Electrical computers and digital processing systems: multicomput – Computer-to-computer protocol implementing – Computer-to-computer data transfer regulating
Reexamination Certificate
2011-03-29
2011-03-29
Najjar, Saleh (Department: 2455)
Electrical computers and digital processing systems: multicomput
Computer-to-computer protocol implementing
Computer-to-computer data transfer regulating
C709S224000, C709S225000, C370S229000, C370S230000, C370S235000
Reexamination Certificate
active
07917647
ABSTRACT:
A method and apparatus for a network monitor internals mechanism, which serves to translate packet data into multiple concurrent streams of encoded network event data, to contribute to enterprise management, reporting, and global mechanisms for aggregating monitors at a centralized aggregation point, and to facilitate rate limiting techniques because such monitors are not in control (i.e. cannot back pressure flow) is provided.
REFERENCES:
patent: 5262956 (1993-11-01), DeLeeuw
patent: 5557747 (1996-09-01), Rogers et al.
patent: 5679940 (1997-10-01), Templeton et al.
patent: 5701400 (1997-12-01), Amado
patent: 5751965 (1998-05-01), Mayo et al.
patent: 5781629 (1998-07-01), Haber et al.
patent: 5819226 (1998-10-01), Gopinathan et al.
patent: 5825361 (1998-10-01), Rubin et al.
patent: 5867483 (1999-02-01), Ennis, Jr. et al.
patent: 5870561 (1999-02-01), Jarvis et al.
patent: 5872928 (1999-02-01), Lewis et al.
patent: 5887139 (1999-03-01), Madison, Jr. et al.
patent: 5960460 (1999-09-01), Marasco et al.
patent: 5978475 (1999-11-01), Schneier et al.
patent: 5983270 (1999-11-01), Abraham et al.
patent: 5987611 (1999-11-01), Freund
patent: 5991877 (1999-11-01), Luckenbaugh
patent: 6026397 (2000-02-01), Sheppard
patent: 6049621 (2000-04-01), Jain et al.
patent: 6058193 (2000-05-01), Cordery et al.
patent: 6064304 (2000-05-01), Arrowsmith et al.
patent: 6064810 (2000-05-01), Raad et al.
patent: 6065119 (2000-05-01), Standford, II et al.
patent: 6069563 (2000-05-01), Kadner et al.
patent: 6091835 (2000-07-01), Smithies et al.
patent: 6108782 (2000-08-01), Fletcher et al.
patent: 6119103 (2000-09-01), Basch et al.
patent: 6134532 (2000-10-01), Lazarus et al.
patent: 6157707 (2000-12-01), Baulier et al.
patent: 6212558 (2001-04-01), Antur et al.
patent: 6263349 (2001-07-01), Anderson
patent: 6269447 (2001-07-01), Maloney et al.
patent: 6271845 (2001-08-01), Richardson
patent: 6279037 (2001-08-01), Tams et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6317788 (2001-11-01), Richardson
patent: 6381649 (2002-04-01), Carlson
patent: 6442615 (2002-08-01), Nordenstam et al.
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6463470 (2002-10-01), Mohaban et al.
patent: 6484143 (2002-11-01), Swildens et al.
patent: 6484261 (2002-11-01), Wiegel
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 6502131 (2002-12-01), Vaid et al.
patent: 6505245 (2003-01-01), North et al.
patent: 6526044 (2003-02-01), Cookmeyer, II et al.
patent: 6578077 (2003-06-01), Rakoshitz et al.
patent: 6636873 (2003-10-01), Carini et al.
patent: 6651099 (2003-11-01), Dietz et al.
patent: 6665725 (2003-12-01), Dietz et al.
patent: 6704873 (2004-03-01), Underwood
patent: 6711699 (2004-03-01), Kanevsky et al.
patent: 6738933 (2004-05-01), Fraenkel et al.
patent: 6771646 (2004-08-01), Sarkissian et al.
patent: 6789116 (2004-09-01), Sarkissian et al.
patent: 6792458 (2004-09-01), Muret et al.
patent: 6816973 (2004-11-01), Gleichauf et al.
patent: 6839751 (2005-01-01), Dietz et al.
patent: 6901442 (2005-05-01), Schwaller et al.
patent: 6954789 (2005-10-01), Dietz et al.
patent: 7007301 (2006-02-01), Croebie et al.
patent: 7020697 (2006-03-01), Goodman et al.
patent: 7047423 (2006-05-01), Maloney et al.
patent: 7047564 (2006-05-01), Cohen
patent: 7054930 (2006-05-01), Cheriton
patent: 7143439 (2006-11-01), Cooper
patent: 7207062 (2007-04-01), Brustoloni
patent: 7272646 (2007-09-01), Cooper
patent: 2001/0054097 (2001-12-01), Chafe
patent: 2002/0093527 (2002-07-01), Sherlock et al.
patent: 2002/0108059 (2002-08-01), Canion et al.
patent: 2002/0188584 (2002-12-01), Ghannam et al.
patent: 2003/0061506 (2003-03-01), Cooper et al.
patent: 2003/0208689 (2003-11-01), De La Garza
patent: 2004/0015579 (2004-01-01), Cooper
patent: 2004/0039942 (2004-02-01), Cooper et al.
patent: 2004/0103315 (2004-05-01), Cooper et al.
patent: 2005/0195964 (2005-09-01), Hahn et al.
patent: 0782112 (1997-07-01), None
patent: 0669032 (1997-11-01), None
patent: 0849909 (1998-06-01), None
patent: 0893763 (1999-01-01), None
patent: 0909074 (1999-04-01), None
patent: 0961440 (1999-12-01), None
patent: 1026867 (2000-08-01), None
patent: 1050833 (2000-11-01), None
patent: 1143660 (2001-10-01), None
patent: 2335829 (1999-09-01), None
patent: WO-93/11480 (1993-06-01), None
patent: WO-98/26541 (1998-06-01), None
patent: WO-99/15950 (1999-04-01), None
patent: WO-9922492 (1999-05-01), None
patent: WO-99/67930 (1999-12-01), None
patent: WO-00/05842 (2000-02-01), None
patent: WO-00/35130 (2000-06-01), None
patent: WO-01/99002 (2001-12-01), None
patent: WO-01/99031 (2001-12-01), None
patent: WO-01/99343 (2001-12-01), None
patent: WO-01/99349 (2001-12-01), None
patent: WO-01/99371 (2001-12-01), None
patent: WO-01/99373 (2001-12-01), None
patent: WO-02/071192 (2002-09-01), None
“Workstation NT—Recovery Tips for Windows NT Workstation”, [online}. [archived Oct. 12, 1999]. Retrieved from the Internet: <URL: http://web.archive.org/web/19991012224636/http://personal.cfw.com/˜tkprit/utils/recovery.html>, (1999), 4 pgs.
Briody, D., “IT Managers Weigh Legal Issues”,InfoWorld 21, vol. 36, No. 69, (Sep. 6, 1999), 69-70.
Castell, S., “The Legal Admissibilty of Computer Generated Evidence Towards ‘Legally Reliable’ Information and Communications Technology”,Computer Law and Security Report, vol. 5, No. 2, (Jul.-Aug. 1989), 2-8.
Chatterjee, B., et al., “Taxonomy for QoS Specifications”,Proceedings, Third International Workshop on Object-Oriented Real-Time Dependable Systems, (1997), 100-107.
Cockcroft, A., “Observability”,Sun BluePrints tm OnLine, © 1999 Sun Microsystems, Inc., (Dec. 1999), 21 pgs.
Deri, L., “Effective Traffic Measurement Using nTop”,IEEE Communications Magazine, (May 2000), 138-143.
Goodwin, B., “Cybercrime—An Inside Job”,Computer Weekly, vol. 16, (Aug. 31, 2000), 3 pgs.
Guttman, E., “Service Location Protocol: Automatic Discovery of IP Network Services”,IEEE Internet Computing, (Jul. Aug. 1999), 71-80.
Heaney, J., et al., “Security Model Development Environment”,Fifth Annual Computer Security Applications Conference, (Dec. 4, 1989-Dec. 8, 1989, Tucson, AZ), (1990), 299-307.
Hosmer, C., et al., “Advancing Crime Scene Computer Forensic Techniques”,Proceedings of the 1998 Investigation and Forensic Science Technologies, [online]. [archived Jan. 4, 2001]. Retrieved from the Internet: <http://web.archive.org/web/20010104101500/http://www.wetstonetech.com/crime.htm>, (1999), 14 pgs.
Jackson, W., “When It Comes to Web Site Vandalism, Attackers Target Microsoft Software”,Government Computer News, vol. 19, No. 31, (Oct. 23, 2000), 2 pgs.
Larsen, A. K., “All Eyes on IP Traffic New apps can monitor internet and intranet traffic, but do they deliver enough data to hold ISPs to their promises”,Data Communications, 26(4), (Mar. 21, 1997), 5 pgs.
Lee, W., ““?”: A Context-Sensitive Help System based on Hypertext”,Proceedings of the 24th ACM/IEEE Design Automation Conference, (1987), 429-435.
Lin, H.-C., et al., “An Algorithm for Automatic Topology Discovery of IP Networks”,IEEE International Conference on Communications(ICC '98), vol. 2, (1998), 1192-1196.
Murray, B., “Army Debuts IT Crime Unit”,Government Computer News, 19(20), (Jul. 20, 2000), 3 pgs.
Santo, B., “‘Sherlock Holmes of Software’ Bridges Technical and Legal Guff in Cracking IP-Theft Cases-Software Forensics Expert Takes a Byte Out of Crime”,Electronics Engineering Times, vol. 987, (1998), 3 pgs.
Slabodkin, G., “AF Computer Forensics Lab nabs criminats, byte by byte”,Government News, 17(25), (Aug. 10, 1998), 2 pgs.
Sommer, P., “Intrusion Detection System as Evidence”,Computer Networks, 13(23-24), (1999), 2477-2487.
Sommer, P., “Investigating Cyberspace”,Computer Weekly, (Jan. 27, 2000), 4 pgs.
Tadjer, R., “Safeguard Your IT Assets—You Can Prosecut
Cooper Geoffrey
Hoy Mark
Sherlock Kieran G.
Kim Edward J
McAfee, Inc.
Najjar Saleh
Schwegman, Lundberg & Woessener, P.A.
LandOfFree
Method and apparatus for rate limiting does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for rate limiting, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for rate limiting will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2649402