Information security – Access control or authentication – Network
Reexamination Certificate
2007-12-04
2007-12-04
Song, Hosuk (Department: 2135)
Information security
Access control or authentication
Network
C726S002000, C726S013000, C713S168000, C713S176000, C713S178000
Reexamination Certificate
active
10219380
ABSTRACT:
This invention discloses a method and system for detecting and reacting to unexpected communications patterns. The system consists of a plurality of end stations and a plurality of network interfaces, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The system further consists of a plurality of secure management servers, which continuously exchange management messages with the network interfaces. Consequently, the secure management servers have the information for detecting unexpected communications patterns. The method allows the control of end stations, and when an unexpected communication pattern is detected, selectively only packets from authenticated programs can be allowed to be transmitted.
REFERENCES:
patent: 5913024 (1999-06-01), Green et al.
patent: 6044469 (2000-03-01), Horstmann
patent: 6415031 (2002-07-01), Colligan et al.
patent: 6463474 (2002-10-01), Fuh et al.
patent: 6643773 (2003-11-01), Hardjono
Kakkar et al, Certificate Distribution with Local Autonomy, 2000, Springer-Verlag, pp. 277-295.
Derek Atkins et al., “Internet Security: Professional Reference,” Book & CD-ROM Edition, Feb. 1996, ISBN: 1562055577, New Riders Publishing, Indianapolis, IN, USA.
Andrew S. Tanenbaum, “Computer Networks,” Third Edition, Mar. 1996, ISBN: 0133499456, Prentice Hall PTR, Upper Saddle River, NJ, USA.
Douglas Comer, “Internetworking with TCP/IP: Principles, Protocols, and Architecture,” Apr. 1988, ISBN: 0134701542, Prentice-Hall, Englewood Cliffs, NJ, USA.
W. Richard Stevens, “TCP/IP Illustrated, vol. 1: The Protocols,” Dec. 1993, ISBN: 0201633469, Addison-Wesley, USA.
Elizabeth D. Zwicky et al., “Building Internet Firewalls,” Second Edition, Jan. 15, 2000, ISBN: 01565928717, O'Reilly & Associates, USA.
Bruce Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” Second Edition, Oct. 18, 1995, ISBN: 0471117099, John Wiley & Sons, New York, NY, USA.
Alfred J. Menezes et al., “Handbook of Applied Crytrography,” Oct. 1996, ISBN: 0849385237, CRC Press, USA.
Christian Collberg et al., “Manufacturing Cheap, Resilient and Stealthy Opaque Constructs,”Principles of Programming Languages(POPL), 1998, pp. 184-196, Association for Computing Machinery (ACM), USA.
Christian Collberg et al., “Watermarking, Tamper-Proofing, and Obfuscation—Tools for Software Protection,”University of Arizona Computer Science Technical Report, Feb. 10, 2000, volume-issue: 03, University of Arizona, Tucson, AZ, USA.
Christian Collberg et al., “A Taxonomy of Obfuscating Transformations,”Technical Report, 1997, volume-issue: 148, University of Auckland Department of Computer Science, Auckland, New Zealand.
Enriquillo Valdez et al., “Software DisEngineering: Program Hiding Architecture and Experiments,”Information Hiding 1999, 1999, pp. 379-394, Springer Verlag Lectures in Computer Science, Heidelberg, Germany.
Enriquillo Valdez et al., “DISSECT: DIStribution for SECurity Tool,”ISC2001, 2001, pp. 125-143, Springer Verlag Lectures in Computer Science LNCS2200, Heidelberg, Germany.
Ofek Yoram
Yung Marcel Mordechay
Sitrick & Sitrick
Song Hosuk
TrustedFlow Systems, Inc.
LandOfFree
Management of trusted flow system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Management of trusted flow system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Management of trusted flow system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3853263