Method and apparatus for determining enforcement security...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S238000, C709S242000, C370S254000, C370S255000, C370S256000

Reexamination Certificate

active

07082531

ABSTRACT:
Enforcement firewalls and other security devices are located on a network for a given source node and destination node. Nodes in the network topology are programmatically identified as being part of a non-looping communication path between the source node and the destination node. These nodes may be part of a path closure set. Security devices that are part of the path closure set are identified as the enforcement security devices for the given source and destination node.

REFERENCES:
patent: 5825772 (1998-10-01), Dobbins et al.
patent: 5881243 (1999-03-01), Zaumen et al.
patent: 6084858 (2000-07-01), Matthews et al.
patent: 6115753 (2000-09-01), Joens
patent: 6167444 (2000-12-01), Boden et al.
patent: 6185619 (2001-02-01), Joffe et al.
patent: 6225999 (2001-05-01), Jain et al.
patent: 6246689 (2001-06-01), Shavitt
patent: 6256295 (2001-07-01), Callon
patent: 6286038 (2001-09-01), Reichmeyer
patent: 6298044 (2001-10-01), Britt
patent: 6412000 (2002-06-01), Riddle et al.
patent: 6484261 (2002-11-01), Wiegel
patent: 6502131 (2002-12-01), Vaid et al.
patent: 6633915 (2003-10-01), Hashimoto
patent: 6646989 (2003-11-01), Khotimsky et al.
patent: 6697338 (2004-02-01), Breitbart et al.
patent: 6760775 (2004-07-01), Anerousis et al.
patent: 6857026 (2005-02-01), Cain
patent: 6871284 (2005-03-01), Cooper et al.
patent: 6909709 (2005-06-01), Mesiwala
patent: 2002/0062359 (2002-05-01), Klopp et al.
patent: 2002/0161888 (2002-10-01), McGuire
patent: 2003/0016679 (2003-01-01), Adams et al.
patent: 2003/0070070 (2003-04-01), Yeager et al.
patent: 2003/0172145 (2003-09-01), Nguyen
patent: 2004/0030796 (2004-02-01), Cooper et al.
patent: 2005/0086300 (2005-04-01), Yeager
patent: 2005/0105524 (2005-05-01), Stevens et al.
Cormen et al,“Introduction to Algorithms”, 1990,McGraw-Hill Book Company, pp. 465 and 477-485.
http://www.cs.oberlin.edu/classes/dragn/labs/greedy/greedy0.html (last visited: Apr. 7, 2005).
http://www.cee.hw.ac.uk/˜alison/ai3notes/paragraph2—6—2—1—0—1.html (last visited: Apr. 7, 2005).
http://www2.toki.or.id/book/AlgDesignManual/BOOK/BOOK2/NODE65.HTM (last visited: Apr. 7, 2005).
Garcia-Luna-Aceves et al, “A Path-Finding Algorithm for Loop-Free Routing”, Feb. 1997, IEEE/ACM Transaction s on Networking, vol. 5.
Garcia-Luna-Aceves et al, “Distributed, Scalable Routing Based on Vectors of Link States”, Oct. 1995, IEEE Journal on Selected Areas in Communications, vol. 13, No. 8, pp. 1383-1395.
Cisco Systems, “Cisco Secure Policy Manager2.3,” Cisco Systems Data Sheet, Copyright 1992-2001, pp. 1-6.
U.S. Appl. No. 10/197,301, filed Jul. 15, 2002.
U.S. Appl. No. 09/872,056, filed May 31, 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for determining enforcement security... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for determining enforcement security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for determining enforcement security... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3589244

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.