Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2006-01-24
2006-01-24
Revak, Christopher (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C709S226000, C709S229000
Reexamination Certificate
active
06990592
ABSTRACT:
Controlling a user's usage of network resources, after the user has been authenticated, without using any network resources beyond the user's entry point to the network. A plurality of users may be connected to an entry point of a network of a network device by a shared transmission medium. Each users' usage of network resources is controlled, after such user has been authenticated, without using any network resources beyond such user's entry point to the network. For each one or more users, packet rules may be provisioned to the user's entry point to the network, where such entry point may be shared with other users. The packet rules may be applied to each packet received from the user before any network resources beyond the entry point are used. These packet rules may be associated with an identity of the user and then provisioned to the user's entry point in response to the user being authenticated. If a plurality of users are connected to an entry point by a shared transmission medium, packet rules associated with the users may be provisioned to the entry point and applied to packets received from the users before any network resources beyond the entry point are used. Such packet rules may be provisioned to a number of network entry devices and may serve as a distributed firewall for users of a network, as opposed to a centralized firewall. An entry port module of a network entry device may be configured based on an identity of one or more users as a result of the authentication of the one or more users, respectively, and each packet received from each user may be examined to control usage of network resources by the user.
REFERENCES:
patent: 5889953 (1999-03-01), Thebaut et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 6134662 (2000-10-01), Levy et al.
patent: 6182226 (2001-01-01), Reid et al.
patent: 6212633 (2001-04-01), Levy et al.
patent: 2003/0084331 (2003-05-01), Dixon et al.
patent: 2003/0118038 (2003-06-01), Jalava et al.
Michael L. DeRosia, et al. “Firewalls”, ISMG 4700, Data Communications, Dec. 7, 2000.
Steven Pettit, “enterasys User Personalized Network”, pp. 1-16, Enterasys Networks' White Paper, Feb. 12, 2001.
J.P. Gorsky, “Layer Feb. 3, 2004 Frame Classification Primer”, pp. 1-4, Enterasys Networks' White Paper; pp. 1-4, May 1999.
Keith Schultz, “A Complete Solution,” Internet Week, Jan. 22, 2001, pp. 1-4.
Business Wire, “Enterasys Networks' Unveils the Industry's First User Personalized Network,” Feb. 12, 2001, pp. 1-2.
Phil Hochmuth, “Enterasys Brings Policy Enforcement Closer to Users,” Network World, Feb. 12, 2001, pp. 1-2.
Paul Congdon, Hewlett Packard, IEEE 802.1X Overview, “Port Based Network Access Control”, IEEE Plenary, Alburquerque, NM, Mar. 2000.
Kjendal David L.
Richmond James
Burns, Esq. David R.
Enterasys Networks Inc.
Lahive & Cockfield LLP
Revak Christopher
LandOfFree
Controlling concurrent usage of network resources by... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Controlling concurrent usage of network resources by..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Controlling concurrent usage of network resources by... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3567054