Information security – Policy
Reexamination Certificate
2011-01-18
2011-01-18
Zand, Kambiz (Department: 2434)
Information security
Policy
C726S002000, C726S003000, C726S006000, C709S223000, C709S224000, C709S225000
Reexamination Certificate
active
07873984
ABSTRACT:
A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fiber Channel fabric. The network configuration device may control many functions. Foremost, it may control the recognition, operation and succession procedure for network configuration entities. It may also control user configurable options for the network, rules for interaction between other entities in the network, rules governing management-level access to the network, and rules governing management-level access to individual devices in the network. In addition, the network configuration entity may exploit policy sets to implement its control.
REFERENCES:
patent: 5422953 (1995-06-01), Fischer
patent: 5473599 (1995-12-01), Li et al.
patent: 5586267 (1996-12-01), Chatwani et al.
patent: 5619657 (1997-04-01), Sudama et al.
patent: 5694615 (1997-12-01), Thapar et al.
patent: 5793767 (1998-08-01), Soda et al.
patent: 5805801 (1998-09-01), Holloway et al.
patent: 6052456 (2000-04-01), Huang
patent: 6092189 (2000-07-01), Fisher et al.
patent: 6393484 (2002-05-01), Massarani
patent: 6574629 (2003-06-01), Cooke et al.
patent: 7280529 (2007-10-01), Black et al.
patent: 7457279 (2008-11-01), Scott et al.
patent: 7707278 (2010-04-01), Tafazolli et al.
patent: 2002/0099937 (2002-07-01), Tuomenoksa
patent: 2002/0174207 (2002-11-01), Battou
patent: 2003/0014548 (2003-01-01), Valentine et al.
patent: 2003/0028624 (2003-02-01), Hasan et al.
patent: 2003/0076846 (2003-04-01), Heinz et al.
patent: 2003/0105881 (2003-06-01), Symons et al.
patent: 2003/0208589 (2003-11-01), Yamamoto
patent: 2004/0015957 (2004-01-01), Zara et al.
patent: 2004/0243547 (2004-12-01), Chatrapati et al.
patent: 02001-148697 (2001-05-01), None
An Access-Based Clustering Protocol for Multihop Wireless Ad Hoc Networks, Ting-Chao Hou et al, Jul. 2001.
Daley, William M. “Entity Authentication Using Public Key Cryptography.” US Dept. of Commerce/ National Institute of Standards and Technology. (Feb. 18, 1997) 1-50.
Schneier, Bruce. “Applied Cryptography, Second Edition.” John Wiley and Sons (1996) 37-39, 185-187, & 574-576.
“Fibre Channel—Methodologies for Interconnects (FC-MI) Rev 1.8;” NCITS working draft proposed Technical Report 2001; Secretariat: Information Technology Industry Council; pp. 19-30; 41-44.
“Fibre Channel—Fabric Generic Requirements (FC-FG)” 1996; American National Standards Institute; pp. 6-21.
“Fibre Channel— Generic Services (FC-GS) Rev 3.1;” 1996; working draft proposed American National Standard for Information Systems; pp. 41-49.
“Fibre Channel—Generic Services—2 (FC-GS-2);” 1999; American National Standards Institute; pp. 43-51 and 69-79.
“Fibre Channel—Generic Services—3 (FC-GS-3);” 2001; Approved American National Standard; pp. 93-165.
“Fibre Channel—Generic Services—4 (FC-GS-4) Rev 7.1;” 2001; NCITS working draft proposed American National Standard for Information Technology; pp. 95-139 and 172-177.
“Fibre Channel—Switch Fabric (FC-SW) Rev 3.3;” 1997; NITS working draft proposed American National Standard for Information Technology; pp. 9-17 and 49-63.
“Fibre Channel—Switch Fabric—2 (FC-SW-2) Rev 5.3;” 2001; NCITS working draft proposed American National Standard for Information Technology; pp. 11-21 and 69-95.
“Fibre Channel—Framing and Signaling (FC-FS) Rev 1.7;” 2002; NCITS working draft proposed American National Standard for Information Technology; pp. 28-31 and 282-298.
“Fibre Channel—Physical and Signaling Interface (PC-PH) Rev 4.3;” 1994; working draft proposed American National Standard for Information Systems; pp. 15-25 and 248-259.
Final Office Action mailed Sep. 24, 2009 for corresponding U.S. Appl. No. 11/269,437.
Response to Final Office Mailed Sep. 24, 2009 for corresponding U.S. Appl. No. 11/269,437, filed Dec. 22, 2009.
Office Action mailed Apr. 6, 2009 for corresponding U.S. Appl. No. 11/269,331.
Response to Office Action mailed Apr. 6, 2009 for corresponding patent U.S. Appl. No. 11/269,331, filed Jul. 6, 2009.
Final Office Action mailed Oct. 27, 2009 for corresponding U.S. Appl. No. 11/269,331.
Failover. (1999). In Dictionary of Multimedia and Internet Applications: A Guide for Developers and Users. Retrieved from http://www.credoreference.com/entry/wdmia/failover.
Office Action mailed Apr. 13, 2009 for corresponding U.S. Appl. No. 11/269,365.
Response to Office Action mailed Apr. 13, 2009 for corresponding U.S. Appl. No. 11/269,365, filed Jul. 8, 2009.
Final Office Action mailed Oct. 28, 2009 for corresponding U.S. Appl. No. 11/269,365.
Balasubramanian Shankar
Hammons Richard L.
Kleinsteiber James
Nguyen Hung
Renganarayanan Vidya
Brocade Communications Systems, Inc.
Tabor Amare
Wong, Cabello, Lutsch, Rutherford & Brucculeri L.L.P.
Zand Kambiz
LandOfFree
Network security through configuration servers in the fabric... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Network security through configuration servers in the fabric..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network security through configuration servers in the fabric... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2684655