Method of non-intrusive analysis of secure and non-secure...

Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network monitoring

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S227000

Reexamination Certificate

active

07543051

ABSTRACT:
Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be analyzed. The provided method involves non-intrusively copying data from a communication medium, reconstructing this data to a higher level of communication, such as the application level, grouping the data into sets, each set representing a session, and organizing the data for chosen sessions in hierarchical fashion which corresponds to the hierarchy of the communicated information. If monitored communications are encrypted, they are non-intrusively decrypted in real time. Hierarchically reconstructed session data is used by one or more plug-in applications, such as alarms, archival applications, visualization applications, script generation applications, abandonment monitoring applications, error detection applications, performance monitoring applications, and others.

REFERENCES:
patent: 5742819 (1998-04-01), Caccavale
patent: 6141699 (2000-10-01), Luzzi et al.
patent: 6219803 (2001-04-01), Casella et al.
patent: 6286030 (2001-09-01), Wenig et al.
patent: 6321264 (2001-11-01), Fletcher et al.
patent: 6549944 (2003-04-01), Weinberg et al.
patent: 6973489 (2005-12-01), Levy
patent: 7007092 (2006-02-01), Peiffer
patent: 7246101 (2007-07-01), Fu et al.
patent: 2002/0042828 (2002-04-01), Peiffer
patent: 2002/0083169 (2002-06-01), Aki et al.
patent: 2004/0039728 (2004-02-01), Fenlon et al.
patent: 2004/0068431 (2004-04-01), Smith et al.
patent: 2004/0078711 (2004-04-01), King et al.
patent: 2006/0025985 (2006-02-01), Vinberg et al.
patent: 2006/0089996 (2006-04-01), Peiffer
patent: 2007/0011321 (2007-01-01), Huntington et al.
Greifeneder, Bernd, “Revolutionizing Quality Assurance for e-Enterprise,” white paper, Seque Software, Inc., Aug. 16, 2002.
“TeaLeaf Technology® Technical White Paper TeaLeaf Integritea™,” white paper, Tealeaf Technology, Inc., Mar. 2002.
“Narus Platform: Open Collection,” web page, available at ‘http://www.narus.com/w/solutions/platform/collection.shtml’ (original date of publication unknown, printed on Sep. 8, 2003).
“Web Applications Fail constantly,” available at ‘http://www.tealeaf.com/solutions/dafault.asp’ (original date of publication unknown, printed on Sep. 8, 2003).
“Internal Applications,” web page, available at ‘http://www.tealeaf.com/solutions/internal—applications.asp’ (original date of publication unknown, printed on Sep. 8, 2003).
“B2B Applications,” available at ‘http://www.tealeaf.com/solutions/b2b—applications.asp’ (original date of publication unknown, printed on Sep. 8, 2003).
“B2C Applications,” web page, available at ‘http://www.tealeaf.com/solutions/b2c—applications.asp’ (original date of publication unknown, printed on Sep. 8, 2003).
“Industry Solutions,” web page, available at ‘http://www.tealeaf.com/solutions/industry—solutions/default.asp’ (original date of publication unknown, printed on Sep. 8, 2003).
International Search Report for International Applicatiion No. PCT/US04/16979, dated Apr. 18, 2007.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of non-intrusive analysis of secure and non-secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of non-intrusive analysis of secure and non-secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of non-intrusive analysis of secure and non-secure... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4143412

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.