), Todd, Sr. et al.
patent: 6205551 (2001-03-01), Grosse
patent: 6205552 (2001-03-01), Fudge
patent: 6226372 (2001-05-01), Beebe et al.
patent: 6269447 (2001-07-01), Maloney et al.
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6304973 (2001-10-01), Williams
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6343362 (2002-01-01), Ptacek et al.
patent: 6738911 (2004-05-01), Hayes
patent: 6850497 (2005-02-01), Sigler et al.
patent: 6865596 (2005-03-01), Barber et al.
patent: 7181769 (2007-02-01), Keanini et al.
patent: 7215637 (2007-05-01), Ferguson et al.
patent: 7260844 (2007-08-01), Tidwell et al.
patent: 8-204736 (1996-08-01), None
patent: 9-160876 (1997-06-01), None
Rutrell Yasin, “GTE Probes for Network Holes.” 1998, InternetWeek, n 440, p. 23 (1 page).
Ann Harrison, “Pilot Guides CorporateNets' Security Needs.” Jun. 7, 1999, ComputerWorld, p. 86 (2 pages).
NetRanger User's Guide, version 2.1.1, Copyright © 1998 Cisco Systems, Inc., downloaded from web site: http://www.broadbandbuilders.com/application/pdf/en/us/guest/products/ps6038/c1676/ccmigration—09186a00800ee98e.pdf, printout date: Jun. 22, 2005, 334 pages.
Livenmore, Dec. 1996, National Info-Sec Technical Baseline, p. 1-23.
Carver, May 2000, p. 1-2.
AccessGuard, 2003, http://accessguard.nl.
Turner, E-Commerce Sites Under Heavy Attack From Hackers, Dec. 8, 1997, vol. 11, issue 24.
Rutrell, Managed Security Gets Sophisticated, 2001, Internet Week, p. 23.
Schnackenberg, Jun. 2000, Infrastruction for Instrusion Detection and Response.
Emigh, IBM Wheelgroup Partner to Thwart Net Hackers, Jul. 28, 1997, Newsbytes, p. 1-2.
Violino, Collapsing the Fortress Walls, 1997, Information Week, n. 635, p. 104.
Newton, Newton's Telecom Dictionary, Mar. 1998, Flatiron Publishing, p. 636.
Higgins, Call in the Guards, Communications Week, 1997, p. 48.
Messmer, Cultivating Managed Security Outsourced Security can Ease Admin., Jun. 10, 2002, Network World, p. 19.
Shipley, Enterprise-Class ISPs, 1998, Network Computing, p. 116.
Yasin, Managed Security Gets Sophisticated, 2001, Internet Week, p. 1-2.
Messmer, Security Needs Spawn Services, Apr. 3, 2000, Network World.
Electronic Commerce News, Phillips Business Information, Nov. 24, 1997, vol. 2, p. 1-2.
Giles, Internet Security, Mar. 1997, vol. 5, p. 22.
IBM Making E-Commerce Safer, More Reliable, PC Week, Dec. 1, 1997, vol. 14, n50, p. 34.
Claderbank, 1996, Internet Security to Ship Realsecure, n714.
Johna Till Johnson, “Simulated Attack for Real Network Security,” Proceedings of Data Communication, pp. 31-32, Nov. 21, 1995 (4 pages).
“Learning frequently overlooked points: Taking care of temporary files management system, and mainly premising observance of the basics,” Proceedings of Journal of Nikkei Internet Technology, vol. 39, pp. 140-145, Japan, Nikkei Business Publication, Inc., Sep. 22, 2000 (9 pages).
Beaver Edward “Mac”
Guilfoyle Jeffrey J.
Hrabik Michael
Jackson Jenise E
Kincaid Kristine
Panitch Schwarze Belisario & Nadel LLP
Solutionary, Inc.
LandOfFree
Apparatus for verifying the integrity of computer networks... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Apparatus for verifying the integrity of computer networks..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Apparatus for verifying the integrity of computer networks... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3923511