Mixed enclave operation in a computer network

Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network access regulating

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S219000, C709S250000

Reexamination Certificate

active

07624180

ABSTRACT:
A method is disclosed for mixed enclave operation of a computer network with users employing a multi-level network security interface and users without any network security interface. Either the network security user selects or the network security interface automatically selects whether communications are permissible with other unsecured users. Where a mixed enclave operation is selected, the network security user identifies when communications are being undertaken with another secured user or a non-secured user. Communications with a non-secured user at a lower security level entail securing the data residing with the secured user from transmission back to the non-secured user.

REFERENCES:
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4694492 (1987-09-01), Wirstrom et al.
patent: 4799153 (1989-01-01), Hann et al.
patent: 4882752 (1989-11-01), Lindman et al.
patent: 4885789 (1989-12-01), Burger et al.
patent: 4896319 (1990-01-01), Lidinsky et al.
patent: 4924513 (1990-05-01), Herbison et al.
patent: 4962449 (1990-10-01), Schlesinger
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5056140 (1991-10-01), Kimbell
patent: 5075884 (1991-12-01), Sherman et al.
patent: 5111390 (1992-05-01), Ketcham
patent: 5113499 (1992-05-01), Ankney et al.
patent: 5126728 (1992-06-01), Hall
patent: 5163147 (1992-11-01), Orita
patent: 5204961 (1993-04-01), Barlow
patent: 5249212 (1993-09-01), Covey et al.
patent: 5249231 (1993-09-01), Covey et al.
patent: 5253294 (1993-10-01), Maurer
patent: 5272754 (1993-12-01), Boerbert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5283828 (1994-02-01), Saunders et al.
patent: 5287519 (1994-02-01), Dayan et al.
patent: 5295266 (1994-03-01), Hinsley et al.
patent: 5323146 (1994-06-01), Glaschick
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5369702 (1994-11-01), Shanton
patent: 5369707 (1994-11-01), Follendore, III
patent: 5375244 (1994-12-01), McNair
patent: 5410543 (1995-04-01), Seitz et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5414844 (1995-05-01), Wang
patent: 5416842 (1995-05-01), Aziz
patent: 5434920 (1995-07-01), Cox et al.
patent: 5442702 (1995-08-01), van Ooijen et al.
patent: 5455861 (1995-10-01), Faucher et al.
patent: 5473696 (1995-12-01), van Breemen et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5515441 (1996-05-01), Faucher
patent: 5519704 (1996-05-01), Farinacci et al.
patent: 5533123 (1996-07-01), Force et al.
patent: 5535276 (1996-07-01), Ganesan
patent: 5537544 (1996-07-01), Morisawa et al.
patent: 5544245 (1996-08-01), Tsubakiyama
patent: 5548721 (1996-08-01), Denslow
patent: 5550984 (1996-08-01), Gelb
patent: 5555373 (1996-09-01), Dayan et al.
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5574912 (1996-11-01), Hu et al.
patent: 5577209 (1996-11-01), Boyle et al.
patent: 5586260 (1996-12-01), Hu
patent: 5590266 (1996-12-01), Carson et al.
patent: 5596718 (1997-01-01), Boebert
patent: 5602918 (1997-02-01), Chen et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5619657 (1997-04-01), Sudama et al.
patent: 5623601 (1997-04-01), Vu
patent: 5652908 (1997-07-01), Douglas et al.
patent: 5680461 (1997-10-01), McManis
patent: 5689566 (1997-11-01), Nguyen
patent: 5692124 (1997-11-01), Holden et al.
patent: 5708655 (1998-01-01), Toth et al.
patent: 5712914 (1998-01-01), Aucsmith et al.
patent: 5774551 (1998-06-01), Wu et al.
patent: 5781550 (1998-07-01), Templin et al.
patent: 5781632 (1998-07-01), Odom
patent: 5784566 (1998-07-01), Viavant et al.
patent: 5793866 (1998-08-01), Brown et al.
patent: 5796424 (1998-08-01), Ely
patent: 5796727 (1998-08-01), Harrison et al.
patent: 5826014 (1998-10-01), Coley et al.
patent: 5828832 (1998-10-01), Holden et al.
patent: 5832228 (1998-11-01), Holden et al.
patent: 5835724 (1998-11-01), Smith
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5889866 (1999-03-01), Cyras et al.
patent: 5896499 (1999-04-01), McKelvey
patent: 5898784 (1999-04-01), Kirby et al.
patent: 5905736 (1999-05-01), Ronen et al.
patent: 5940591 (1999-08-01), Boyle et al.
patent: 5963915 (1999-10-01), Kirsch
patent: 5983350 (1999-11-01), Minear et al.
patent: 6003084 (1999-12-01), Green et al.
patent: 6067620 (2000-05-01), Holden et al.
patent: 6070198 (2000-05-01), Krause et al.
patent: 6088450 (2000-07-01), Davis et al.
patent: 6088451 (2000-07-01), He et al.
patent: 6141758 (2000-10-01), Benantar et al.
patent: 6272538 (2001-08-01), Holden et al.
patent: 6272639 (2001-08-01), Holden et al.
patent: 6282652 (2001-08-01), Scheifler
patent: 6408336 (2002-06-01), Schneider et al.
patent: 6643698 (2003-11-01), Holden et al.
patent: 6760768 (2004-07-01), Holden et al.
patent: 6993582 (2006-01-01), Holden et al.
patent: 7475137 (2009-01-01), Holden et al.
patent: 0436799 (1991-07-01), None
Lu et al., “A Model for Multilevel Security in Computer Networks”, IEEE, Mar. 1988, pp. 1095-1104.
Mitze, Bob, Security Through Software (Unix System V/MLS Multi-Level Security O/S), Exe, v4, No. 6, p. S3 (1); Nov. 1989.
Nagaki, Junior A. et al., “Integration of Digital, Voice, and Video Data on a Multilevel Secure Fiber Optic Network,” 1985 IEEE Military Communications Conference (MILCOM '85) “The Electronic Battle: A New Era in Military Communications,” Oct. 20-23, 1985 Boston, MA, pp. 215-219.
Palmer, Scott, “Microsoft OS-2 to Conform to Posix, C2 Security Level,” Fed. Comp. Week, v3, No. 15, p. 6(1); Apr. 10, 1989 (abstract).
Watts, Jan, “Network Communications,” (OSI Model); PC-Computing, v4, No. 1, p. 164(2); Jan. 1991.
“Toshiba's Cryptogate Software Enables Creation of Virtual Private Networks”, Technology, Feb. 5, 1997, 2 pages.
D. D. Schnackenberg, “Development of a Multilevel Secure Local Area Network” from the proceedings of the 8th National Computer Security Conference on Sep. 30, 1985, pp. 97-101.
Data Sheet, published by the National Computer Security Center at Fort Meade, Maryland, dated jul. 25, 1990, describing the Verdix Secure Local Area Network (VSLAN), 10 pages.
Dinkel, et al., “Prototyping SP4 a Security Data Network System Transport Protocol Interoperability Demonstration Project”, NISTIR 90-4228, 1990, 20 pages.
G. Lawton, “S/WAN Swims Along”, Sun World, Jun. 1996, 7 pages.
IEEE Journal on “Selected Areas in Communications”; Feb. 1989; vol. 7, No. 2; 9 pages.
J. M. Rushby et al., “A Distributed Secure System”, IEEE, 1983, pp. 127-135.
Jan P. Kruys, “Security of Open Systems”, Computers and Security 8 (1989), pp. 139-147.
Kent, et al., “RFC 2401 - Security Architecture for the Internet Protocol”, Network Working Group, Nov. 1998, 51 pages.
Maughan, et al., Internet Security Association and Key Management Protocol (ISAKMP), Network Working Group, Nov. 1998, 81 pages.
Morrie Grasser et al., “The Digital Distributed System Security Architecture” 1990 IEEE Conference on Security and Privacy, pp. 305-319.
NCR Unveils Top End; Distributed transaction Processing Management System Brings mainframe-Class OLTP to Open Systems, (Online Transaction Processing), published Jan. 82, 1991, in the work Group Computing Report, 2 pages.
NTIS; Secure Computer Network; Nov. 1982; 118 pages.
Pau-Chen Cheng et al., “On the Formal Specification and Verification of a Multiparty Session Protocol,” IEEE, 1990, pp. 216-233.
Phillip C. Stover, “Designing Multilevel Secure Networks” Boeing Aerospace Company.
Proceeding of Tri Com '91; IEEE Conference on Communications Software: Communications For Distributed Applications and Systems; Apr. 18-19, 1991; 17 pages.
R. Atkins, “IP Authentication Header”, Naval Research Laboratory, Aug 1995, 13 pages.
R. Atkins, “IP Encapsulating Security Payload (ESP)”,Naval Research Laboratory, Aug. 1995, 10 pages.
Ruth Nelson et al., “Sons Architecture and End-to-End Encryption”, of GTE Government System Corporation Electronic Defense Communications Division dated 1989, pp. 356-366.
V. L. Voydock et al., “Security Mecha

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mixed enclave operation in a computer network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mixed enclave operation in a computer network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mixed enclave operation in a computer network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4107801

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.