System and method for detecting and eliminating IP spoofing...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C726S002000

Reexamination Certificate

active

07865945

ABSTRACT:
A traffic management system sniffs data arriving at any point in a system. The sniffer operates to extract certain data from each address. This data could be, for example, the IP address data and the physical address data. The extracted data is then used to access different data bases to determine if matches occur. Time stamps, sequencing and other parameters of each piece of data entering a system are used to control data access.

REFERENCES:
patent: 4792941 (1988-12-01), Yanosy, Jr. et al.
patent: 5319776 (1994-06-01), Hile et al.
patent: 5367670 (1994-11-01), Ward et al.
patent: 5414650 (1995-05-01), Hekhuis
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5623601 (1997-04-01), Vu
patent: 5649095 (1997-07-01), Cozza
patent: 5787253 (1998-07-01), McCreery et al.
patent: 5799002 (1998-08-01), Krishnan
patent: 5828846 (1998-10-01), Kirby et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5905870 (1999-05-01), Mangin et al.
patent: 5913041 (1999-06-01), Ramanathan et al.
patent: 5919258 (1999-07-01), Kayashima et al.
patent: 5958053 (1999-09-01), Denker
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6052788 (2000-04-01), Wesinger, Jr. et al.
patent: 6061798 (2000-05-01), Coley et al.
patent: 6084856 (2000-07-01), Simmons et al.
patent: 6098172 (2000-08-01), Coss et al.
patent: 6115699 (2000-09-01), Hardjono
patent: 6119165 (2000-09-01), Li et al.
patent: 6119236 (2000-09-01), Shipley
patent: 6144639 (2000-11-01), Zhao et al.
patent: 6182226 (2001-01-01), Reid et al.
patent: 6205551 (2001-03-01), Grosse
patent: 6219768 (2001-04-01), Hirabayashi et al.
patent: 6219786 (2001-04-01), Cunningham et al.
patent: 6222856 (2001-04-01), Krishnan et al.
patent: 6246687 (2001-06-01), Siu
patent: 6253337 (2001-06-01), Maloney et al.
patent: 6263444 (2001-07-01), Fujita
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6298445 (2001-10-01), Shostack
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6304552 (2001-10-01), Chapman et al.
patent: 6321336 (2001-11-01), Applegate et al.
patent: 6327625 (2001-12-01), Wang et al.
patent: 6370648 (2002-04-01), Diep
patent: 6415321 (2002-07-01), Gleichauf et al.
patent: 6513122 (2003-01-01), Magdych et al.
patent: 6550012 (2003-04-01), Villa et al.
patent: 6598034 (2003-07-01), Kloth
patent: 6611869 (2003-08-01), Eschelbeck et al.
patent: 6615358 (2003-09-01), Dowd et al.
patent: 6708292 (2004-03-01), Mangasarian
patent: 6711127 (2004-03-01), Gorman et al.
patent: 6725377 (2004-04-01), Kouznetsov
patent: 6732279 (2004-05-01), Hoffman
patent: 6754214 (2004-06-01), Mahalingaiah
patent: 6772345 (2004-08-01), Shetty
patent: 6775780 (2004-08-01), Muttik
patent: 6985953 (2006-01-01), Sandhu et al.
patent: 7032005 (2006-04-01), Mathon et al.
patent: 7058976 (2006-06-01), Dark
patent: 7088727 (2006-08-01), Short et al.
patent: 7096501 (2006-08-01), Kouznetsov et al.
patent: 7099284 (2006-08-01), Halme
patent: 7203192 (2007-04-01), Desai et al.
patent: 7215637 (2007-05-01), Ferguson et al.
patent: 7623450 (2009-11-01), Basso et al.
patent: 2001/0037391 (2001-11-01), West et al.
patent: 2002/0141341 (2002-10-01), Hagger et al.
patent: 2003/0229809 (2003-12-01), Wexler et al.
patent: 05-227216 (1993-09-01), None
patent: 08-186569 (1996-07-01), None
patent: 186569 (1996-07-01), None
patent: 10-070543 (1998-03-01), None
patent: 10-233-779 (1998-09-01), None
patent: 10-233779 (1998-09-01), None
patent: WO-00/03467 (2000-01-01), None
patent: WO-00/11841 (2000-03-01), None
patent: WO-00/34867 (2000-06-01), None
patent: WO-01/13589 (2001-02-01), None
patent: WO-01/16664 (2001-03-01), None
patent: WO-02/100039 (2002-12-01), None
“I Hate DeepNines | Facebook”, Facebook, as printed out in 2010.
“Does anyone know how to bypass or get around DeepNines iTrust technology for filtering web content at school?”, Yahoo Answers, as printed out in 2010.
“Bypass Deep-nines Internet blocker?”, IhAV.net, as printed out in year 2010.
Office Action issued for Japanese Patent Application No. 2003-501,888, 4 pages (English Language translation 4 pages).
Ilgun, K., “USTAT: A Real-Time Intrusion Detection System for UNIX”, Reliable Software Group, Department of Computer Science, University of California, 1063-7109/93 IEEE, Computer Society Symposium, May 24-26, 1993, pp. 16-28.
U.S. Appl. No. 09/572,112, Susan P. Dark.
U.S. Appl. No. 09/875,319, Sharp et al.
U.S. Appl. No. 10/078,386, Sharp et al.
U.S. Appl. No. 60/462,201, Wang.
PCT International Search Report (PCT/US02/17426) dated Feb. 28, 2003.
Schnackenberg et al., “Infrastructure for Intrusion Detection and Response”, Proceedings fo the DARPA Information Survivability Conference and Exposition (DISCEX) 2000, held in Hilton Head, S.C., Jan. 25-27, 2000, 9 pgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, 3 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix A, 7 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix B, 19 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix C, 25 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix D, 12 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix E, 12 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix F, 8 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix G, 7 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix H, 10 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix I, 11 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix J, 5 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix K, 23 ppgs.
Japanese Examination Report issued for JP 2003-501,888; dated Mar. 28, 2006.
Nikkei Communications, Oct. 18, 1999, No. 304, p. 101-109, p. 185.
Nikkei Open Systems, Jan. 15, 2000, No. 82, p. 100-103, p. 321.
Japanese Office Action issued for Japanese Patent Application No. 2001-585, 449 dated Sep. 6, 2005.
Ishibashi, H. et al., “A Protection Method against Unauthorized Access and Address Spoofing for Open Network Access System,” IEEE, US, vol. 1 of 2, Conf. 8, Aug. 26, 2001.
Kanlayasiri, Uropoj, et al., “Detecting Denial of Service using BENEF Model: An Alternative Approach,” Applied Network Research Group Department of Computer Engineering, Kasetsart University, Chatachak, Bangkok, Thailand, Feb. 2001, pp. 1-8.
Whalen, Sean, “An Introduction to Arp Spoofing,” Revision 1, Apr. 2001, pp. 1-6.
“IP-Spoofing Demystified,” Phrack Magazine, vol. 7, Issue 48, File 14 of 18, Jun. 1996, pp. 1-9.
“Sleuth9,” Datamation [on-line], http://products.datamation.com/security/security/1011891069.html, retrieved May 7, 2003, pp. 1-2.
PCT Search Report dated Mar. 26, 2002 (PCT/US01/15108).
Japanese Examination Report issued for JP2003-501,888, dated Mar. 28, 2006.
Voravud Santiraveewan et al., “A Graph-based Methodology for Ananlyzing IP Spoofing Attack”, Article, Proceedings from 18th International Conference on Advanced Information Networking and

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for detecting and eliminating IP spoofing... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for detecting and eliminating IP spoofing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for detecting and eliminating IP spoofing... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2722263

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.