Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-04-19
2005-04-19
Morse, Gregory (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C707S793000, C707S793000, C706S008000, C706S045000
Reexamination Certificate
active
06883101
ABSTRACT:
A method and data processing system assesses the security vulnerability of a network. A system object model database is created and supports the information data requirements of disparate network vulnerability analysis programs. Only the required data from the system object model database representing the network is imported to the programs, which then analyze the network to produce data results from each program. These data results are stored in a common system model database and within the data fact base. Goal oriented fuzzy logic decision rules are applied to determine the vulnerability posture of the network.
REFERENCES:
patent: 5138321 (1992-08-01), Hammer
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5528516 (1996-06-01), Yemini et al.
patent: 5684957 (1997-11-01), Kondo et al.
patent: 5699403 (1997-12-01), Ronnen
patent: 5745382 (1998-04-01), Vilim et al.
patent: 5751965 (1998-05-01), Mayo et al.
patent: 5787235 (1998-07-01), Smith et al.
patent: 5798939 (1998-08-01), Ochoa et al.
patent: 5812763 (1998-09-01), Teng
patent: 5892903 (1999-04-01), Klaus
patent: 5963653 (1999-10-01), McNary et al.
patent: 6020889 (2000-02-01), Tarbox et al.
patent: 6054987 (2000-04-01), Richardson
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6415321 (2002-07-01), Gleichauf et al.
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 0 961 440 (1999-11-01), None
patent: WO 9956195 (1999-11-01), None
patent: WO 9956195 (1999-11-01), None
Henning et al., “The Network Vulnerability Tool(NVT)—A System Vulnerability Visualization Architecture,” U.S. Government Publication Release Authority, Oct. 18, 1999, pp. 98-111.
Farrell John T.
Fox Kevin L.
Henning Ronda R.
Miller Clifford C.
Allen Dyer Doppelt Milbrath & Gilchrist, P.A.
Harris Corporation
Ho Thomas
Morse Gregory
LandOfFree
System and method for assessing the security posture of a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for assessing the security posture of a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for assessing the security posture of a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3381055