Management of trusted flow system

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S013000, C713S168000, C713S176000, C713S178000

Reexamination Certificate

active

10219380

ABSTRACT:
This invention discloses a method and system for detecting and reacting to unexpected communications patterns. The system consists of a plurality of end stations and a plurality of network interfaces, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The system further consists of a plurality of secure management servers, which continuously exchange management messages with the network interfaces. Consequently, the secure management servers have the information for detecting unexpected communications patterns. The method allows the control of end stations, and when an unexpected communication pattern is detected, selectively only packets from authenticated programs can be allowed to be transmitted.

REFERENCES:
patent: 5913024 (1999-06-01), Green et al.
patent: 6044469 (2000-03-01), Horstmann
patent: 6415031 (2002-07-01), Colligan et al.
patent: 6463474 (2002-10-01), Fuh et al.
patent: 6643773 (2003-11-01), Hardjono
Kakkar et al, Certificate Distribution with Local Autonomy, 2000, Springer-Verlag, pp. 277-295.
Derek Atkins et al., “Internet Security: Professional Reference,” Book & CD-ROM Edition, Feb. 1996, ISBN: 1562055577, New Riders Publishing, Indianapolis, IN, USA.
Andrew S. Tanenbaum, “Computer Networks,” Third Edition, Mar. 1996, ISBN: 0133499456, Prentice Hall PTR, Upper Saddle River, NJ, USA.
Douglas Comer, “Internetworking with TCP/IP: Principles, Protocols, and Architecture,” Apr. 1988, ISBN: 0134701542, Prentice-Hall, Englewood Cliffs, NJ, USA.
W. Richard Stevens, “TCP/IP Illustrated, vol. 1: The Protocols,” Dec. 1993, ISBN: 0201633469, Addison-Wesley, USA.
Elizabeth D. Zwicky et al., “Building Internet Firewalls,” Second Edition, Jan. 15, 2000, ISBN: 01565928717, O'Reilly & Associates, USA.
Bruce Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” Second Edition, Oct. 18, 1995, ISBN: 0471117099, John Wiley & Sons, New York, NY, USA.
Alfred J. Menezes et al., “Handbook of Applied Crytrography,” Oct. 1996, ISBN: 0849385237, CRC Press, USA.
Christian Collberg et al., “Manufacturing Cheap, Resilient and Stealthy Opaque Constructs,”Principles of Programming Languages(POPL), 1998, pp. 184-196, Association for Computing Machinery (ACM), USA.
Christian Collberg et al., “Watermarking, Tamper-Proofing, and Obfuscation—Tools for Software Protection,”University of Arizona Computer Science Technical Report, Feb. 10, 2000, volume-issue: 03, University of Arizona, Tucson, AZ, USA.
Christian Collberg et al., “A Taxonomy of Obfuscating Transformations,”Technical Report, 1997, volume-issue: 148, University of Auckland Department of Computer Science, Auckland, New Zealand.
Enriquillo Valdez et al., “Software DisEngineering: Program Hiding Architecture and Experiments,”Information Hiding 1999, 1999, pp. 379-394, Springer Verlag Lectures in Computer Science, Heidelberg, Germany.
Enriquillo Valdez et al., “DISSECT: DIStribution for SECurity Tool,”ISC2001, 2001, pp. 125-143, Springer Verlag Lectures in Computer Science LNCS2200, Heidelberg, Germany.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Management of trusted flow system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Management of trusted flow system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Management of trusted flow system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3853263

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.