Computer and method for on-demand network access control

Electrical computers and digital data processing systems: input/ – Intrasystem connection – Bus access regulation

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S225000

Reexamination Certificate

active

07409482

ABSTRACT:
A computer and method that control access to a network. The computer includes an application that shrinks the window of opportunity for a network attack and reduces power consumption by automatically causing a computer to connect to the network when access is needed and to disconnect the computer from the network when access is not needed. The computer is automatically disconnected when it is deemed that network access is no longer needed, such as after a time period of no network activity. In turn, when the user, or the system, needs access to the network, the computer is automatically reconnected to the network. A software daemon on the computer may temporarily reconnect the computer to the network to access a server on the network to determine if attempts have been made to access the computer.

REFERENCES:
patent: 5560024 (1996-09-01), Harper et al.
patent: 5815732 (1998-09-01), Cooper et al.
patent: 5887140 (1999-03-01), Itsumi et al.
patent: 5970228 (1999-10-01), Nezu
patent: 6230156 (2001-05-01), Hussey
patent: 6606163 (2003-08-01), Suzuki et al.
patent: 6678065 (2004-01-01), Hikawa
patent: 6735707 (2004-05-01), Kapil
patent: 6985886 (2006-01-01), Broadbent et al.
patent: 6996778 (2006-02-01), Rajarajan et al.
patent: 2003/0023774 (2003-01-01), Gladstone et al.
patent: 2003/0140251 (2003-07-01), Marin et al.
patent: 2004/0042049 (2004-03-01), Hulan et al.
patent: 2005/0229018 (2005-10-01), De Oliveira Kastrup Pereira et al.
patent: WO 02/103498 (2002-12-01), None
“Development of a network distributed telecare robotic system using CORBA” by Jia et al. (abstract only) Publication Date: Oct. 8-13, 2003.
[GIAC] B. Corll, “Welchia Worm vs. Policy Makers Fighting Malware with Policy, not with Fire,” Practical report by GIAC Analyst#0543, Feb. 2004, http://ww.giac.org/gcih.php.
[CodeRedII] R. Russell, A. Mackie, “Code Red II Worm,” Security Focus, Inc., Incident Analysis Report, Aug. 2001.
International Search Report dated Aug. 22, 2005.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer and method for on-demand network access control does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer and method for on-demand network access control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer and method for on-demand network access control will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4018217

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.