Data processing: structural design – modeling – simulation – and em – Simulating electronic device or electrical system – Computer or peripheral device
Reexamination Certificate
2006-01-10
2006-01-10
Rodriguez, Paul L. (Department: 2123)
Data processing: structural design, modeling, simulation, and em
Simulating electronic device or electrical system
Computer or peripheral device
C703S002000, C703S022000, C713S152000, C713S152000
Reexamination Certificate
active
06985845
ABSTRACT:
A monitoring system monitors a system that has multiple devices that perform respective primary tasks. For the purpose of the monitoring, each device has a finite state machine (FSM) with stochastic non-periodic behavior. The monitoring system simulates in software the behavior of the FSM's. A discrepancy between the states assumed by the FSM's after each time step and the states assumed in the simulation in each time step indicates a failure or a breach of the network's integrity. Hacking such as primary system is practically impossible without being detected. Each device comprises computational resources. In order to reduce the computational environment available to a virus, the idle time of the resources is absorbed by dynamically increasing the complexity of the FSM's.
REFERENCES:
patent: 5394347 (1995-02-01), Kita et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5528516 (1996-06-01), Yemini et al.
patent: 5661668 (1997-08-01), Yemini et al.
patent: 6061599 (2000-05-01), Rhodehamel et al.
patent: 6249755 (2001-06-01), Yemini et al.
patent: 6393386 (2002-05-01), Zager et al.
patent: 6408262 (2002-06-01), Leerberg et al.
patent: 6434512 (2002-08-01), Discenzo
patent: 6477439 (2002-11-01), Bernaden et al.
patent: 6477651 (2002-11-01), Teal
patent: 6647519 (2003-11-01), Lometti et al.
patent: 6654882 (2003-11-01), Froutan et al.
patent: 6697857 (2004-02-01), Dixon et al.
Ilgun, K. et al. “State Transition Analysis: A Rule-Based Intrusion Detection Approach.” IEEE Transaction on Software Engineering. Mar. 1995. vol. 21, Issue 3, pp. 181-199.
Sekar, R. et al. “Synthesizing Fast Intrusion Prevention / Detection Systems from High-Level Specifications.” Proc. of the 8th USENIX Security Symposium. Aug. 23-26, 1999.
Forrest, S. et al. “Computer Immunology”. Communications of the ACM. Oct. 1997. vol. 40, Issue 10, pp. 88-96.
Ilugin, K. “USTAT: A Real-Time Intrusion Detection System for UNIX”. Proc. IEEE Comp. Society Symposium on Research in Security and Privacy. May 1993. pp. 24-26.
Venkatesan, R.M. et al. “Threat-Adaptive Security Policy.” IEEE IPCCC 1997. Feb. 1997. pp. 525-531.
Lunt, T.F. et al. “IDES: A Progress Report.” Proc. 6thAnnual Comp. Security App. Conf. Dec. 1990. pp. 273-285.
Lunt, T.F. “Real-Time Intrusion Detection.” COMPCON Spring '89. Feb.-Mar. 1989. pp. 348-353.
King, G. et al. “An Alternative Implementation of the Reference Monitor Concept.” 4thAerospace Computer Security Conference. Dec. 1988. pp. 159-166.
Murthy, V.K. et al. “Knowledge-Based Key-Hole Monitoring of Users for Security Control in Transaction Processing Systems.” Proc. IEEE Singapore Int'l Conf. on Networks. Sep. 1993. vol. 1, pp. 416-420.
Bodorik, P. “Multi-View Memory to Support OS Locking for Transaction Systems.” Proc. Int'l Database Engineering and Applications Symposium. (IDEAS '97). Aug. 1997. pp. 309-318.
Liberchuk Larry
Rodriguez Paul L.
Sharon Ayal
LandOfFree
Security monitor of system runs software simulator in parallel does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security monitor of system runs software simulator in parallel, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security monitor of system runs software simulator in parallel will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3594196