Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2007-01-23
2007-01-23
Revak, Christopher (Department: 2131)
Information security
Monitoring or scanning of software or data including attack...
C726S002000, C726S003000, C726S006000, C726S015000, C726S023000, C726S024000, C726S025000, C709S208000, C709S209000, C709S223000, C709S224000, C709S225000, C709S226000, C709S227000, C709S228000, C709S229000
Reexamination Certificate
active
09770525
ABSTRACT:
A method and apparatus for verifying the integrity of devices on a target network having two components: a subsystem connected to the target network, and a master system, isolated therefrom by a secure link. The topological and hierarchical relationship of the of the devices to each other improves stability of the apparatus. Random testing of target network devices by the subsystem and random testing of the subsystem by the master system provide verification and independent self-checking.
REFERENCES:
patent: 5796942 (1998-08-01), Esbensen
patent: 5909493 (1999-06-01), Motoyama
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6185689 (2001-02-01), Todd, Sr. et al.
patent: 6205551 (2001-03-01), Grosse
patent: 6205552 (2001-03-01), Fudge
patent: 6226372 (2001-05-01), Beebe et al.
patent: 6269447 (2001-07-01), Maloney et al.
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6304973 (2001-10-01), Williams
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6343362 (2002-01-01), Ptacek et al.
patent: 6738911 (2004-05-01), Hayes
Messmer, Cultivating Managed Security Outsourced Security Can Ease Admin., Jun. 10, 2002, Network World, p. 19.
Shipley, Enterprise-Class ISPs, 1998, Network Computing, p. 116.
Turner, E-Commerce Sites Under Heavy Attack From Hackers, Dec. 8, 1997, vol. 11, issue 24.
Rutrell, Managed Security Gets Sophisticated, 2001, Internet Week, p. 23.
Emigh, IBM Wheelgroup Partner to Thwart Net Hackers, Jul. 28, 1997, Newsbytes, p. 1-2.
Violino, Collapsing the Fortress Walls, 1997, Information Week, n. 635, p. 104.
Newton, Netwon's Telecom Dictionary, Mar. 1998, Flatiron Publishing, p. 636.
Higgins, Call in the Guards, Communications Week, 1997, p. 48.
Messmer, Cultivating Managed Security Outsourced Security Can Ease Admin., Jun. 10, 2002, Network World, p. 19.
Shipley, Enterprise-Class ISPs, 1998, Network Computing, p. 116.
Yasin, Managed Security Gets Sophisticated, 2001, Internet Week, p. 1-2.
Messmer, Security Needs Spawn Services, Apr. 3, 2000, Network World.
Electronic Commerce News, Phillips Business Information, Nov. 24, 1997, vol. 2, p. 1-2.
Giles, Internet Security, Mar. 1997, vol. 5, p. 22.
IBM Making E-Commerce Safer, More Reliable, Pc Week, Dec. 1, 1997, vol. 14, n50, p. 34.
Claderbank, 1996, Internet Security to Ship Realsecure, n714.
Livermore, Dec. 1996, National Info-Sec Technical Baseline, p. 1-23.
Carver, May 2000, p. 1-2.
AccessGuard, 2003, http://www.accessguard.nl/.
Shnackenberg, Jun. 2000, Infrastruction for Intrusion Detection and Response.
NetRanger User's Guide, version 2.1.1, Copyright © 1998 Cisco Systems, Inc., downloaded from web site: http://www.broadbandbuilders.com/application/pdf/en/us/guest/products/ps6038/c1676/ccmigration—09186a00800ee98e.pdf, printout date: Jun. 22, 2005, 334 pages.
Beaver Edward Mac
Guilfoyle Jeffrey J.
Hrabik Michael
Jackson Jenise E.
Revak Christopher
Solutionary, Inc.
Vishev, Esq. Anna
Wolff & Samson PC
LandOfFree
Method and apparatus for verifying the integrity and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for verifying the integrity and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for verifying the integrity and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3730256