Electrical computers and digital processing systems: multicomput – Computer network managing
Reexamination Certificate
2006-11-28
2006-11-28
Cardone, Jason (Department: 2145)
Electrical computers and digital processing systems: multicomput
Computer network managing
C370S254000, C709S226000, C709S224000, C709S228000
Reexamination Certificate
active
07143154
ABSTRACT:
The present invention is a methodology for predicting when current sets of encryption keys used in a high speed data network are about to expire. The invention allows network elements of a communication system to re-negotiate new sets of keys well in advance so as to prevent interruptions in communications traffic flow. In accordance with one exemplary embodiment of the invention, a weighted traffic flow per usage for a given network element is calculated on a periodic basis. The value of the weighted traffic flow per usage is compared with a remainder value of a specific quantity of communications traffic yet to be processed by the network element. If the remainder value is less than the weighted traffic flow value, an indication is given to the appropriate network element to renegotiate a new set of keys.
REFERENCES:
patent: 5623492 (1997-04-01), Teraslinna
patent: 5706279 (1998-01-01), Teraslinna
patent: 5787072 (1998-07-01), Shimojo et al.
patent: 5812525 (1998-09-01), Teraslinna
patent: 6003060 (1999-12-01), Aznar et al.
patent: 6011804 (2000-01-01), Bertin et al.
patent: 6023456 (2000-02-01), Chapman et al.
patent: 6028840 (2000-02-01), Worster
patent: 6038217 (2000-03-01), Lyles
patent: 6046980 (2000-04-01), Packer
patent: 6078953 (2000-06-01), Vaid et al.
patent: 6084855 (2000-07-01), Soirinsuo et al.
patent: 6091725 (2000-07-01), Cheriton et al.
patent: 6137777 (2000-10-01), Vaid et al.
patent: 6198722 (2001-03-01), Bunch
patent: 6205119 (2001-03-01), Kaczynski
patent: 6292465 (2001-09-01), Vaid et al.
patent: 6320846 (2001-11-01), Jamp et al.
patent: 6330562 (2001-12-01), Boden et al.
patent: 6360269 (2002-03-01), Mamros et al.
patent: 6363053 (2002-03-01), Schuster et al.
patent: 6385168 (2002-05-01), Davis et al.
patent: 6405251 (2002-06-01), Bullard et al.
patent: 6424624 (2002-07-01), Galand et al.
patent: 6452915 (2002-09-01), Jorgensen
patent: 6473793 (2002-10-01), Dillon et al.
patent: 6487170 (2002-11-01), Chen et al.
patent: 6502131 (2002-12-01), Vaid et al.
patent: 6578077 (2003-06-01), Rakoshitz et al.
patent: 6587680 (2003-07-01), Ala-Laurila et al.
patent: 6643776 (2003-11-01), Boden et al.
patent: 6751663 (2004-06-01), Farrell et al.
patent: 2002/0010866 (2002-01-01), McCullough et al.
Kunz, Thomas et al. “Fast Detection of Communication Patterns in Distributed Executions.” IBM Press. Proceedings of the 1997 conference of the Centre for Advanced Studies on Collaborative Research. Toronto, Ontario. 1997.
Feustel, Edward et al. “The DGSA: Unmet Information Security Challenges for Operating System Designers.” ACM Press. ACM SIGOPS Operating Systems Review. vol. 32, Issue 1, New York, NY. 1998. pp. 3-22.
Ioannidis, Sotiris et al. “Implementing a Distributed Firewall.” ACM Press. Proceedings of the 7thACM Conference on Computer and Communications Security. Athens, Greece. 2000. pp. 190-199.
Kent, S.et al. RFC 2401: “Security Architecture for the Internet Protocol”. The Internet Society, Nov. 1998.
Feldmann, Anja et al. “Dynamics of IP traffic: A study of the role of variability and the impact of control.” Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communications. ACM Special Interest Group on Data Communication. Cambridge, Mass. pp. 301-313. 1999. ACM Press.
Epsilon, Raja et al. “Analysis of ISP IP/ATM network traffic measurements.” ACM SIGMETRICS Performance Evaluation Review. vol. 27, Issue 2. Sep. 1999. pp. 15-24. ACM Press.
Network Working Group, Request for Comments 2401, Obsoletes 1825, Category: Standards Track, “Security Architecture for the Internet Protocol” S. Kent, BBN Corpo., R. Atkinson @Home Network, Nov. 1998, ftp//ftp.isi.edu/in-notes/rfc2401.txt.
Cardone Jason
Hodulik Matthew J.
Lucent Technologies - Inc.
Swearingen Jeffrey R
LandOfFree
Internet protocol security framework utilizing predictive... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Internet protocol security framework utilizing predictive..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Internet protocol security framework utilizing predictive... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3641787