Information security – Access control or authentication
Reexamination Certificate
2002-01-11
2009-12-22
Revak, Christopher A (Department: 2431)
Information security
Access control or authentication
C726S001000, C726S005000, C726S006000, C726S014000, C713S168000, C713S170000, C709S223000, C709S225000
Reexamination Certificate
active
07636937
ABSTRACT:
Two or more access control lists that are syntactically or structurally different may be compared for functional or semantic equivalence in order to configure a security policy on a network. A first access control list is programmatically determined to be functionally equivalent to a second access control list for purpose of configuring or validating security policies on a network. In one embodiment, a box data representation facilitates comparing entries and sub-entries of the lists.
REFERENCES:
patent: 5220604 (1993-06-01), Gasser et al.
patent: 5677851 (1997-10-01), Kingdon et al.
patent: 5701458 (1997-12-01), Bsaibes et al.
patent: 5761669 (1998-06-01), Montague et al.
patent: 5822434 (1998-10-01), Caronni et al.
patent: 5825772 (1998-10-01), Dobbins et al.
patent: 5956715 (1999-09-01), Glasser et al.
patent: 6115753 (2000-09-01), Joens
patent: 6167444 (2000-12-01), Boden et al.
patent: 6185619 (2001-02-01), Joffe et al.
patent: 6225999 (2001-05-01), Jain et al.
patent: 6246689 (2001-06-01), Shavitt
patent: 6286038 (2001-09-01), Reichmeyer
patent: 6289013 (2001-09-01), Lakshman et al.
patent: 6298044 (2001-10-01), Britt
patent: 6301613 (2001-10-01), Ahlstrom et al.
patent: 6412000 (2002-06-01), Riddle et al.
patent: 6484261 (2002-11-01), Wiegel
patent: 6502131 (2002-12-01), Vaid et al.
patent: 6611863 (2003-08-01), Banginwar
patent: 6633915 (2003-10-01), Hashimoto
patent: 6646989 (2003-11-01), Khotimsky et al.
patent: 6651096 (2003-11-01), Gai et al.
patent: 6697338 (2004-02-01), Breitbart et al.
patent: 6760775 (2004-07-01), Anerousis et al.
patent: 6857018 (2005-02-01), Jiang
patent: 6871284 (2005-03-01), Cooper et al.
patent: 6880005 (2005-04-01), Bell et al.
patent: 6909709 (2005-06-01), Mesiwala
patent: 6910041 (2005-06-01), Exton et al.
patent: 7020718 (2006-03-01), Brawn et al.
patent: 7028098 (2006-04-01), Mate et al.
patent: 7039053 (2006-05-01), Freed et al.
patent: 7133914 (2006-11-01), Holbrook
patent: 7370351 (2008-05-01), Ramachandran et al.
patent: 7516475 (2009-04-01), Chen et al.
patent: 2002/0062359 (2002-05-01), Klopp et al.
patent: 2002/0099952 (2002-07-01), Lambert et al.
patent: 2002/0124053 (2002-09-01), Adams et al.
patent: 2002/0162030 (2002-10-01), Brezak et al.
patent: 2003/0070070 (2003-04-01), Yeager et al.
patent: 2003/0115196 (2003-06-01), Boreham et al.
patent: 2003/0115344 (2003-06-01), Tang et al.
patent: 2003/0172145 (2003-09-01), Nguyen
patent: 2003/0221004 (2003-11-01), Stupek et al.
patent: 2004/0030796 (2004-02-01), Cooper et al.
patent: 2005/0086300 (2005-04-01), Yeager et al.
patent: 2005/0105524 (2005-05-01), Stevens et al.
Cisco Systems, “Cisco Secure Policy Manager2.3,” Cisco Systems Data Sheet, Copyright 1992-2001, pp. 1-6. .
K. Lougheed, et al., “A Border Gateway Protocol (BGP)”, Network Working Group Request for Comments: 1105, Jun. 1989, pp. 1-5.
K. Lougheed, et al., “A Border Gateway Protocol (BGP)”, Network Working Group Request for Comments: 1163, Jun. 1990, pp. 1-28.
K. Lougheed, et al., “A Border Gateway Protocol 3 (BGP-3)”, Network Working Group Request for Comments: 1267, Oct. 1991, pp. 1-33.
Y. Rekhter, et al., “Application of the Border Gateway Protocol in the Internet”, Network Working Group Request for Comments: 1268, Oct. 1991, pp. 1-13.
S. Willis, et al., “Definitions of Managed Objects for the Border Gateway Protocol (Version 3)”, Network Working Group Request for Comments: 1269, Oct. 1991, pp. 1-8.
Y. Rekhter, et al., “Application of the Border Gateway Protocol in the Internet”, Network Working Group Request for Comments: 1655, Jul. 1994, pp. 1-12.
Y. Rekhter, et al., “Application of the Border Gateway Protocol in the Internet”, Network Working Group Request for Comments: 1772, Mar. 1995, pp. 1-18.
J. Moy, “OSPF protocol analysis”, Network Working Group Request for Comments: 1245, Jul. 1991, pp. 1-12.
J. Moy, “Experience with the OSPF protocol”, Network Working Group Request for Comments: 1246, Jul. 1991, pp. 1-29.
J. Moy, “OSPF Version 2”, Network Working Group Request for Comments: 1247, Jul. 1991, pp. 1-17.
G. Malkin, “RIP Version 2 Protocol Analysis”, Network Working Group Request for Comments: 1387, Jan. 1993, pp. 1-3.
G. Malkin, “RIP Version 2 Protocol Analysis”, Network Working Group Request for Comments: 1721, Nov. 1994, pp. 1-4.
Bhattacharya Partha
Chen Shigang
Cisco Technology Inc.
Hickman Palermo & Truong & Becker LLP
Moorthy Aravind K
Revak Christopher A
LandOfFree
Method and apparatus for comparing access control lists for... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for comparing access control lists for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for comparing access control lists for... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4111719