Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2006-05-16
2006-05-16
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S152000, C713S152000, C709S223000, C709S224000, C345S473000
Reexamination Certificate
active
07047423
ABSTRACT:
The analysis system is a collection, configuration and integration of software programs that reside on multiple interconnected computer platforms. The software, less computer operating systems, is a combination of sensor, analysis, data conversion, and visualization programs. The hardware platforms consist of several different types of interconnected computers, which share the software programs, data files, and visualization programs via a Local Area Network (LAN). This collection and integration of software and the migration to a single computer platform results in an approach to LAN/WAN monitoring in either a passive and/or active mode. The architecture permits digital data input from external sensors for analysis, display and correlation with data and displays derived from four major software concept groups. These are: Virus Computer Code Detection; Analysis of Computer Source and Executable Code; Dynamic Monitoring of Data Communication Networks; 3-D Visualization and Animation of Data.
REFERENCES:
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5410648 (1995-04-01), Pazel
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5440723 (1995-08-01), Arnold et al.
patent: 5537540 (1996-07-01), Miller et al.
patent: 5555419 (1996-09-01), Arsenault
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5608854 (1997-03-01), Labedz et al.
patent: 5684945 (1997-11-01), Chen et al.
patent: 5787409 (1998-07-01), Seiffert et al.
patent: 5794046 (1998-08-01), Meier et al.
patent: 5796951 (1998-08-01), Hamner et al.
patent: 5819094 (1998-10-01), Sato et al.
patent: 5822535 (1998-10-01), Takase et al.
patent: 5832208 (1998-11-01), Chen et al.
patent: 5845081 (1998-12-01), Rangarajan et al.
patent: 5923849 (1999-07-01), Venkatraman
patent: 5958010 (1999-09-01), Agarwal et al.
patent: 5960170 (1999-09-01), Chen et al.
patent: 5960439 (1999-09-01), Hamner et al.
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6026442 (2000-02-01), Lewis et al.
patent: 6043825 (2000-03-01), Glenn et al.
patent: 6076106 (2000-06-01), Hamner et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6415321 (2002-07-01), Gleichauf et al.
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6549208 (2003-04-01), Maloney et al.
patent: 09 171 460 (1997-06-01), None
patent: 409171460 (1997-06-01), None
patent: WO 98/42103 (1998-09-01), None
Saneep Kumar, Spafford H. Eugene, An Application of pattern Matching in Intrusion Detection, Department of Computer Sciences, Purdue University, Jun. 17, 1994.
S. Staniford-Chen et al., GrIDS—A Graph Based Intrusion Detection System For Large Networks, The q9th National Information Conference, 1996.
Author Unknown, “Visualization of Network Attacks”, Internet site: http://www.microelec.eng.morgan.edu/˜web
etwork_viz
etviz.htm.
Sczepansky A, “Auf Herz Und Nieren Pruefen”, Elektronik, De, Franzis Verlag GMBH, pp. 78-81, Apr. 2, 1997.
Yau S S et al, “An Interactive Software Maintenance Environment”, AFIPS Conference Proceedings, pp. 553, 555-561, Jun. 1987.
Lo R et al, “Towards a Testbed for Malicious Code Detection,” Computer Society Annual Conference, p. 160-166, 1991.
Saito T et al, “Protection Against Trojan Horses by Source Code Analysis,” Electronics & Communications in Japan, Part III—Fundamental Electronic Science, pp. 11-18, Jan. 1994.
Deri L., Mankis D., “VRML: Adding 3D to Network Management”, 4th International Conference on Intelligence in Services and Networks, pp. 469-477, May 27-29, 1997.
Law A M et al, “Simulation Software for Communications Networks: The State of the Art,” IEEE Communications Magazine, vol. 32, No. 3, pp. 44-50., Mar. 1, 1994.
Chang C K; Al-Saloan Y Y; Defanti T,Scientific Visualization: A Performance Study of CSMA/CD with Connected Data Links—(Hybrid-Ethernet), Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems, pp. 389-394, Apr. 14-16, 1992.
PCT International Search Report dated Nov. 17, 1999 for PCT/US99/12393 dated Jul. 20, 1999.
PCT International Search Report dated Dec. 2, 1999 for PCT/US99/12394 dated Jul. 20, 1999.
PCT International Search Report dated Dec. 1, 1999 for PCT/US99/16467 dated Jul. 20, 1999.
Dontas Holly D.
Karolchik Joseph
Maloney Michael P.
Rubel Rich
Scott Christopher J.
Arani Jaghi T.
Computer Associates Think Inc.
Fish & Richardson P.C.
Sheikh Ayaz
LandOfFree
Information security analysis system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Information security analysis system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Information security analysis system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3544429