Information security – Access control or authentication – Network
Reexamination Certificate
2004-02-17
2008-12-16
Sheikh, Ayaz R (Department: 2131)
Information security
Access control or authentication
Network
C726S022000, C726S023000, C713S150000
Reexamination Certificate
active
07467400
ABSTRACT:
An integrated security system operating over a network includes a network security controller coupled to the network having a relational database including portal objects and related resources represented in at least one table in the relational database. The system further includes at least one network node having a local database coupled to the network adapted to receive predetermined resource information from the relational database, an event generator coupled to the local database to provide at least one portal event in response to the predetermined resource information received by the local database, and a finite state portal controller coupled to the network and the event generator for providing at least one of an action and a global event in response to the at least one portal event.
REFERENCES:
patent: 4839640 (1989-06-01), Ozer et al.
patent: 5210873 (1993-05-01), Gay et al.
patent: 6119125 (2000-09-01), Gloudeman et al.
patent: 6157943 (2000-12-01), Meyer
patent: 6233588 (2001-05-01), Marchoili et al.
patent: 6271752 (2001-08-01), Vaios
patent: 6374356 (2002-04-01), Daigneault et al.
patent: 6422463 (2002-07-01), Flink
patent: 6504479 (2003-01-01), Lemons et al.
patent: 6643779 (2003-11-01), Leung et al.
patent: 6990660 (2006-01-01), Moshir et al.
patent: 2001/0034754 (2001-10-01), Elwahab et al.
patent: 2003/0080865 (2003-05-01), Capowski et al.
patent: 2003/0210139 (2003-11-01), Brooks et al.
patent: 2007/0180107 (2007-08-01), Newton et al.
patent: 2007/0204338 (2007-08-01), Aiello et al.
patent: 2007/0214504 (2007-09-01), Milani Comparetti
patent: WO 2004055608 (2004-07-01), None
Vutukuru et al, Efficient and Robust TCP Stream Normalization, 2008, IEEE, pp. 96-110.
Wang et al, Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits, 2004, ACM, pp. 193-204.
Watson et al, Protocol Scrubbing: Network Security Through Transparent Flow Modification, 2001, ACM, pp. 261-273.
Rubin et al, Protomatching Network Traffic for High Throughput Network Intrusion Detection, 2006, ACM, pp. 47-58.
Gaiman Barry
Moss John L.
Chapin IP Law LLC
Gaiman, Esq. Barry
Moorthy Aravind K
S2 Security Corporation
Sheikh Ayaz R
LandOfFree
Integrated security system having network enabled access... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Integrated security system having network enabled access..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Integrated security system having network enabled access... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4028543