Information security – Access control or authentication – Network
Reexamination Certificate
2003-12-18
2011-12-06
Orgad, Edan (Department: 2439)
Information security
Access control or authentication
Network
C726S011000, C726S012000, C726S014000, C713S151000, C713S154000, C713S160000, C713S168000
Reexamination Certificate
active
08074267
ABSTRACT:
A method for monitoring computer communications is disclosed. A packet sent from a sending node to a destination node is received at a monitoring node. It is determined whether the packet is encrypted.
REFERENCES:
patent: 5935245 (1999-08-01), Sherer
patent: 6170057 (2001-01-01), Inoue et al.
patent: 6253321 (2001-06-01), Nikander et al.
patent: 6735701 (2004-05-01), Jacobson
patent: 7093288 (2006-08-01), Hydrie et al.
patent: 7165100 (2007-01-01), Cranor et al.
patent: 2002/0093527 (2002-07-01), Sherlock et al.
patent: 2002/0129140 (2002-09-01), Peled et al.
patent: 2002/0129243 (2002-09-01), Nanjundiah
patent: 2003/0014644 (2003-01-01), Burns et al.
patent: 2003/0018891 (2003-01-01), Hall et al.
patent: 2003/0200456 (2003-10-01), Cyr et al.
patent: 2004/0151308 (2004-08-01), Kacker et al.
patent: 2004/0168050 (2004-08-01), Desrochers et al.
patent: 2005/0076228 (2005-04-01), Davis et al.
Anon, Independent Verification of IPsec Functionality Under Free BSD 3.0 http://www.geocities.com/SiliconValley/Code/4704/ipsecmust.html, Oct. 24, 2003.
Litvinov, Semyon, et al, “Using a Packet Sniffer to Analyze the Efficiency and Power of Encryption Techniques Used to Protect Data Over a Computer Network”, Statistics Department/MCS Program, St. Cloud State University.
Shamir, Adi, et al, “Playing hide and seek with stored keys”, Sep. 22, 1998, http://www.cipher.com/resources/downloads/files/whitepapers/keyhide2.pdf.
“Sniffit-packet sniffer and monitoring tool”, Manual Page, found at http://reptile.rug.ac.be/˜coder/sniffit/sniffit.manpage.8.html.
“WinPcap Documentation”, the NetGroup at Politecnico, di Torino, found at http://wincap.polito.it/docs/docs31beta2/html/main.html.
Martin Roesch:Snort-Lightweight Intrusion Detection for Networks, Proceedings ofLISA'99: 13thSystems Administration Conference, Seattle Washington, Nov. 7-12, 1999; pp. 229-238.
Martin Roesch, Chris Green:Snort Users Manual—Snort Release: 2.0.0: Apr. 8, 2003.
Raytheon,About SilentRunner®. Formerly at http://www.silentrunner.com/images/pdf/product2.pdf as of Feb. 20, 2003 as indicated by the web.archive.org page from which reference was downloaded.
Raytheon,SilentRunner® Product FAQ. Formerly at http://www/silentrunner.com/silentrunner/products/product.faq.html as of Mar. 10, 2003 and unchanged and still available Aug. 22, 2003, as indicated by the dale portion of URL of web.archive.org page from which reference was downloaded.
Orgad Edan
Schmidt Kari
Symantec Corporation
Wilmer Cutler Pickering Hale and Dorr LLP
LandOfFree
Computer communications monitor does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer communications monitor, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer communications monitor will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4255559