Data processing: software development – installation – and managem – Software installation – Network
Reexamination Certificate
2008-04-01
2008-04-01
Ingberg, Todd (Department: 2193)
Data processing: software development, installation, and managem
Software installation
Network
C717S172000
Reexamination Certificate
active
07353511
ABSTRACT:
A first version of a program operating at a network site is updated by automatically downloading from a remote site any update for the program in response to an automated event. A downloaded update is installed to generate a second version of the program. The second version of the program is operated at the network site in place of the first version.
REFERENCES:
patent: 4456788 (1984-06-01), Kline et al.
patent: 5008814 (1991-04-01), Mathur
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5101402 (1992-03-01), Chiu et al.
patent: 5278901 (1994-01-01), Shieh et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5448724 (1995-09-01), Hayashi
patent: 5488715 (1996-01-01), Wainwright
patent: 5524238 (1996-06-01), Miller et al.
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5699428 (1997-12-01), McDonnal et al.
patent: 5699513 (1997-12-01), Feigen et al.
patent: 5715402 (1998-02-01), Iwamoto et al.
patent: 5715462 (1998-02-01), Iwamoto et al.
patent: 5732275 (1998-03-01), Kullick et al.
patent: 5754785 (1998-05-01), Lysik et al.
patent: 5790796 (1998-08-01), Sadowsky
patent: 5793763 (1998-08-01), Mayes et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5798706 (1998-08-01), Kraemer et al.
patent: 5805801 (1998-09-01), Holloway et al.
patent: 5826014 (1998-10-01), Coley et al.
patent: 5835911 (1998-11-01), Nakagawa et al.
patent: 5860012 (1999-01-01), Luu
patent: 5909581 (1999-06-01), Park
patent: 5919247 (1999-07-01), Van Hoff et al.
patent: 5919257 (1999-07-01), Trostle
patent: 5931046 (1999-08-01), Terada et al.
patent: 5931946 (1999-08-01), Terada et al.
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6006034 (1999-12-01), Heath et al.
patent: 6009274 (1999-12-01), Fletcher et al.
patent: 6052531 (2000-04-01), Waldin et al.
patent: 6123737 (2000-09-01), Sadowsky
patent: 6138153 (2000-10-01), Collins, III et al.
patent: 6154878 (2000-11-01), Saboff
patent: 6161218 (2000-12-01), Taylor
patent: 6167407 (2000-12-01), Nachenberg et al.
patent: 6256773 (2001-07-01), Bowman-Amuah
patent: 6324692 (2001-11-01), Fiske
patent: 6338149 (2002-01-01), Ciccone, Jr. et al.
patent: 6349311 (2002-02-01), Sobel et al.
patent: 6651249 (2003-11-01), Waldin et al.
“Open Problems in Computer Virus Research”, Steve R. White, IBM, Oct. 22, 1998, pp. 1-11.
Norton Antivirus, Symantec, User's Guide , 1995, Whole Manual.
Norton Antivirus for Netware, User's Guide, 1996, p. 12-1.
“Introduction to Algorithms,” by Thomas H. Cormen, Charles e. Leiserson, Ronald L. Rivest, Chap. 34, pp. 853-885, Copyright© 1990.
Preliminary Report on Advanced Security Audit Trail Analysis on UNIX, N. Habra et al., pp. 1-34 (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Sep. 1994.
“Use of A Taxonomy of Security Faults,” T. Aslam, et al., pp. 1-10, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Sep. 1996.
“Artificial Intelligence and Intrusion Detection: Current and Future Directions,” Jeremy Frank, pp. 1-12, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Jun. 1994.
“An application of Pattern Matching in Intrusion Detection”, S. Kumar, et al., pp. 1-55, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Jun. 1994.
“A Software Architecture to Support Misuse Intrusion Detection”, S. Kumar, et al., pp. 1-17, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Mar. 1995.
“Defending a Computer System Using Autonomous Agents”, M. Crosbie, et al., pp. 1-11, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Mar. 1994.
Master Thesis entitled USTAT A Real-time Intrusion Detection System for UNIX, University of California, K. Ilgun, pp. 1-204, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Nov. 1992.
“A Weakness in the 4.2BSD Unix TCP/IP Software”, R. Morris, 4 pages, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Feb. 1985.
“A Best-Case Network Performance Model”, S.M. Bellovin, pp. 1-10, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Feb. 1992.
“OARnet Security Procedures”, K. Varadhan, pp. 1-14, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Sep. 1992.
“Paving The Road To Network Security Or The Value Of Small Cobblestones”, H. Orman, et al., pp. 1-17, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), May 1994.
“Packets Found on an Internet”, S. Bellovin, pp. 1-6, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Aug. 1993.
“Security Problems in the TCP/IP Protocol Suite”, S.M. Bellovin, (reprinted from Computer Communication Review, vol. 19, No. 2, pp. 32-48) pp. 1-17, Apr. 1989.
“A Security Analysis of the NTP Protocol”, Matt Bishop, pp. 1-20, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), 1990.
“WAN-hacking with AutoHack-Auditing Security Behind the Firewall”, Alec Muffett, 14 pages, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Jun. 1995.
“ACMAINT: An Account Creation and Maintenance System for Distributed UNIX Systems”, D.A. Curry, et al., pp. 1-9, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Oct. 1990.
Masters Thesis entitled “Addressing Weaknessed In The Domain Name System Protocol”, Purdue University, Christoph Schuba, pp. 1-87., (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Aug. 1993.
Secure RPC Authentication (SRA) for TELNET and FTP, D.R. Safford, et al., pp. 1-5, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), 1993.
“Insertion, Evasion, and Denial of Service: Eluding Network Instrusion Detection”, T.H. Ptacek et al., pp. 1-63, Jan. 1998.
“A Method to Detect Intrusive Activity in a Networked Environment”, L.T. Heberlein et al.,Proc. of the 14th National Computer Security Conference, Oct. 1991, pp. 362-371., (found at http://seclab.cs.ucdavis.edu/papers.html), 1991.
“Internetwork Security Monitor: An Intrusion-Detection System for Large-Scale Networks”, L.T. Heberlein et al.,Proc. of the 15th National Computer Security Conference, Oct. 1992, pp. 262-271, 1992.
“Comparison Between Internet Security Scanner (ISS) 1.x and Internet Scanner 3.2”, by Internet Security Systems., (found at http://www.iss.net), 1996.
“Automated Tools for Testing Computer System Vulnerability”, W.T. Polk, 40 pages, Dec. 1992.
The Design of GrIDS: A Graph-Based Intrusion Detection System, S. Cheung et al.,U.C. Davis Computer Science Department Technical Report SCE-99-2, 1999, pp. 1-47, (found at http://seclab.cs.ucdavis.edu/papers.html.), Jan. 26 1999.
“Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-Invertible”, M. Bellare, et al.,Advances in Cryptology-Eurocrypt 98 Proceedings, Lecture Notes in Computer Science, vol. 1403 Springer-Verlat (1998) pp. 1-27, (found at http://seclab.cs.ucdavis.edu/papers.html.), Oct. 17, 1998.
“Detecting Distruptive Routers: A Distributed Network Monitoring Approach”, K.A. Bradley, et al.,Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 115-124 (found at http:://seclab.cs.ucdavis.edu/papers.html.), May 1998.
“Stack and Queue Integrity on Hostile Platforms”, P.T. Devanbu, et al.,IEEE Symposium on Security and Privacy, Oakland CA, (found at http://seclab.cs.ucdavis.edu/papers.html.), 1998.
“Techniques for Trusted Software Engineering”, P.T. Devanbu et al.,Proceedings of the 20th International Conference on Software Engineering, Kyoto, Japan, (found at http://seclab.cs.ucdavis.edu/papers.html.), 1998.
“Data Level Interference Detection in Database Systems”, R.W. Yip et al.,Proceedings of the 11th IEEE Computer Security Foundations Workshop, Ro
Baker & Botts L.L.P.
Cisco Technology Inc.
Ingberg Todd
LandOfFree
Method and system for dynamically distributing updates in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for dynamically distributing updates in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for dynamically distributing updates in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2781633