Distributed network security service

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C726S023000, C726S024000

Reexamination Certificate

active

07603716

ABSTRACT:
A method and apparatus to distribute a network security service is disclosed. The security software may be distributed across nodes on a network and may use a separate security device that has two channels, one to review network traffic and a second to send updates to other security devices.

REFERENCES:
patent: 5987376 (1999-11-01), Olson et al.
patent: 6088805 (2000-07-01), Davis et al.
patent: 6128738 (2000-10-01), Doyle et al.
patent: 6233606 (2001-05-01), Dujari
patent: 6269099 (2001-07-01), Borella et al.
patent: 6279110 (2001-08-01), Johnson et al.
patent: 6308266 (2001-10-01), Freeman
patent: 6327652 (2001-12-01), England et al.
patent: 6341349 (2002-01-01), Takaragi et al.
patent: 6367009 (2002-04-01), Davis et al.
patent: 6397303 (2002-05-01), Arimilli et al.
patent: 6405290 (2002-06-01), Arimilli et al.
patent: 6424718 (2002-07-01), Holloway
patent: 6782294 (2004-08-01), Reich et al.
patent: 6938166 (2005-08-01), Sarfati et al.
patent: 6941366 (2005-09-01), Antes et al.
patent: 6941384 (2005-09-01), Aiken, Jr. et al.
patent: 7461403 (2008-12-01), Libenzi et al.
patent: 2002/0032765 (2002-03-01), Pezzutti
patent: 2002/0143989 (2002-10-01), Huitema et al.
patent: 2002/0156875 (2002-10-01), Pabla
patent: 2003/0018701 (2003-01-01), Kaestle
patent: 2003/0018813 (2003-01-01), Antes et al.
patent: 2003/0196060 (2003-10-01), Miller
patent: 2004/0034794 (2004-02-01), Mayer
patent: 2004/0181689 (2004-09-01), Kiyoto
patent: 2004/0243819 (2004-12-01), Bourne et al.
patent: 2005/0027871 (2005-02-01), Bradley
patent: 2005/0055280 (2005-03-01), Jeans
patent: 2005/0076218 (2005-04-01), Brown
patent: 2005/0160291 (2005-07-01), Eden et al.
patent: 2005/0160477 (2005-07-01), Saito
patent: 2005/0182928 (2005-08-01), Kamalanathan et al.
patent: 2005/0193219 (2005-09-01), Vanstone
patent: 2006/0212572 (2006-09-01), Afek et al.
patent: 2008/0016568 (2008-01-01), Szor et al.
patent: 1 248 441 (2002-10-01), None
patent: 1 361 728 (2003-11-01), None
patent: WO-2005/026872 (2005-03-01), None
patent: WO-2005/078993 (2005-08-01), None
FAQ: Network Intrusion Detection System, Mar. 21, 2000, Linux.
Understanding Active Directory Replication. Feb. 17, 2000, 171-180.
Smith, Implementing Least Privilege with AD, Feb. 21, 2002.
McAfee Access Control 3.0 Product and Installation Guide, 2008.
IT World: McAfee announces new slate of 2002 security Products, Aug. 31, 2001.
Campbell, C., “Securing Your Peer-to-Peer Networks,” TechTarget, Sep. 12, 2001, http://searchsecurity.techtarget.com/originalContent/0,289142,sid14—gci769396,00.html?MOTT=9.25.
Ajmani et al., “ConChord: Cooperative SDSI Certificate Storage and Name Resolution,” First International Workshop on Peer-to-Peer Systems (IPTPS), Mar. 2002.
Ellison, C., et al., Simple Public Key Certificate, (Internet Draft 1999), at http://www.world.std.com/˜cme/spki.txt (Aug. 6, 2001).
Ellison, C., et al., SPKI Certificate Theory, (The Internet Society 1999), at http://www.ietf.org/rfc/rfc2693.txt?number=2693 (Aug. 6, 2001).
Ellison, C., SPKI Requirements, (The Internet Society 1999), at http://www.ietf.org/rfc/rfc2692.txt?number=2692 (Aug. 6, 2001).
Erdelsky, P., The Birthday Paradox, EFG, at http://www.efgh.com/math/birthday.htm (Mar. 8, 2002).
Housley et al., “Internet X.509 Public Key Infrastructure Certificate and CRL Profile.” Network Working Group (Jan. 1999), pp. 1-121, retrieved from http://www.ietf.org/rfc/rfc2459.txt?number=2459 Sep. 18, 2003.
Jianming Lv et al., “WonGoo: A Pure Peer-to-Peer Full Text Information Retrieval System Based On Semantic Overlay Networks;” Institute of Computing Technology Chinese Academy of Sciences Beijing, China; Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA '04); dated Apr. 2004; 8 pages; http://portal.acm.org/citation.cfm?id=1025126.1025936.
Kim et al., “A Secure Platform for Peer-to-Peer Computing in the Internet,” Proceedings of the 35th Hawaii International Conference on System Sciences, IEEE Computer Society, 2002, pp. 3948-3957.
Langley, A., The Freenet Protocol, The Free Network Project, at http://freenet.sourceforge.net/index/php?page=protocol (May 21, 2001).
Mazieres et al., “Separating Key Management from File System Security,” Operating Systems Review ACM, vol. 33, No. 5, Dec. 1999, pp. 124-139.
Red-Black Tree, National Institute of Standards and Technology, at http://www.nist.gov/dads/HTML/redblack.html (Mar. 5, 2002).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Distributed network security service does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Distributed network security service, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Distributed network security service will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4089638

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.