Information security – Access control or authentication – Network
Reexamination Certificate
2011-01-04
2011-01-04
Jung, David Y (Department: 2431)
Information security
Access control or authentication
Network
C726S003000, C726S002000
Reexamination Certificate
active
07865945
ABSTRACT:
A traffic management system sniffs data arriving at any point in a system. The sniffer operates to extract certain data from each address. This data could be, for example, the IP address data and the physical address data. The extracted data is then used to access different data bases to determine if matches occur. Time stamps, sequencing and other parameters of each piece of data entering a system are used to control data access.
REFERENCES:
patent: 4792941 (1988-12-01), Yanosy, Jr. et al.
patent: 5319776 (1994-06-01), Hile et al.
patent: 5367670 (1994-11-01), Ward et al.
patent: 5414650 (1995-05-01), Hekhuis
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5623601 (1997-04-01), Vu
patent: 5649095 (1997-07-01), Cozza
patent: 5787253 (1998-07-01), McCreery et al.
patent: 5799002 (1998-08-01), Krishnan
patent: 5828846 (1998-10-01), Kirby et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5905870 (1999-05-01), Mangin et al.
patent: 5913041 (1999-06-01), Ramanathan et al.
patent: 5919258 (1999-07-01), Kayashima et al.
patent: 5958053 (1999-09-01), Denker
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6052788 (2000-04-01), Wesinger, Jr. et al.
patent: 6061798 (2000-05-01), Coley et al.
patent: 6084856 (2000-07-01), Simmons et al.
patent: 6098172 (2000-08-01), Coss et al.
patent: 6115699 (2000-09-01), Hardjono
patent: 6119165 (2000-09-01), Li et al.
patent: 6119236 (2000-09-01), Shipley
patent: 6144639 (2000-11-01), Zhao et al.
patent: 6182226 (2001-01-01), Reid et al.
patent: 6205551 (2001-03-01), Grosse
patent: 6219768 (2001-04-01), Hirabayashi et al.
patent: 6219786 (2001-04-01), Cunningham et al.
patent: 6222856 (2001-04-01), Krishnan et al.
patent: 6246687 (2001-06-01), Siu
patent: 6253337 (2001-06-01), Maloney et al.
patent: 6263444 (2001-07-01), Fujita
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6298445 (2001-10-01), Shostack
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6304552 (2001-10-01), Chapman et al.
patent: 6321336 (2001-11-01), Applegate et al.
patent: 6327625 (2001-12-01), Wang et al.
patent: 6370648 (2002-04-01), Diep
patent: 6415321 (2002-07-01), Gleichauf et al.
patent: 6513122 (2003-01-01), Magdych et al.
patent: 6550012 (2003-04-01), Villa et al.
patent: 6598034 (2003-07-01), Kloth
patent: 6611869 (2003-08-01), Eschelbeck et al.
patent: 6615358 (2003-09-01), Dowd et al.
patent: 6708292 (2004-03-01), Mangasarian
patent: 6711127 (2004-03-01), Gorman et al.
patent: 6725377 (2004-04-01), Kouznetsov
patent: 6732279 (2004-05-01), Hoffman
patent: 6754214 (2004-06-01), Mahalingaiah
patent: 6772345 (2004-08-01), Shetty
patent: 6775780 (2004-08-01), Muttik
patent: 6985953 (2006-01-01), Sandhu et al.
patent: 7032005 (2006-04-01), Mathon et al.
patent: 7058976 (2006-06-01), Dark
patent: 7088727 (2006-08-01), Short et al.
patent: 7096501 (2006-08-01), Kouznetsov et al.
patent: 7099284 (2006-08-01), Halme
patent: 7203192 (2007-04-01), Desai et al.
patent: 7215637 (2007-05-01), Ferguson et al.
patent: 7623450 (2009-11-01), Basso et al.
patent: 2001/0037391 (2001-11-01), West et al.
patent: 2002/0141341 (2002-10-01), Hagger et al.
patent: 2003/0229809 (2003-12-01), Wexler et al.
patent: 05-227216 (1993-09-01), None
patent: 08-186569 (1996-07-01), None
patent: 186569 (1996-07-01), None
patent: 10-070543 (1998-03-01), None
patent: 10-233-779 (1998-09-01), None
patent: 10-233779 (1998-09-01), None
patent: WO-00/03467 (2000-01-01), None
patent: WO-00/11841 (2000-03-01), None
patent: WO-00/34867 (2000-06-01), None
patent: WO-01/13589 (2001-02-01), None
patent: WO-01/16664 (2001-03-01), None
patent: WO-02/100039 (2002-12-01), None
“I Hate DeepNines | Facebook”, Facebook, as printed out in 2010.
“Does anyone know how to bypass or get around DeepNines iTrust technology for filtering web content at school?”, Yahoo Answers, as printed out in 2010.
“Bypass Deep-nines Internet blocker?”, IhAV.net, as printed out in year 2010.
Office Action issued for Japanese Patent Application No. 2003-501,888, 4 pages (English Language translation 4 pages).
Ilgun, K., “USTAT: A Real-Time Intrusion Detection System for UNIX”, Reliable Software Group, Department of Computer Science, University of California, 1063-7109/93 IEEE, Computer Society Symposium, May 24-26, 1993, pp. 16-28.
U.S. Appl. No. 09/572,112, Susan P. Dark.
U.S. Appl. No. 09/875,319, Sharp et al.
U.S. Appl. No. 10/078,386, Sharp et al.
U.S. Appl. No. 60/462,201, Wang.
PCT International Search Report (PCT/US02/17426) dated Feb. 28, 2003.
Schnackenberg et al., “Infrastructure for Intrusion Detection and Response”, Proceedings fo the DARPA Information Survivability Conference and Exposition (DISCEX) 2000, held in Hilton Head, S.C., Jan. 25-27, 2000, 9 pgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, 3 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix A, 7 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix B, 19 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix C, 25 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix D, 12 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix E, 12 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix F, 8 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix G, 7 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix H, 10 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix I, 11 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix J, 5 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), in re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix K, 23 ppgs.
Japanese Examination Report issued for JP 2003-501,888; dated Mar. 28, 2006.
Nikkei Communications, Oct. 18, 1999, No. 304, p. 101-109, p. 185.
Nikkei Open Systems, Jan. 15, 2000, No. 82, p. 100-103, p. 321.
Japanese Office Action issued for Japanese Patent Application No. 2001-585, 449 dated Sep. 6, 2005.
Ishibashi, H. et al., “A Protection Method against Unauthorized Access and Address Spoofing for Open Network Access System,” IEEE, US, vol. 1 of 2, Conf. 8, Aug. 26, 2001.
Kanlayasiri, Uropoj, et al., “Detecting Denial of Service using BENEF Model: An Alternative Approach,” Applied Network Research Group Department of Computer Engineering, Kasetsart University, Chatachak, Bangkok, Thailand, Feb. 2001, pp. 1-8.
Whalen, Sean, “An Introduction to Arp Spoofing,” Revision 1, Apr. 2001, pp. 1-6.
“IP-Spoofing Demystified,” Phrack Magazine, vol. 7, Issue 48, File 14 of 18, Jun. 1996, pp. 1-9.
“Sleuth9,” Datamation [on-line], http://products.datamation.com/security/security/1011891069.html, retrieved May 7, 2003, pp. 1-2.
PCT Search Report dated Mar. 26, 2002 (PCT/US01/15108).
Japanese Examination Report issued for JP2003-501,888, dated Mar. 28, 2006.
Voravud Santiraveewan et al., “A Graph-based Methodology for Ananlyzing IP Spoofing Attack”, Article, Proceedings from 18th International Conference on Advanced Information Networking and
Dark Susan P.
Sharp Clifford F.
LandOfFree
System and method for detecting and eliminating IP spoofing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for detecting and eliminating IP spoofing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for detecting and eliminating IP spoofing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2722263