Network security through configuration servers in the fabric...

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000, C726S006000, C709S223000, C709S224000, C709S225000

Reexamination Certificate

active

07873984

ABSTRACT:
A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fiber Channel fabric. The network configuration device may control many functions. Foremost, it may control the recognition, operation and succession procedure for network configuration entities. It may also control user configurable options for the network, rules for interaction between other entities in the network, rules governing management-level access to the network, and rules governing management-level access to individual devices in the network. In addition, the network configuration entity may exploit policy sets to implement its control.

REFERENCES:
patent: 5422953 (1995-06-01), Fischer
patent: 5473599 (1995-12-01), Li et al.
patent: 5586267 (1996-12-01), Chatwani et al.
patent: 5619657 (1997-04-01), Sudama et al.
patent: 5694615 (1997-12-01), Thapar et al.
patent: 5793767 (1998-08-01), Soda et al.
patent: 5805801 (1998-09-01), Holloway et al.
patent: 6052456 (2000-04-01), Huang
patent: 6092189 (2000-07-01), Fisher et al.
patent: 6393484 (2002-05-01), Massarani
patent: 6574629 (2003-06-01), Cooke et al.
patent: 7280529 (2007-10-01), Black et al.
patent: 7457279 (2008-11-01), Scott et al.
patent: 7707278 (2010-04-01), Tafazolli et al.
patent: 2002/0099937 (2002-07-01), Tuomenoksa
patent: 2002/0174207 (2002-11-01), Battou
patent: 2003/0014548 (2003-01-01), Valentine et al.
patent: 2003/0028624 (2003-02-01), Hasan et al.
patent: 2003/0076846 (2003-04-01), Heinz et al.
patent: 2003/0105881 (2003-06-01), Symons et al.
patent: 2003/0208589 (2003-11-01), Yamamoto
patent: 2004/0015957 (2004-01-01), Zara et al.
patent: 2004/0243547 (2004-12-01), Chatrapati et al.
patent: 02001-148697 (2001-05-01), None
An Access-Based Clustering Protocol for Multihop Wireless Ad Hoc Networks, Ting-Chao Hou et al, Jul. 2001.
Daley, William M. “Entity Authentication Using Public Key Cryptography.” US Dept. of Commerce/ National Institute of Standards and Technology. (Feb. 18, 1997) 1-50.
Schneier, Bruce. “Applied Cryptography, Second Edition.” John Wiley and Sons (1996) 37-39, 185-187, & 574-576.
“Fibre Channel—Methodologies for Interconnects (FC-MI) Rev 1.8;” NCITS working draft proposed Technical Report 2001; Secretariat: Information Technology Industry Council; pp. 19-30; 41-44.
“Fibre Channel—Fabric Generic Requirements (FC-FG)” 1996; American National Standards Institute; pp. 6-21.
“Fibre Channel— Generic Services (FC-GS) Rev 3.1;” 1996; working draft proposed American National Standard for Information Systems; pp. 41-49.
“Fibre Channel—Generic Services—2 (FC-GS-2);” 1999; American National Standards Institute; pp. 43-51 and 69-79.
“Fibre Channel—Generic Services—3 (FC-GS-3);” 2001; Approved American National Standard; pp. 93-165.
“Fibre Channel—Generic Services—4 (FC-GS-4) Rev 7.1;” 2001; NCITS working draft proposed American National Standard for Information Technology; pp. 95-139 and 172-177.
“Fibre Channel—Switch Fabric (FC-SW) Rev 3.3;” 1997; NITS working draft proposed American National Standard for Information Technology; pp. 9-17 and 49-63.
“Fibre Channel—Switch Fabric—2 (FC-SW-2) Rev 5.3;” 2001; NCITS working draft proposed American National Standard for Information Technology; pp. 11-21 and 69-95.
“Fibre Channel—Framing and Signaling (FC-FS) Rev 1.7;” 2002; NCITS working draft proposed American National Standard for Information Technology; pp. 28-31 and 282-298.
“Fibre Channel—Physical and Signaling Interface (PC-PH) Rev 4.3;” 1994; working draft proposed American National Standard for Information Systems; pp. 15-25 and 248-259.
Final Office Action mailed Sep. 24, 2009 for corresponding U.S. Appl. No. 11/269,437.
Response to Final Office Mailed Sep. 24, 2009 for corresponding U.S. Appl. No. 11/269,437, filed Dec. 22, 2009.
Office Action mailed Apr. 6, 2009 for corresponding U.S. Appl. No. 11/269,331.
Response to Office Action mailed Apr. 6, 2009 for corresponding patent U.S. Appl. No. 11/269,331, filed Jul. 6, 2009.
Final Office Action mailed Oct. 27, 2009 for corresponding U.S. Appl. No. 11/269,331.
Failover. (1999). In Dictionary of Multimedia and Internet Applications: A Guide for Developers and Users. Retrieved from http://www.credoreference.com/entry/wdmia/failover.
Office Action mailed Apr. 13, 2009 for corresponding U.S. Appl. No. 11/269,365.
Response to Office Action mailed Apr. 13, 2009 for corresponding U.S. Appl. No. 11/269,365, filed Jul. 8, 2009.
Final Office Action mailed Oct. 28, 2009 for corresponding U.S. Appl. No. 11/269,365.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Network security through configuration servers in the fabric... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Network security through configuration servers in the fabric..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network security through configuration servers in the fabric... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2684655

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.