Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2003-10-02
2008-05-27
Barroń, Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S154000, C726S003000, C709S229000
Reexamination Certificate
active
07380123
ABSTRACT:
Remote activation of covert service channels is provided. A remote host can initiate and establish a connection with a target host without exposing a service channel or communications port to an unauthenticated host. Triggers can be received by and sent to a host and an associated operating system, under direction of a stealth listener. The stealth listener provides can control and direct an operating system to respond to incoming data packets, but can also open and close ports to enable access to services on a host. Using a variety of transport mechanisms, protocols, and triggers to covertly enable a connection to be established between a service and a remote client, the disclosed techniques also enable reduction of processing and storage resources by reducing the amount of host or client-installed software.
REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5574912 (1996-11-01), Hu et al.
patent: 5901284 (1999-05-01), Hamdy-Swink
patent: 6112246 (2000-08-01), Horbal et al.
patent: 6202156 (2001-03-01), Kalajan
patent: 6412001 (2002-06-01), Wong et al.
patent: 6831890 (2004-12-01), Goldsack et al.
patent: 7024478 (2006-04-01), Dalgic et al.
patent: 2003/0101353 (2003-05-01), Tarquini et al.
patent: 2005/0163131 (2005-07-01), Tonnby et al.
Jeff Hayes, Smart Cards, Biometrics and Tokens for VLANS and Subnet Access, Dec. 2001, ALCATEL e-Business Networking Division, pp. 1-9, See in particular p. 4, slide 7, retrieved date Jan. 12, 2007.
Google web definition; Retrieved date Jun. 14, 2007.
Martin Krzywinski, “Port Knocking; Summary of Port Knocking”, http://www.portknocking.org/. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; Features of Port Knocking”: http://www.portknocking.org/view/about/features. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; What is Port Forwarding”: http://www.portknocking.org/view/about/port—forwarding. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; What is Port Triggering”: http://www.portknocking.org/view/about/port—triggering. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; Port Knocking Requirements”: http://www.portknocking.org/view/about/requirements. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; Download; Perl”: http://www.portknocking.org/view/download/perl. According to archive.org, appears to have been published at least as soon as Jul. 26, 2003.
Martin Krzywinski, “Port Knocking; Port Knocking Lab; Lab Instructions”: http://www.portknocking.org/view/knocklab. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; Documentation; knockclient”: http://www.portknocking.org/view/documentation. According to archive.org, appears to have been published at least as soon as Jul. 26, 2003.
Martin Krzywinski, “Port Knocking; Documentation; knockdaemon”: http://www.portknocking.org/view/documentation/knockdaemon. According to archive.org, appears to have been published at least as soon as Jun. 18, 2003.
Martin Krzywinski, “Port Knocking; Documentation; readme”: http://www.portknocking.org/view/documentation/readme. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; FAQ; general”: http://www.portknocking.org/view/faq. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; FAQ; applications”: http://www.portknocking.org/view/faq/applications. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; FAQ; mechanism”: http://www.portknocking.org/view/faq/mechanism. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; FAQ; implementations”: http://www.portknocking.org/view/faq/implementations. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; Details; Overview of Port Knocking”: http://www.portknocking.org/view/details. According to archive.org, appears to have been published at least as soon as Jul. 19, 2003.
Martin Krzywinski, “Port Knocking; Details; Applications of Port Knocking”: http://www.portknocking.org/view/details/application. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; Details; Spoofing Eavesdroppers”: http://www.portknocking.org/view/details/spoofing. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; Details; Data Transfer Across Closed Ports”: http://www.portknocking.org/view/details/transfer. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; Details; Download Perl Prototype”: http://www.portknocking.org/view/details/download. According to archive.org, appears to have been published at least as soon as Apr. 5, 2004.
Martin Krzywinski, “Port Knocking; About; Obscurity”: http://www.portknocking.org/view/about/obscurity. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; KNOCKLAB; knock—lab”: http://www.portknocking.org/view/knocklab/knock—lab. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; FAQ; Security”: http://www.portknocking.org/view/faq/security. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Martin Krzywinski, “Port Knocking; FAQ; Comments”: http://www.portknocking.org/view/faq/comments. According to archive.org, appears to have been published at least as soon as Jul. 18, 2003.
Paul Barham et al. “Techniques for Lightweight Concealment and Authentication in IP Networks” Intel Corporation, Jul. 2002.
Martin Krzy Winski “Port Knocking” Linux Journal, Jun. 16, 2003: http://linuxjournal.com/article6811.
Christian Borss, “Drop/Deny vs. Reject” Oct. 7, 2001 : http://www.lk.etc.tu-bs.de/lists/archiv/lug-bs/2001/msg05734.html.
Bennett Jeremy
Hernacki Brian
Lofgren Thomas
Barroń Gilberto
Lemma Samson
Symantec Corporation
Van Pelt & Yi & James LLP
LandOfFree
Remote activation of covert service channels does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Remote activation of covert service channels, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Remote activation of covert service channels will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3987608