Information security – Access control or authentication – Network
Reexamination Certificate
2002-02-20
2008-05-27
Jung, David Y (Department: 2134)
Information security
Access control or authentication
Network
C726S013000, C726S014000
Reexamination Certificate
active
07380272
ABSTRACT:
A traffic management system sniffs data arriving at any point in a system. The sniffer operates to extract certain data from each address. This data could be, for example, the IP address data and the physical address data. The extracted data is then used to access different data bases to determine if matches occur. Time stamps, sequencing and other parameters of each piece of data entering a system are used to control data access.
REFERENCES:
patent: 5319776 (1994-06-01), Hile et al.
patent: 5414650 (1995-05-01), Hekhuis
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5623601 (1997-04-01), Vu
patent: 5649095 (1997-07-01), Cozza
patent: 5787253 (1998-07-01), McCreery et al.
patent: 5799002 (1998-08-01), Krishnan
patent: 5828846 (1998-10-01), Kirby et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5913041 (1999-06-01), Ramanathan et al.
patent: 5919258 (1999-07-01), Kayashima et al.
patent: 6052788 (2000-04-01), Wesinger, Jr. et al.
patent: 6061798 (2000-05-01), Coley et al.
patent: 6098172 (2000-08-01), Coss et al.
patent: 6119165 (2000-09-01), Li et al.
patent: 6119236 (2000-09-01), Shipley
patent: 6182226 (2001-01-01), Reid et al.
patent: 6205551 (2001-03-01), Grosse
patent: 6219768 (2001-04-01), Hirabayashi et al.
patent: 6219786 (2001-04-01), Cunningham et al.
patent: 6222856 (2001-04-01), Krishnan et al.
patent: 6246687 (2001-06-01), Siu
patent: 6253337 (2001-06-01), Maloney et al.
patent: 6263444 (2001-07-01), Fujita
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6321336 (2001-11-01), Applegate et al.
patent: 6327625 (2001-12-01), Wang et al.
patent: 6370648 (2002-04-01), Diep
patent: 6513122 (2003-01-01), Magdych et al.
patent: 6550012 (2003-04-01), Villa et al.
patent: 6598034 (2003-07-01), Kloth
patent: 6615358 (2003-09-01), Dowd et al.
patent: 6711127 (2004-03-01), Gorman et al.
patent: 05-227216 (1993-09-01), None
patent: 08 186569 (1996-07-01), None
patent: 10-233-779 (1998-09-01), None
patent: WO/0003467 (2000-01-01), None
patent: WO 00/11841 (2000-03-01), None
patent: WO/0034867 (2000-06-01), None
patent: WO 01/13589 (2001-02-01), None
patent: WO 01/16664 (2001-03-01), None
A graph-based methodology for analyzing IP spoofing attack Voravud Santiraveewan; Permpoontanalarp, Y.; 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004. vol. 2, 2004 pp. 227-230 vol. 2.
Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing Wei Chen; Dit-Yan Yeung; International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on Apr. 23-29, 2006 pp. 38-38.
Defense Against Spoofed IP Traffic Using Hop-Count Filtering Haining Wang; Cheng Jin; Shin, K.G.; IEEE/ACM Transactions Networking. vol. 15, Issue 1, Feb. 2007 pp. 40-53.
Japanese Examination Report issued for JP 2003-501,888; dated Mar. 28, 2006.
Schnackenberg et al., “Infrastructure for Intrusion Detection and Response”, Proceedings fo the DARPA Information Survivability Conference and Exposition (DISCEX) 2000, held in Hilton Head, S.C., Jan. 25-27, 2000, 9 pgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, 3 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix A, 7 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix B, 19 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix C, 25 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix D, 12 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix E, 12 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix F, 8 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix G, 7 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix H, 10 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix I, 11 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix J, 5 ppgs.
Zilka, Kevin, Protest Under 37 C.F.R. 1.291(a), In re application of : Susan P. Dark, U.S. Appl. No. 09/572,112, date Mar. 25, 2005, Appendix K, 23 ppgs.
Nikkei Communications, Oct. 18, 1999, No. 304, p. 101-109, p. 185.
Nikkei Open Systems, Jan. 15, 2000, No. 82, p. 100-103, p. 321.
Japanese Office Action issued for Japanese Patent Application No. 2001-585,449 dated Sep. 6, 2005.
Ishibashi, H. et al. “A Protection Method against Unauthorized Access and Address Spoofing for Open Network Access System.” IEEE, US, vol. 1 of 2. Conf. 8, Aug. 26, 2001, pp. 10-13.
Kanlayasiri, Urupoj, et al. “Detecting Denial of Service using BENEF Model: An Alternative Approach.” Applied Network Research Group Department of Computer Engineering, Kasetsart University, Chatuchak, Bangkok, Thailand, Feb. 2001, pp. 1-8.
Whalen, Sean, An Introduction to Arp Spoofing. Revision 1, Apr. 2001, pp. 1-6.
“IP-Spoofing Demystified.” Phrack Magazine, vol. 7, Issue 48, File 14 of 18, Jun. 1996, pp. 1-9.
“Sleuth9.” Datamation, [on-line] http://products.datamation.com/security/security/1011891069.html, retrieved on May 7, 2003. pp. 1&2.
Partial International Search Report, dated May 26, 2003.
PCT International Search Report (PCT/US02/17426) dated Feb. 28, 2003.
PCT Search Report dated Mar. 26, 2002 (PCT/US01/15108).
Dark Susan Pittman
Sharp Clifford F.
Deep Nines Incorporated
Jung David Y
LandOfFree
System and method for detecting and eliminating IP spoofing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for detecting and eliminating IP spoofing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for detecting and eliminating IP spoofing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3983708