Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography
Reexamination Certificate
2007-03-23
2010-02-09
Kim, Jung (Department: 2432)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular node for directing data and applying cryptography
C726S013000, C726S014000
Reexamination Certificate
active
07660980
ABSTRACT:
Methods and systems for establishing secure TCP/IP communications for individual network connections include the steps of intercepting a conventional TCP SYN packet prior to transmission from a source node to a destination node, embedding unique identifiers into standard fields of the packet header, wherein the unique identifiers are associated with the specific connection attempt and wherein the unique identifiers identify the user account and/or the computer hardware initiating the communication attempt, then forwarding the modified TCP SYN packet to the destination node and intercepting the modified TCP SYN packet prior to arrival, determining whether secure communications are required based on the unique identifiers extracted from the packet headers, based on other TCP/IP information, and based on predefined rules associated with the same. If secure communications are required, such requirement is communicated within either an RST or a SYN-ACK back to the source node.
REFERENCES:
patent: 5204961 (1993-04-01), Barlow
patent: 5216675 (1993-06-01), Melliar-Smith et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5796942 (1998-08-01), Esbensen
patent: 5802178 (1998-09-01), Holden et al.
patent: 5872847 (1999-02-01), Boyle et al.
patent: 5956481 (1999-09-01), Walsh et al.
patent: 6070244 (2000-05-01), Orchier et al.
patent: 6119171 (2000-09-01), Alkhatib
patent: 6219786 (2001-04-01), Cunningham et al.
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6317831 (2001-11-01), King
patent: 6320874 (2001-11-01), Crump et al.
patent: 6363489 (2002-03-01), Comay et al.
patent: 6370648 (2002-04-01), Diep
patent: 6408391 (2002-06-01), Huff et al.
patent: 6493342 (2002-12-01), Breslow et al.
patent: 6606706 (2003-08-01), Li
patent: 6618359 (2003-09-01), Chen et al.
patent: 6671273 (2003-12-01), Beck
patent: 6742118 (2004-05-01), Doi et al.
patent: 6772334 (2004-08-01), Glawitsch
patent: 6873988 (2005-03-01), Herrmann et al.
patent: 6959184 (2005-10-01), Byers et al.
patent: 6980658 (2005-12-01), Rezaiifar et al.
patent: 6985941 (2006-01-01), Schweitzer et al.
patent: 7007301 (2006-02-01), Crosbie et al.
patent: 7020895 (2006-03-01), Albrecht
patent: 7024690 (2006-04-01), Young et al.
patent: 7134022 (2006-11-01), Flyntz
patent: 7260596 (2007-08-01), Zhou
patent: 7302700 (2007-11-01), Mao et al.
patent: 7334254 (2008-02-01), Boydstun et al.
patent: 2001/0023482 (2001-09-01), Wray
patent: 2001/0044840 (2001-11-01), Carleton
patent: 2001/0054159 (2001-12-01), Hoshino
patent: 2002/0004847 (2002-01-01), Tanno
patent: 2002/0029337 (2002-03-01), Sudia et al.
patent: 2002/0032855 (2002-03-01), Neves et al.
patent: 2002/0078202 (2002-06-01), Ando et al.
patent: 2002/0078354 (2002-06-01), Sandhu et al.
patent: 2002/0078383 (2002-06-01), Leerssen et al.
patent: 2002/0083343 (2002-06-01), Crosbie et al.
patent: 2002/0087882 (2002-07-01), Schneier et al.
patent: 2002/0095496 (2002-07-01), Antes et al.
patent: 2002/0101332 (2002-08-01), Talmadge et al.
patent: 2002/0103916 (2002-08-01), Chen et al.
patent: 2002/0107953 (2002-08-01), Ontiveros et al.
patent: 2002/0112185 (2002-08-01), Hodges
patent: 2002/0129264 (2002-09-01), Rowland et al.
patent: 2002/0133586 (2002-09-01), Shanklin et al.
patent: 2002/0133698 (2002-09-01), Wank
patent: 2002/0133721 (2002-09-01), Adjaoute
patent: 2002/0136407 (2002-09-01), Denning et al.
patent: 2003/0055994 (2003-03-01), Herrmann et al.
patent: 2003/0074567 (2003-04-01), Charbonneau
patent: 2003/0076794 (2003-04-01), Kawasaki et al.
patent: 2003/0084331 (2003-05-01), Dixon et al.
patent: 2003/0088791 (2003-05-01), Porras et al.
patent: 2003/0229801 (2003-12-01), Kouznetsov et al.
patent: 2004/0010712 (2004-01-01), Hui et al.
patent: 2004/0034771 (2004-02-01), Edgett et al.
patent: 2004/0083286 (2004-04-01), Holden et al.
patent: 2004/0107360 (2004-06-01), Herrmann et al.
patent: 2004/0215771 (2004-10-01), Hayes
patent: 2004/0233915 (2004-11-01), Lin
patent: 2005/0273857 (2005-12-01), Freund
patent: 2008/0098220 (2008-04-01), Spalink et al.
patent: 2286534 (2001-04-01), None
patent: WO 02/061510 (2002-08-01), None
International Search Report Dated Apr. 29, 2004, from Corresponding International Application No. PCT/US03/36713, Filed Nov. 17, 2003.
Adolfo Rodriguez, John Gatrell, John Karas, Roland Peschke, “TCP/IP Tutorial And Technical Overview,” Online, Aug. 2001, IBM Internet XP002276976, retrieved from the Internet, URL: WWW.IBM.COM/READBOOKS, retrieved on May 21, 2003, p. I-p. XVIII, p. 665-p. 780.
Hunt, R., “Internet/Intranet FirewallSecurity-Policy, Architecture And Transaction Services,” Computer Communications, Butterworths & Co. Publishers Ltd., GB, vol. 21, No. 13, Sep. 1, 1998, pp. 1107-1123, XP004146571 ISSN: 0140-3664, p. 111, right-hand column, p. 1113, right-hand column, figures 2-4.
Phifer, “Cost-Effective Remote End Point Protection: Against Trojans, Spyware, and Other Pests,” PestPatrol White Paper, Sep. 1, 2002, pp. 1-11.
Sungard, “Welcome to the Info Security Performance Model,” SunGard Assessment Tool, Sep. 1, 2002, pp. 1-2.
Westbridge, “XML Web Services Security—Going Production,” Westbridge White Paper, Sep. 1, 2002, pp. 1-7.
Top Layer, “Stopping Attacks: The Importance of Denial of Service (DoS) Security Appliances,” Top Layer White Paper, pp. 1-13.
Internet Security, “Complete Desktop Protection for The Enterprise,” ISS Technical White Paper, Sep. 1, 2002, pp. Cover, 1-6.
Internet Security, “Web Application Protection: Using Existing Protection Solutions,” ISS Technical White Paper, Jul. 1, 2002, pp. Cover 1-6.
Top Layer, “Preventing Cyber Attacks and Costly Network Degradation,” Top Layer Webcast, May 30, 2002, pp. 1-13 (slides), pp. 1-15 (transcript).
Okena, “A Primer on Preventing Attacks at the Host—Okena, Inc.—Hurwitz Report,” Hurwitz Analyst White Paper, Feb. 1, 2002, pp. 1-11.
Blue Lance, “Protecting Computer-Managed Assets: Building a Secure Infrastructure for Business,” Larstan Business Reports, Jan. 1, 2002, pp. 1-10.
Okena, “Technology Best Practices for Intrusion Prevention,” Okena Analyst White Paper, Jan. 1, 2002, pp. 1-3.
Computel, “Distributed Denial of Service Attacks,” Network Security White Papers, Dec. 6, 2000, pp. 1-6.
Leithauser, “Fire Guardian,” KnolwdgeStorm Solution Detail Report, 2002, pp. 1-2.
Kobelt, “NetSentron,” KnowledgeStorm Solution Detail Report, 202, pp. 1-3.
Internet Security, “RealSecure® SiteProtector for Enterprise Protection,” KnowldgeStorm Solution Detail Report, 2002, pp. 1-5.
Internet Security, “BlackICE PC Protection,” KnowledgeStorm Solution Detail Report, 2002, pp. 1-5.
Internet Security, “System Scanner®,” KnowledgeStorm Solution Detail Report, 2002, pp. 1-5.
Internet Security, “Internet Scanner™,” KnowledgeStorm Solution Detail Report, 2002, pp. 1-6.
Dynamics, “Webinspect™ (Web Application Security Assessment),” KnowledgeStorm Solution Detail Report, 2002, pp. 1-5.
Lockstep, Webagain—Automatic Web Site Repair, KnowledgeStorm Solution Detail Report, 2002, pp. 1-4.
Barham, et als., “Techniques for Lightweight Concealment and Authentication in IP Networks.” Intel Research Berkley, Jul. 2002, pp. 1-12, IRB-TR-02-009, Intel Corp., U.S.A.
Badhusha, A.; Automatic signature files update in antivirus software using activepackets; Publication Date: 2001; ICS Dept., King Fahd Univ. of Pet. & Miner., Dhahran; On pp. 457-460.
Alexander Jonathan
Berger Joubert
Leima Patricia Joy
Shay A. David
Xuan Chaoting
Kim Jung
Liquidware Labs, Inc.
Perungavoor Venkat
Seyfarth Shaw LLP
LandOfFree
Establishing secure TCP/IP communications using embedded IDs does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Establishing secure TCP/IP communications using embedded IDs, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Establishing secure TCP/IP communications using embedded IDs will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4171835