Communications: electrical – Continuously variable indicating – With meter reading
Patent
1994-05-18
1996-07-16
Zimmerman, Brian
Communications: electrical
Continuously variable indicating
With meter reading
34082531, 34082534, 370 941, 370 13, H04Q 100
Patent
active
055370993
ABSTRACT:
A method and apparatus for preventing intrusive access to a network. The method and apparatus are implemented in a network having a star topology. Utilizing a network management module of a network concentrator as a centralized functional base, unauthorized Data Terminal Elements (DTEs) may be prevented from transmitting messages on a network. By providing a centrally located means by which a set of unique DTE addresses can be associated with a particular port on the network concentrator, valid DTE addresses can be associated with a message packet that contains the address of the transmitting DTE. If the DTE address matches those associated with the port from which it was received, the message packet is authorized. If the DTE address does not match those addresses associated with from which it was received, the message packet is unauthorized. When an unauthorized message packet is received, the port from which the frame was received, is partitioned. The centralized approach utilizing a network manager as a functional base has certain advantages in comparison to distributed security implementations. Such advantages include lower cost and the ease of using existing network management functionality.
REFERENCES:
patent: 4383257 (1983-05-01), Gallanza
patent: 4627052 (1986-12-01), Hoare et al.
patent: 4672572 (1987-06-01), Alsberg
patent: 4692918 (1987-09-01), Elliott et al.
patent: 4897074 (1990-01-01), Lidinsky
patent: 4901348 (1990-02-01), Nichols et al.
patent: 4930159 (1990-05-01), Kravitz
patent: 4942606 (1990-07-01), Kaiser
patent: 4974190 (1990-11-01), Curtis
patent: 5113442 (1992-05-01), Moir
patent: 5173939 (1992-12-01), Abadi
patent: 5274368 (1993-12-01), Breeden
Brain P. Schanning, "Secure Relays: An Alternative Approach to LANSEC.TM., Lecture Notes in Computer Science, Local Area Network Security, Workshop LANSEC'89", European Institute for System Securtiy (E.I.S.S.), Karlsruhe, FRG, Apr. 3-6, 1989 Proceedings, pp. 32-45.
Kwok, C. K. and Mukherjee, B., On Transparent Bridging of CSMA/CD Networks, IEEE, Nov., 1989, pp. 185-190 and, especially paragraph 2 and paragraph 4.3.
Weinstein, J., Bridging to a better LAN, Mini Micro Systems, vol. XXII, No. 2, Feb., 1989, pp. 86-88 and, especially, p. 87, line 12, and p. 88, left-hand column, line 6.
Tanenbaum A. S., Computer Networks, second edition, Prentice-Hall, Inc., 1988, including the table of contents and pp. 128-168.
Meijer, A. and Peters, P., Computer Network Architectures, Computer Science Press, 1983, including the table of contents and pp. 280-283.
Michael S. Katzman, "Smart from the Start: An Introduction to the New AT&T StarLAN 10 SmartHUB and SmartHUB Manager" pp. 22-28, LAN Dispatch/Spring 1991.
Bay Networks Inc.
Zimmerman Brian
LandOfFree
Receiving port security in a network concentrator does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Receiving port security in a network concentrator, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Receiving port security in a network concentrator will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1787548