Error detection/correction and fault detection/recovery – Data processing system error or fault handling – Reliability and availability
Reexamination Certificate
2010-07-27
2011-12-06
Ehne, Charles (Department: 2113)
Error detection/correction and fault detection/recovery
Data processing system error or fault handling
Reliability and availability
C714S025000, C714S038100, C714S039000, C726S022000, C726S025000
Reexamination Certificate
active
08074097
ABSTRACT:
A system and method for analyzing and/or testing member devices in a multi-device system. The multi-device system includes a device-under-analysis (DUA) and a device-under-observation (DUO). An analyzer that is external to the multi-device system generates and sends test messages to the DUA. The analyzer monitors the health of the multi-device system through the DUO and detects a system-wide impact of the DUA caused by the test messages. The analyzer analyzes the DUA based on the test messages and the system-wide impact.
REFERENCES:
patent: 5067104 (1991-11-01), Krishnakumar et al.
patent: 5459837 (1995-10-01), Caccavale
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5892903 (1999-04-01), Klaus
patent: 6088804 (2000-07-01), Hill et al.
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6363477 (2002-03-01), Fletcher et al.
patent: 6574737 (2003-06-01), Kingsford et al.
patent: 6584569 (2003-06-01), Reshef et al.
patent: 6609205 (2003-08-01), Bernhard et al.
patent: 6654914 (2003-11-01), Kaffine et al.
patent: 6952779 (2005-10-01), Cohen et al.
patent: 7152105 (2006-12-01), McClure et al.
patent: 7159151 (2007-01-01), Morgan et al.
patent: 7178166 (2007-02-01), Taylor et al.
patent: 7185232 (2007-02-01), Leavy et al.
patent: 7243148 (2007-07-01), Keir et al.
patent: 7257630 (2007-08-01), Cole et al.
patent: 7272650 (2007-09-01), Elgebaly et al.
patent: 7290145 (2007-10-01), Falkenthros
patent: 7315801 (2008-01-01), Dowd et al.
patent: 7342892 (2008-03-01), Soon et al.
patent: 7346922 (2008-03-01), Miliefsky
patent: 7421621 (2008-09-01), Zambrana
patent: 7447966 (2008-11-01), Kamannavar et al.
patent: 7451488 (2008-11-01), Cooper et al.
patent: 7471999 (2008-12-01), Taki
patent: 7509675 (2009-03-01), Aaron
patent: 7512125 (2009-03-01), Betts et al.
patent: 7536456 (2009-05-01), Williams et al.
patent: 7536605 (2009-05-01), Keaffaber et al.
patent: 7543056 (2009-06-01), McClure et al.
patent: 7607170 (2009-10-01), Chesla
patent: 7624422 (2009-11-01), Williams et al.
patent: 7627891 (2009-12-01), Williams et al.
patent: 7627900 (2009-12-01), Noel et al.
patent: 7664845 (2010-02-01), Kurtz et al.
patent: 7673043 (2010-03-01), Keir et al.
patent: 7774637 (2010-08-01), Beddoe et al.
patent: 7954161 (2011-05-01), Guruswamy et al.
patent: 7958230 (2011-06-01), Guruswamy et al.
patent: 7958560 (2011-06-01), Guruswamy
patent: 2001/0034847 (2001-10-01), Gaul, Jr.
patent: 2002/0157041 (2002-10-01), Bennett et al.
patent: 2003/0051163 (2003-03-01), Bidaud
patent: 2003/0154399 (2003-08-01), Zuk et al.
patent: 2003/0159063 (2003-08-01), Apfelbaum et al.
patent: 2004/0001443 (2004-01-01), Soon et al.
patent: 2004/0068586 (2004-04-01), Xie et al.
patent: 2004/0068675 (2004-04-01), Liu
patent: 2004/0103315 (2004-05-01), Cooper et al.
patent: 2004/0205557 (2004-10-01), Bahrs et al.
patent: 2004/0230881 (2004-11-01), Gwak
patent: 2005/0015213 (2005-01-01), Somervill et al.
patent: 2005/0044418 (2005-02-01), Miliefsky
patent: 2005/0135391 (2005-06-01), Sung
patent: 2005/0144137 (2005-06-01), Kumar et al.
patent: 2005/0195820 (2005-09-01), Betts et al.
patent: 2005/0248457 (2005-11-01), Himberger et al.
patent: 2005/0273772 (2005-12-01), Matsakis et al.
patent: 2005/0273854 (2005-12-01), Chess et al.
patent: 2005/0273859 (2005-12-01), Chess et al.
patent: 2006/0005231 (2006-01-01), Zuk et al.
patent: 2006/0015941 (2006-01-01), McKenna
patent: 2006/0015943 (2006-01-01), Mahieu
patent: 2006/0021034 (2006-01-01), Cook
patent: 2006/0021044 (2006-01-01), Cook
patent: 2006/0021045 (2006-01-01), Cook
patent: 2006/0021046 (2006-01-01), Cook
patent: 2006/0021047 (2006-01-01), Cook
patent: 2006/0021048 (2006-01-01), Cook et al.
patent: 2006/0021049 (2006-01-01), Cook
patent: 2006/0036755 (2006-02-01), Abdullah et al.
patent: 2006/0080733 (2006-04-01), Khosmood et al.
patent: 2006/0085723 (2006-04-01), Bartz et al.
patent: 2006/0098579 (2006-05-01), Chang et al.
patent: 2006/0106939 (2006-05-01), Cha et al.
patent: 2006/0137009 (2006-06-01), Chesla
patent: 2006/0277606 (2006-12-01), Yunus et al.
patent: 2007/0006037 (2007-01-01), Sargusingh et al.
patent: 2007/0011319 (2007-01-01), McClure et al.
patent: 2007/0086389 (2007-04-01), Park et al.
patent: 2007/0094728 (2007-04-01), Julisch et al.
patent: 2007/0115962 (2007-05-01), Mammoliti et al.
patent: 2007/0174917 (2007-07-01), Guruswamy
patent: 2007/0204347 (2007-08-01), Caceres et al.
patent: 2008/0005555 (2008-01-01), Lotem et al.
patent: 2008/0072322 (2008-03-01), Guruswamy
patent: 2008/0092237 (2008-04-01), Yoon et al.
patent: 2008/0098479 (2008-04-01), O'Rourke et al.
patent: 2008/0120283 (2008-05-01), Liu et al.
patent: 2008/0155338 (2008-06-01), Rusmanov
patent: 2008/0282352 (2008-11-01), Beddoe et al.
patent: 2009/0083854 (2009-03-01), Bozanich et al.
patent: 2009/0271863 (2009-10-01), Govindavajhala et al.
patent: 2009/0320137 (2009-12-01), White et al.
patent: 2009/0328190 (2009-12-01), Liu et al.
patent: 2010/0106742 (2010-04-01), Guruswamy et al.
patent: 2010/0284282 (2010-11-01), Golic
patent: 2010/0284283 (2010-11-01), Golic et al.
patent: 2010/0293415 (2010-11-01), Beddoe et al.
patent: 2006/099536 (2006-09-01), None
U.S. Appl. No. 11/760,600, filed Jun. 8, 2007.
U.S. Appl. No. 11/696,605, filed Apr. 4, 2007.
U.S. Appl. No. 11/351,403, filed Jun. 10, 2006.
Wagner, D. et al., “Intrusion Detection Via Static Analysis”, IEEE Symposium on Security and Privacy, 2001, pp. 156-168.
Finlay, I. et al., “Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)”, Cert® Advisory CA-2002-03, Pittsburgh, PA, US.
Griffin, J.L., “Testing Protocol Implementation Robustness”, Published in the Proceedings of 29th Annual International Symposium on Fault-Tolerant Computing (FTC), Jun. 15-18, 1999, Madison, Wisconsin, US.
Kaksonen, R., “A Functional Method for Assessing Protocol Implementation Security”, VTT Publications 448, 2011, 128 p.+app. 15p., Technical Research Centre of Finland, FI.
Kaksonen, R., “Software Security Assessment through Specification Mutations and Fault Injection”, Proceedings of the Int'l Federation for Information Processing (IFIP), TC-6/TC-11 Fifth Joint Int'l Working Conference on Communications and Multimedia Security (CMS'01), May 21-22, 2001, Darmstadt, Germany, pp. 173-183.
Miller, B. et al., “Fuzz Revisited: A Re-examination of the Reliabiltiy of Unix Utilities and Services”, Computer Sciences Department, Oct. 1995, pp. 1-23, Madison, Wisconsin, US.
PROTOS Test-Suite: c06-snmpv1, University of Oulu (ee.oulu.fi)—http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index, Oct. 17, 2002, pp. 1-26, Finland.
PROTOS Test-Suite: c06-Idapv3, University of Oulu (ee.oulu.fi)—http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/Idapv3/index.html, Dec. 2001, p. 1-13, Finland.
Beddoe, M., “Network Protocol Analysis using Bioinformatics Algorithms”, 2004, retrieved on May 17, 2007, from <URL: http://www.4tphi.net/˜awalters/PI/pi.pdf>.
Case, J. et al., “A Simple Network Management Protocol (SNMP)” (RFC 1157), May 1990, retrieved on May 17, 2007, from <URL: http://www.faqs.org/rfcs/rfc1157.html>.
Marquis, S., et al., “SCL: A Language for Security Testing of Network Applications”, Proceedings: 15th IBM Centre for Advanced Studies Conference (CASCON), Toronto, Canada, Oct. 2005, pp. 155-164, retrieved on May 17, 2007, from <URL: http://post.queensu.ca/˜trd/research/papers/marquisSCL.pdf>.
McCloghrie K. et al., “Structure of Management Information Version 2 (SMIv2)” (RFC 2578), Apr. 1999, retrieved on May 17, 2007, from <URL: http://www.faqs.org/rfcs/rfc2578.html>.
Nevill-Manning, C. et al., “Identifying Hierarchical Structure in Sequences: A linear-time algorithm”, Journal of Artificial Intelligence Research, vol. 7, Sep. 1997, pp. 67-82, retrieved on May 17, 2007, from <URL: http://arxiv.org/abs/cs/9709102>.
Tal, O. et al., “Syntax-based Vulnerability Te
Beddoe Marshall A.
Maufer Thomas A.
Ehne Charles
K&L Gates LLP
MU Dynamics, Inc.
LandOfFree
Meta-instrumentation for security analysis does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Meta-instrumentation for security analysis, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Meta-instrumentation for security analysis will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4309324