Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1997-02-06
1999-08-03
Beausoliel, Jr., Robert W.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
G06F 1300
Patent
active
059319461
ABSTRACT:
A network system includes: a plurality of repeating installations connected to the network; a plurality of computers connected to the network, each of the computers being connected to the network through a corresponding repeating installation; and a management unit connected to the network. The management unit includes distribution means for distributing at least one of an external audit program and an internal audit program for defining the processing procedure, by which the repeating installation audits vulnerability of at least one of the plurality of computers, from the management unit to the repeating installations through the network. The repeating installation includes audit control means for carrying out at least one of the external audit processing and the internal audit processing with respect to the vulnerability of the at least one computer in accordance with at least one of the external audit program and the internal audit program which have been distributed from the management unit to judge whether or not the at least one computer has the vulnerability.
REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5475839 (1995-12-01), Watson et al.
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5684957 (1997-11-01), Kondo et al.
Winkler, "A Unix Prototype for Intrusion and Anomaly Detection in Secure Networks", Proceedings of 13th National Computer Security Conference, pp. 1-10, Oct. 1990.
Mukherjee et al., "Network Intrusion Detection", IEEE, pp. 26-41, Jun. 1994.
Winkler et al., Intrusion and Anomaly Detection in Trusted Systems, IEEE, pp. 39-45, Dec. 1989.
Nemeth et al., UNIX System Administration Handbook, 2nd Ed., Prentice Hall PTR, pp. 539-560, Dec. 1995.
Russell et al., Computer Security Basics, O'Reilly & Associates, Inc., pp. 11-13, Dec. 1991.
Bartee, Data Communications, Networks, and Systems, pp. 313-315, Dec. 1991.
Farmer et al., "The COPS Security Checker System" Purdue University Technical Report CSD-TR-993, Sep. 1991.
Farmer et al., "SATAN--Adminstrator Tool for Analyzing Networks", HTML documentation files, http://www.cerf.net/security/satan/docs/, Dec. 1995.
Kayashima Makoto
Terada Masato
Yoshida Ken-ichi
Beausoliel, Jr. Robert W.
Elmore Stephen C.
Hitachi , Ltd.
LandOfFree
Network system having external/internal audit system for compute does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Network system having external/internal audit system for compute, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network system having external/internal audit system for compute will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-845337